Accenture MDR Quick Start Guide for Symantec™ Email Threat Detection and Response

This quick start guide will help Accenture MDR customers configure Symantec Email Threat Detection and Response to allow log collection from the Log Collection Platform (LCP).

The document includes the following topics:

  • Supported Versions

  • Port Requirements

  • Configuring Symantec Email

  • Creating New Request for Monitoring

  • LCP Configuration Parameters

Supported Versions

A list of supported versions is available in the Accenture MDR Supported Products List document (Accenture_MSS_Supported_Products_List.xlsx) which can be found in Accenture Portal - https://mss.accenture.com/PortalNextGen/Reports/Documents

Port Requirements

Table 1-1: Port requirements for LCP communication.

Source

Destination

Port

Description

LCP 

Symantec Email Security.cloud

443 (https)

Default port

 Configuring the Symantec Email Security.cloud

  1. A customer with Email.cloud and Symantec Email Threat Detection and Response services needs to login to the Symantec.cloud portal https://identity.symanteccloud.com/Logon.

  2. The customer (Email Security.Cloud Portal administrator) needs to create an additional user with View Statistics privilege for Symantec Email Threat Detection and Response and Anti-Malware services. If the customer has purchased the Email Threat Isolation service and want to receive URL Isolation data, then the user account must have View Statistics permissions for Email Threat Isolation along with the ATP Email and Anti Malware services.

  3. The username and password needs to be provided to the MSS onboarding team.

Note:The API provides a unique userid (UserName)  which is authenticated against the View Statistics role in ClientNet. Only valid users who have the View Statistics role on the associated service for the given customerid can receive data.

 To create a user, follow the steps below.

  1. Select Administration > User Management.

  2. Click Create new user.

  3. Enter the user's full name (required), login name (required), and email address (optional).

  4. Select the Preferred language that the portal displays in. Set this to English.

  5. Select the Preferred time zone for the user. The default time zone is GMT.

  6. Enter a password for the user (required).

  7. Ensure that the User is enabled button is set to Yes.

  8. Click Save and Exit.

To define the custom user role, follow the steps below.

  1. Select Administration > User Management.

  2. Select the user created above.

  3. Click the User roles tab.

  4. Click Create custom role.

  5. From the drop-down list in the Permission section, select the role (View Statistics) to apply for this user.

  6. From the drop-down list in the Services section, select the service (Email Threat Isolation along with the ATP Email and Anti Malware services) to apply the permissions for.

Note: Events from Services such as Email Antispam, Email Data Protection, etc. are not logged to Symantec.cloud.

7. Select All domains.

8. Click Append Role.

 Note: Administrators need to append the custom role for the user twice, once for Advanced Threat Protection and then for Anti–Malware.

Creating New Request for Monitoring

Once the device is configured as outlined in the steps above and all network pre-requisites have been made, you are now ready to onboard it for MSS monitoring. To complete this process, submit a New Request via the MSS Portal at https://mss.accenture.com/. This new request should contain the following information:

  1. Reporting LCP Hostname/IP Address:

  2. URL of Email.Cloud:

  3. User Name:

  4. Password:

  5. Feeds to Fetch:

If you have any questions about this process, please contact your Onboarding Engineer or Service Manager.

LCP Configuration Parameters

Table 1-2: The Symantec Email Security.cloud sensor using the Web Service API v7.00.00 event collector (API - 3856) properties to be configured by MSS are shown in the table.

Property

Default Value

Description

URL of Email.Cloud to fetch logs

https://datafeeds.emailsecurity.symantec.com

URL to connect to email data feed.

User Name

Custom Value

The username to access Symantec Email Security.cloud.

Password

Custom Value

The user password to access Symantec Email Security.cloud.

Feeds to Fetch

Malware

which feed to query (malware, all logs url isolation )

Possible values: malware, all, isolation

 

Legal Notice

Copyright © 2021 Accenture. All rights reserved.

Accenture, the Accenture Logo, and DeepSight Intelligence are trademarks or registered trademarks of Accenture in the U.S. and other countries. Other names may be trademarks of their respective owners.

The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Accenture and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. ACCENTURE SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Accenture as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.