Claroty Continuous Threat Detection

About the Device

Claroty CTD is a robust solution that delivers comprehensive cybersecurity controls for industrial and government environments. A security platform that provides industrial cyber security solutions with full-spectrum IoT and OT visibility, continuous monitoring and real-time risk insights to protect you from evolving threats.

CTD monitors the network for all five signs of potential threat: 

  • Early indicators of attack, such as abnormal DNS scans or failed login attempts. 

  • The presence of known threat signatures

  • Behavioral anomalies associated with zero-day attacks, such as atypical communication between assets

  • Engineering operations associated with advanced persistent threat (APT) activity, such as unexpected process value changes

  • Any activity or indicator that meets your custom-defined criteria

Device Information

 Entity

Particulars

 Entity

Particulars

Vendor Name

Claroty

Product Name

Continuous Threat Detection (CTD)

Type of Device

Hosted

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log collection method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log collection method

Claroty Continuous Threat Detection

CLAROTY_CTD

Syslog - CEF

CyberHub

Port Requirements

Source

Destination

Port

Source

Destination

Port

Claroty Continuous Threat Detection

CyberHub

6514 (TCP)

To facilitate secure communication and align with our best practice, we strongly encourage the use of Transport Layer Security (TLS) between your security devices and our Adaptive MxDR platform for event forwarding.

While we understand that TLS support may not be available on all devices, if your devices do support TLS communication, we recommend utilizing port 6514 for seamless integration.

In some cases, the upgraded version of the device might incorporate TLS support without prior notice. If you come across such a scenario or for further assistance in configuring TLS, we kindly ask you to reach out to your dedicated Adaptive MxDR Service Delivery Lead.

Device Configuration

  • If the user is connected to a CTD Server and configures the Syslog from within that site, the syslog message will be sent from that site and there will not be an option from that site to select the other sites.

  • If the user is connected to the EMC and defines a new syslog, the message will be forwarded from the EMC Server (and not from the site/s). 

To configure Syslog from Claroty CTD Server

  1. Log in to CTD Server with admin credentials.

  2. Navigate to Settings > Integrations > SIEM Syslog

image-20240503-105345.png
  1. In ADD NEW SYSLOG, uncheck Local as we are sending logs to another target.

  • Below points are mapped exactly as per the reference screenshot:

    • From (Site) – Select one or multiple sites (i.e. CTD Servers).

    • Vendor Name - Other

    • Message Contents – Select which level to log - Alerts, Baselines, Events, or Health Monitoring. Default is Alerts.

    • Category - Make category selected as ALL.

    • Message Format – Select CEF

    • Server – CyberHub IP Address

    • Port – 6514

    • Protocol – TLS

      • When TLS is chosen, the Syslog message will be sent as an encrypted TCP message with CEF format, with an option to add server authentication by uploading a server certificate.

    • System URL – Automatically shows the source URL; this field is not editable

    • Save – Click to commit your entries

image-20240503-121532.png
  1. In Message Content, select Alerts and in Category, select All.

  1. In Message Content select Events and in Category, select All.

  1. In Message Content, select Health Monitoring and enter the value for Interval a per your requirement.

  1. In Message Content, select Baseline.

    1. Protocol: Displays protocols that exist in the specific environment. Select the protocol/s you want to filter for.

    2. Communication Type: Select your required communication types.

    3. Access Type: Select from the list of available access types.

To configure Syslog from EMC Server

  1. Log in to EMC with admin credentials.

  2. Navigate to Settings > Integrations > SIEM Syslog

  3. Click the + to Create New. 

  1. Enter the following Configuration:

  • To: Uncheck LOCAL because we are sending logs to a remote server

  • From: Select one or multiple CTD sites or ALL from which you want to send syslog for

  • Vendor name: Select vendor as Other

  • Message Contents - Select Alerts, Baselines, Events from Message Contents drop-down and configure recommended settings provided before under CTD server configuration.

  • Message Format – Select CEF

  • Server – CyberHub IP Address

  • Port – 6514

  • Protocol – TLS:

    • When TLS is chosen, the Syslog message will be sent as an encrypted TCP message with CEF format, with an option to add server authentication by uploading a server certificate.

  • System URL – Automatically shows the source URL; this field is not editable and does not need to be configured

  • Save – Click to commit your entries.

 

To Test the Added Syslog Servers

Once Syslog configuration gets done then click to Send a Test Message option to test the Syslog servers those were added.

Integration Parameters

Parameters required from customer for Integration.

Property

Default Value

Description

Property

Default Value

Description

IP Address

Claroty Continuous Threat Detection interface IP address

Hostname or IP address of the device which forwards logs to the CyberHub

About Accenture:
Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent and innovation led company with 738,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with strong ecosystem relationships. We combine our strength in technology with unmatched industry experience, functional expertise and global delivery capability. We are uniquely able to deliver tangible outcomes because of our broad range of services, solutions and assets across Strategy & Consulting, Technology, Operations, Industry X and Accenture Song. These capabilities, together with our culture of shared success and commitment to creating 360° value, enable us to help our clients succeed and build trusted, lasting relationships. We measure our success by the 360° value we create for our clients, each other, our shareholders, partners and communities. Visit us at www.accenture.com.

About Accenture Security
Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.

Legal notice: Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. This document is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals.