Cybereason EDR

About the Device

Cybereason™ is a real-time attack detection and response platform that uses endpoint data to detect simple and complex threats. The Cybereason Detection and Response Platform leverages big data, behavioral analytics and machine learning to uncover, in real time, complex cyber-attacks designed to evade traditional defenses and accelerates investigation and response. It automates the investigation process, connects isolated malicious events and visually presents a full malicious operation. The platform is available as an on-premise solution or a cloud-based service. Cybereason Platform is comprised of three components:

  1. Endpoint Silent Sensor

  2. Malops TM Hunting Engine

  3. Incident Response Console

Device Information

 Entity

Particulars

 Entity

Particulars

Vendor Name

Cybereason Inc.

Product Name

Endpoint Detection and Response (EDR)

Type of Device

Cloud

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log collection method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log collection method

Cybereason EDR

CYBEREASON_EDR

Vendor Proprietary API - JSON

CyberHub

Port Requirements

Source

Destination

Port

Source

Destination

Port

Cybereason EDR

CyberHub

443

Device Configuration

To Create User

  1. Login into Cybereason GUI with Admin credentials.

  2. Navigate to Administration > Users > Create Users, provide user details like email and passwords.

  3. In Edit user role > Predefined roles, select API User.

image-20241217-070119.png
  1. After user creation, we need to execute login API to get login cookies in API followed by Malop and Malware API execution to fetch desired logs.

The current user setup only provides machine names in the logs. To retrieve the IP addresses of the machines, a user must be created with the following permissions. Without these permissions, while it is still possible to fetch malware or malop logs and resolving machine names to IP addresses will be possible. 

To collect the source IP

Configure the following:

  1. Navigate to Administration > Users > Create Users, provide user details like email and passwords.

  2. In Edit user role > Analyst roles, select Analyst and L3.

  3. In Edit user role > Admin roles, select System Admin.

image-20241217-070145.png

To Enable Malware Feature 
1. Navigate to Security Profile Page > Anti Malware and turn on Anti Malware feature as shown below: 

  1. Remaining configurations should be done as per organizations security policy.

To configure Anti Ransomware Feature

  1. Navigate to Security Profile Page > Anti Ransomware and turn on Anti Ransomware feature as shown below: 

  • Select anyone option from Detect, Suspend and Prevent from above selection and Remaining configurations should be done as per organizations security policy.

To Configure Power Shell Feature

  1. Navigate to Security Profile Page > Power shell protection and turn on PowerShell feature as shown below:  

  1. Remaining configurations should be done as per organizations security policy.

Integration Parameters

Property

Default Value

Description

Property

Default Value

Description

Cybereason Login URL

<Login URL>

Cybereason Login API URL

Company Name

 

Company Name (this value is used in log origin field)

User Name

 

API User Name

Password

 

API User Password

Query Interval Minutes

5

Time to fetch next set of data from device

Start Reading From

END

Bookmark, from where we need to start reading the device logs

Time Offset

+00:00

 

Execution Time

 

 

 

About Accenture:
Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent and innovation led company with 738,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with strong ecosystem relationships. We combine our strength in technology with unmatched industry experience, functional expertise and global delivery capability. We are uniquely able to deliver tangible outcomes because of our broad range of services, solutions and assets across Strategy & Consulting, Technology, Operations, Industry X and Accenture Song. These capabilities, together with our culture of shared success and commitment to creating 360° value, enable us to help our clients succeed and build trusted, lasting relationships. We measure our success by the 360° value we create for our clients, each other, our shareholders, partners and communities. Visit us at www.accenture.com.

About Accenture Security
Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.

Legal notice: Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. This document is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals.