Accenture MDR Quick Start Guide for ThreatX WAAP Platform

This quick start guide will help Accenture MDR customers configure ThreatX WAAP Platform to allow log collection from the Log Collection Platform (LCP).

The document includes the following topics:

Supported Versions

A list of supported versions is available in the Accenture MDR Supported Products List document (Accenture_MDR_Supported_Products_List.xlsx) which can be found in Accenture MDR Portal.

Port Requirements

Table 1-1: Port requirements for LCP communication

Source 

Destination

Port

Description

LCP

ThreatX WAAP

443 (TCP)

Default port

Configuring ThreatX WAAP

Pre-requisuite:

a.User account with tenant admin role access to ThreatX Tenant.

b.ThreatX tenant name/identifier a.k.a. customer name. It can be found on the top right corner of ThreatX portal home page below the user name, it is also displayed as banner on the top of 'API KEYS' page under settings.

Generating the API key through ThreatX portal

  1. Login to ThreatX UI

2. Navigate to ‘API Keys’ under settings on the left pane

3. Click ‘Add API Key’ at the top right

4. Fill out the name, description and assigned user(email address of the user for whom API key is created) fields. Ensure both ‘Read-Only’ and ‘Enabled’ options are selected and click save.

5. After you clicked Save, promt will appear with API key displayed, please save this key to secure location and share it with Accenture MxDR for onboarding.

LCP Configuration Parameters

Table 1-2: The ThreatX WAAP event collector (API-5039) properties to be configured by MDR are shown in the table.

Property

Default Value

Description

URL

ThreatX API URL

API Key

 

API Key associated with a ThreatX Tenant’s user account

Tenant Name

 

ThreatX Tenant Name a.k.a. “customer name”

 

 

Legal Notice

Copyright © 2021 Accenture. All rights reserved.

Accenture, the Accenture Logo, and DeepSight Intelligence are trademarks or registered trademarks of Accenture in the U.S. and other countries. Other names may be trademarks of their respective owners.

The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Accenture and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. ACCENTURE SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Accenture as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.