cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3760
Views
0
Helpful
0
Comments
aligarci
Cisco Employee
Cisco Employee
 

We are excited to announce that the new REST API of global threat alerts (formerly Cognitive Intelligence and CTA) is available now to all customers of Secure Network Analytics and Secure Endpoint who have enabled the global threat alerts capability.

 

Read, configure, and correlate all global threat alerts data

For many organisations, being able to access their data programmatically is key. It allows them to build automation that will save time, provide a consistent experience, correlate information, and unify all their relevant security monitoring information in one place.  

In order to provide these capabilities to all global threat alerts customers, all visible data in the global threat alerts dashboard is now available through the REST API. There are numerous API calls focused on getting information about alerts, with the possibility of getting them grouped per asset group or threat, and with all the additional behavioural context contained in the security events.

API capabilities example.png

Figure 1: Global threat alerts REST API has both reading and configuring capabilities.

 

The API is not read-only; users are allowed to change the configuration of their global threat alerts environment.For example, you can increase the specific business value of a critical asset group or change the severity assigned to a threat.

 

All visible data in the global threat alerts dashboard is now available through the REST API

 

 

Stream all your alerts to a centralized SIEM

If you have a Security Information and Event Management (SIEM) solution in your network, now you can leverage the new REST API to pull alerts and all the relevant KPIs from global threat alerts into your SIEM.

In order to facilitate the collection of data, we have prepared extensive documentation and a couple of scripts that will make your life easier. One of them is aimed at automating the pulling of events to your Splunk SIEM, and the other will retrieve and renew the necessary token to authenticate securely in order to use the APIs. You can see all of them on Cisco Security GitHub.

splunk dashboard.png

Figure 2: Now you can customize your SIEM dashboards with all the information from global threat alerts.

 

Many possible use cases, one API

 Main use cases include:

  • Export all event and behaviour context to your SIEM
  • Make programmatic changes to threat/asset groups priorities
  • Update alert details: state/notes
  • Trigger automation/remediation workflows in your organization (for example, from SecureX)

 

Conclusion

Being able to access all the detections and behavioral context from global threat alerts through the REST API is very valuable; it opens up many possibilities for automation, correlation of the data, and exporting of this information to a centralized SIEM.

You can start using the global threat alerts REST API today. See all the capabilities and first steps that you need to complete on our REST API documentation site.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: