Publisher: Splunk
Connector Version: 2.2.1
Product Vendor: Symantec
Product Name: Symantec DLP
Product Version Supported (regex): ".*"
Minimum Product Version: 6.3.0
This app supports incident update and incident ingestion from Symantec Data Loss Prevention installation
- During scheduled | interval polling, the app will start from the number of days specified in first_scheduled_ingestion_span and will ingest up to the number of incidents specified in the max_containers (Default value 10) in configuration parameter per cycle. Then it remembers the last ingested 'incident_id' and stores it in the state file against the key 'last_incident_ingested'. For the next scheduled | interval cycles, ingestion will start from the last_incident_ingested in the state file and will ingest up to the number of incidents specified in the max_containers .
- The number of incidents ingested will depend on the specified max_containers and poll_now_ingestion_span , whichever limit is hit first.
- During a POLL NOW , incidents will be ingested starting with the oldest first. The number of incidents ingested will depend on the specified max_containers and poll_now_ingestion_span , whichever limit is hit first.
Custom Severity Config Parameter
- It is an optional parameter. Here the user needs to provide a JSON string in the following
format
{'symantecdlp_severity': 'phantom_severity'}
This parameter can be used to map the Symantec DLP incident severity to any of the custom phantom severity. - To configure a custom severity in the Phantom, go to Administrator → Event Settings → Severity. Click on 'add item' and give an appropriate name for the severity and click on 'Done' button.
- By default, the severity is mapped in the following way:
- For the incident having 'high' severity, the container's severity will be 'high'.
- For the incident having 'medium' severity, the container's severity will be 'medium'.
- For the incident having 'low' severity, the container's severity will be 'low'.
- For the incident having severity other than 'high', 'low' or 'medium' the container's severity will be 'medium'.
The app uses HTTP/ HTTPS protocol for communicating with the Mattermost server. Below are the default ports used by Splunk SOAR.
Service Name | Transport Protocol | Port |
---|---|---|
http | tcp | 80 |
https | tcp | 443 |
This table lists the configuration variables required to operate Symantec Data Loss Prevention. These variables are specified when configuring a Symantec DLP asset in Splunk SOAR.
VARIABLE | REQUIRED | TYPE | DESCRIPTION |
---|---|---|---|
url | required | string | Device URL, e.g. https://mysymcdlp.contoso.com |
verify_server_cert | optional | boolean | Verify server certificate |
username | required | string | Username |
password | required | password | Password |
report_id | required | numeric | Report ID to ingest data from |
extract_components | optional | boolean | Extract additional components |
poll_now_ingestion_span | optional | numeric | Poll last n days for 'Poll Now' (Default: 15) |
first_scheduled_ingestion_span | optional | numeric | Poll last n days for first scheduled polling (Default: 10) |
max_containers | optional | numeric | Maximum number of containers to ingest during scheduled polling (Default: 10) |
timezone | required | timezone | Device timezone |
custom_severity | optional | string | JSON dictionary represented as a serialized JSON string (More details in the documentation) |
test connectivity - Validate the asset configuration for connectivity
update incident - Update a DLP incident
list incidents - List DLP incidents
get incident - Get DLP incident
on poll - Action handler for the ingest functionality
Validate the asset configuration for connectivity
Type: test
Read only: True
No parameters are required for this action
No Output
Update a DLP incident
Type: generic
Read only: False
For custom attributes defined in the administration console of DLP, use the custom_fields parameter. The parameter must be a JSON string with the key being the name of the attribute and the value being the value of the attribute.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
incident_id | required | ID of incident to update | numeric | dlp incident id |
status | optional | New status of incident | string | |
severity | optional | New severity of incident | string | |
remediation_status | optional | New remediation status of incident | string | |
remediation_location | optional | Represents the remediation location of the incident | string | |
note | optional | Represents the note of the incident | string | |
custom_fields | optional | JSON string representing custom fields to update (defined in administration console) | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.custom_fields | string | {'custom_attribute': 'test_value'} | |
action_result.parameter.incident_id | numeric | dlp incident id |
49487 |
action_result.parameter.note | string | This is test note | |
action_result.parameter.remediation_location | string | test location | |
action_result.parameter.remediation_status | string | BLOCKED | |
action_result.parameter.severity | string | MEDIUM | |
action_result.parameter.status | string | In Progress | |
action_result.data.*.batchId | string | 304ee0ec-cd7c-4c92-ab28-8a561d9c4d7b | |
action_result.data.*.statusCode | string | SUCCESS | |
action_result.summary | string | ||
action_result.message | string | Successfully updated incident | |
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
List DLP incidents
Type: investigate
Read only: True
creation_time parameter is used to fetch the incidents that were created after the creation time.
The timestamp should be entered in YYYY-MM-DD or a valid "ISO 8601 timestamp" format.
Some examples of valid time formats are:
- 2018-09-24
- 2018-09-23T14:40:44Z
- 2018-09-23T14:40:44+05:30
- 2020-08-30T01:45:36.123Z
- 2021-12-13T21:20:37.593194+05:30
report_id specifies the ID of the saved report to execute on the Enforce Server from which we want to fetch incident.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
report_id | required | ID of the saved report to fetch incident from | numeric | dlp report id |
creation_time | required | Fetch the incidents that were created after the creation time | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.creation_time | string | ||
action_result.parameter.report_id | numeric | dlp report id |
|
action_result.data.*.incident_id | numeric | dlp incident id |
|
action_result.summary | string | ||
action_result.summary.total_incidents | numeric | 18 | |
action_result.message | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Get DLP incident
Type: investigate
Read only: True
User needs to provide value for either incident_id or incident_long_id to get the incident details. It is recommended to use incident_long_id parameter to fetch incident details.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
incident_id | optional | ID of incident to update | numeric | dlp incident id |
incident_long_id | optional | Long ID of incident to update | numeric | dlp incident id |
include_violations | optional | Whether the Web Service should return policy violation data with the basic incident details | boolean | |
include_history | optional | Whether the Web Service should return incident history information | boolean |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.status | string | success failed | |
action_result.parameter.incident_id | numeric | dlp incident id |
|
action_result.parameter.incident_long_id | numeric | dlp incident id |
|
action_result.parameter.include_history | boolean | True False | |
action_result.parameter.include_violations | boolean | True False | |
action_result.data.*.incident.applicationName | string | Microsoft Host Process For Windows Services | |
action_result.data.*.incident.applicationPath | string | \Device\HarddiskVolume2\Windows\System32\svchost.exe | |
action_result.data.*.incident.blockedStatus | string | ||
action_result.data.*.incident.customAttributeGroup.*.customAttribute.*.name | string | Group Attribute 1 | |
action_result.data.*.incident.customAttributeGroup.*.customAttribute.*.value | string | ||
action_result.data.*.incident.customAttributeGroup.*.name | string | Test Group 1 | |
action_result.data.*.incident.dataOwner | string | ||
action_result.data.*.incident.detectionDate | string | ||
action_result.data.*.incident.detectionServer | string | DLP SingleTierServer | |
action_result.data.*.incident.eventDate | string | 2021-12-27T04:31:26-0800 | |
action_result.data.*.incident.incidentCreationDate | string | ||
action_result.data.*.incident.incidentHistory.*.actionType._value_1 | string | Status Changed | |
action_result.data.*.incident.incidentHistory.*.actionType.actionTypeId | numeric | 2 | |
action_result.data.*.incident.incidentHistory.*.date | string | 2021-12-27T04:32:46-0800 | |
action_result.data.*.incident.incidentHistory.*.detail | string | New | |
action_result.data.*.incident.incidentHistory.*.user | string | Test | |
action_result.data.*.incident.incidentId | numeric | dlp incident id |
2882 |
action_result.data.*.incident.incidentLongId | numeric | dlp incident id |
2882 |
action_result.data.*.incident.isHTTPS | boolean | False | |
action_result.data.*.incident.machineIP | string | 10.1.17.191 | |
action_result.data.*.incident.machineName | string | DLP158A1 | |
action_result.data.*.incident.matchCount | numeric | 1 | |
action_result.data.*.incident.messageBody | string | ||
action_result.data.*.incident.messageBodyContent | string | ||
action_result.data.*.incident.messageHeader.componentId | numeric | 2921 | |
action_result.data.*.incident.messageHeader.componentLongId | numeric | 2921 | |
action_result.data.*.incident.messageHeader.componentType._value_1 | string | Header | |
action_result.data.*.incident.messageHeader.componentType.typeId | numeric | 1 | |
action_result.data.*.incident.messageHeader.documentFormat | string | unicode | |
action_result.data.*.incident.messageHeader.name | string | Header | |
action_result.data.*.incident.messageHeader.policyRuleViolation.*.policyRule.ruleId | numeric | 102 | |
action_result.data.*.incident.messageHeader.policyRuleViolation.*.policyRule.ruleName | string | Matching Keyword ABGD | |
action_result.data.*.incident.messageHeader.policyRuleViolation.*.violation.*.documentViolation | string | ||
action_result.data.*.incident.messageHeader.policyRuleViolation.*.violation.*.fileSizeViolation | string | ||
action_result.data.*.incident.messageHeader.policyRuleViolation.*.violation.*.imageViolation | string | ||
action_result.data.*.incident.messageHeader.policyRuleViolation.*.violation.*.violationText | string | delta | |
action_result.data.*.incident.messageHeader.ruleViolationCount | numeric | 1 | |
action_result.data.*.incident.messageSource._value_1 | string | Endpoint | |
action_result.data.*.incident.messageSource.sourceType | string | ENDPOINT | |
action_result.data.*.incident.messageType._value_1 | string | Endpoint HTTP | |
action_result.data.*.incident.messageType.typeId | numeric | 27 | |
action_result.data.*.incident.originator.IPAddress | string | 10.1.17.191 | |
action_result.data.*.incident.originator.originatorId | numeric | 2721 | |
action_result.data.*.incident.originator.originatorIdLong | numeric | 2721 | |
action_result.data.*.incident.originator.port | numeric | 0 | |
action_result.data.*.incident.originator.senderIdentifier | string | 10.1.17.191 | |
action_result.data.*.incident.otherViolatedPolicy.*.label | string | ||
action_result.data.*.incident.otherViolatedPolicy.*.name | string | test_policy-2 | |
action_result.data.*.incident.otherViolatedPolicy.*.policyId | numeric | 41 | |
action_result.data.*.incident.otherViolatedPolicy.*.version | numeric | 4 | |
action_result.data.*.incident.policy.label | string | ||
action_result.data.*.incident.policy.name | string | Custom_Network_Endpoint_Policy | |
action_result.data.*.incident.policy.policyId | numeric | 81 | |
action_result.data.*.incident.policy.version | numeric | 5 | |
action_result.data.*.incident.recipient.*.IPAddress | string | 34.104.35.123 | |
action_result.data.*.incident.recipient.*.port | numeric | 80 | |
action_result.data.*.incident.recipient.*.recipientId | numeric | 2701 | |
action_result.data.*.incident.recipient.*.recipientIdLong | numeric | 2701 | |
action_result.data.*.incident.recipient.*.recipientIdentifier | string | http://example.com/example/delta-update/example.crxd | |
action_result.data.*.incident.ruleViolationCount | numeric | ||
action_result.data.*.incident.severity | string | ||
action_result.data.*.incident.status | string | ||
action_result.data.*.incident.superseded | string | No | |
action_result.data.*.incident.uniqueMessageId | string | unique message id |
|
action_result.data.*.incident.userJustification | string | ||
action_result.data.*.incident.userName | string | NT AUTHORITY\system | |
action_result.data.*.incident.violatedPolicyRule.*.ruleId | numeric | 102 | |
action_result.data.*.incident.violatedPolicyRule.*.ruleName | string | Matching Keyword ABGD | |
action_result.data.*.incidentId | numeric | dlp incident id |
2882 |
action_result.data.*.incidentLongId | numeric | dlp incident id |
|
action_result.data.*.incidentType | string | ||
action_result.data.*.statusCode | string | SUCCESS | |
action_result.summary | string | ||
action_result.message | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Action handler for the ingest functionality
Type: ingest
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
start_time | optional | Parameter ignored in this app | numeric | |
end_time | optional | Parameter ignored in this app | numeric | |
container_id | optional | Parameter ignored in this app | string | |
container_count | optional | Maximum number of emails to ingest | numeric | |
artifact_count | optional | Parameter ignored in this app | numeric |
No Output