CISCO Secure Endpoint Integrations
Introduction
Secure Endpoint offers cloud-delivered, advanced endpoint detection and response across multidomain control points to rapidly detect, contain, and remediate advanced threats.
Assumptions
The procedures described in Section 3 assume that a Log Collector has already been setup.
Requirements
This integration is for Cisco Secure Endpoint logs. It includes the following datasets for receiving logs over syslog or read from a file:
-
event dataset: supports Cisco Secure Endpoint Event logs.
Generating Client ID and API Key:
- Log in to your AMP for Endpoints Console.
- Go to Accounts > Organization Settings.
- Click Configure API Credentials under Features to generate the Client ID and secure API Key.
Logs
Secure Endpoint
The event dataset collects Cisco Secure Endpoint logs.
What can the Secure Endpoint API be used for?
-
Generate a list of organizations a user has access to
-
Generate a list of policies for a specified organization
-
Generate specific information about a specified policy such as:
-
-
-
-
General policy data
-
Associated network control lists
-
Associated computers
-
Associated groups
-
Proxy settings
-
Policy XML
-
-
-
-
Generate all policy types and operating systems available for a specified organization
Top Use Cases
-
Generating reports on policy settings across an organization
-
Inspecting a particular policy's settings
-
Querying to find policies matching certain criteria in order to detect which policies should be edited
Response Format
-
Data
-
Meta
-
Errors
Cisco Secure Endpoint Integration Procedures
Please provide the following information to CyTech:
Collect logs from the Cisco Secure Endpoint API.
-
Client ID - Cisco Secure Endpoint Client ID
-
API Key - Cisco Secure Endpoint API Key
No Comments