ServiceNow v1.1.0 Install

Updated 3 weeks ago by Elvis Hovor

This document explains how to install and configure the TruSTAR plug-in for ServiceNow v1.1.0 (Madrid and London releases). This process usually takes about 15-20 minutes, including configuration.

Terms

  • Station: The TruSTAR threat intelligence management SAAS platform. 
  • Enclaves: Data repositories in the Station platform. Each data source imported by Station resides in its own enclave. For more information on Enclaves, see "What is an enclave."
  • Observable: Artifacts found on a network or operating system that indicate a likely intrusion. Typical observables are virus signatures, IP addresses, MD5 hashes of malware files, URLs, or domain names. 
  • IOC: Indicator of Compromise. Another term for Observables.

Requirements

The TruSTAR plug-in works with ServiceNow version London or higher. 

You need to have the following ServiceNow components activated to submit incidents to TruSTAR Station: 

  • ServiceNow Incident Management version 1.0.0 or higher
  • ServiceNow Threat Core version 4.0.25 or higher

To submit Security Incident Response (SIR) incidents to TruSTAR, you must have this plug-in: 

  • ServiceNow Security Incident Response version 4.0.25 or higher. 

To use the TruSTAR Threat Lookup and Observable Enrichment features, you must have this plug-in:

  • ServiceNow Threat Intelligence

ServiceNow User Guide

ServiceNow FAQ

Installation Options

The TruSTAR plugin for ServiceNow is certified for the Madrid and London versions only. 

  • To install directly from the ServiceNow store, you must be using either the Madrid or London version of the product. 
  • For all other versions, please follow the Manual Installation process in the FAQ.

Installing the TruSTAR Integration

The TruSTAR integration is available in the ServiceNow app store for download. 

  1. Log into the ServiceNow store with HI credentials.
  2. Search for TruSTAR Integration for ServiceNow
  3. Select the TruSTAR integration and click Get
  4. Accept any license terms and select the instance where the integration will be installed.
  5. Log in to the instance where you want to install the application.
  6. Navigate to System Applications > Applications.
  7. Select the Downloads tab.
  8. Locate the TruSTAR Integration, select it, and click Install. 

Configuring the TruSTAR Integration

This section describes how to configure these areas:

  • User Roles
  • Core Application Parameters
  • Threat Lookup Parameters
  • Observable Enrichment Parameters

User Roles in London 

In the London version, you need to add Custom Role settings to the Application Role:

  1. Log into ServiceNow as Admin and then go to User Administration on the left menu.
  2. Select Roles.
  3. Select the role x_tstar_trustar.TruSTARAppAdmin.
  4. Select Edit in the Contains Roles table.
  5. Add these roles to x_tstar_trustar.TruSTARAppAdmin:
    1. itil
    2. sn_si.analyst
    3. sn_si.read
    4. sn_sec_core.read_dictionary
    5. x_tstar_trustar.TruSTARAppAdmin

You now see that the x_tstar_trustar.TruSTARAppAdmin role now has System Roles assigned to it.

User Roles in Madrid 

In the Madrid version, you need to create a new user and then add roles to that user. 

  1. Log into ServiceNow as Admin and then go to User Administration on the left menu.
  2. Select Users.
  3. Create a new user ID, for example trustar_admin.
  1. Open the user you just created and click Edit.
  2. Assign the following roles to that new user:
  • Itil
  • sn_si.analyst
  • sn_si.read
  • Sn_sec_core.read_dictionary
  • x_tstar_trustar.TruSTARAppAdmin
  1. Click Update in the top right corner to finish the user configuration.

Setting Core Parameters 

This section explains how to set up the core parameters for the TruSTAR plug-in. There are five areas you can configure: the main area at the top and four tabs near the bottom. After you finish editing the parameters, you must click the Update Configuration button to save your changes. 

  1. Log into ServiceNow using the Admin role.
  2. Select Configuration on the left menu.
  3. Select Settings. You now see the Settings displayed. 
  1. In the main area on the right side, enter the parameters as described in the table below. 

Parameter

Required

Description

Endpoint

Yes

The TruSTAR station URL from which data is collected by executing API calls. Set this parameter to https://station.trustar.co 

Access Key

Yes

Used to make API calls. You can find this Key in the TruSTAR Station web interface under Settings-> API. How to find your API Key

Secret Key

Yes

Used when making API calls. Available under Settings-> API on TruSTAR Station. How to find your API Secret Key

Report Submission Enclave IDs

Yes

The enclave(s) to import data from. Specify the Enclave ID (alphanumeric id next to enclave name in TruSTAR Station).To import data from multiple enclaves, separate each enclave ID with a comma and no spaces:

Retrieving your Enclave IDs

Indicator Search Enclave IDs

No

The Enclave ID(s) that you want the Application to search indicators from. If left blank, the search will include indicators from all Enclaves you have access to on TruSTAR.To specify multiple enclaves, separate each enclave ID with a comma and no spaces:

Enrichment Retention Period (days)

No

Number of days after which the Observable can be updated by TruSTAR enrichment.

  1. On the Auto Submission tab, you can edit these parameters: 

Parameter

Required

Description

Incident

No

When checked, automatically submits a report to TruSTAR Station when an Incident is created and returns information from Station.

Security Incident

No

When checked, automatically submits a report to TruSTAR Station when a Security Incident is created and returns information from Station, including Threat Lookup and Observable Enrichment.Note: This parameter is only available If you have the ServiceNow Security Incident Response plug-in. 

  1. On the Configure Report Body tab, you can edit these parameters: 

Parameter

Required

Description

Share Close Code and Close Notes

No

When checked, these notes are added when reports are submitted to TruSTAR or when the Incident or Security Incident is closed. 

Security Incident Fields

No

Configure the fields to include in the body of a Security Incident when the report is sent to TruSTAR.Best practice is to include the Short Description and Description categories.Note: This parameter is only available If you have the ServiceNow Security Incident Response plug-in. 

Incident Fields

No

Configure the fields to include in the body of an Incident when the report is sent to TruSTAR.

Best practice is to include the Description category. 

  1. On the Exclude Categories tab, you can choose categories to exclude from a report to TruSTAR.

  1. On the Security Operation Configuration tab, you can edit two parameters.
This tab only available if you have activated the ServiceNow Threat Intelligence plug-in.

Parameter

Required

Description

Threat Lookup

No

When checked, enables Threat Lookup operations, either automatically or manually. Threat lookups can include files, hash values, URLs, and IP addresses. 

Best practice is to select this checkbox only if you have not selected auto-submission of incidents or security incident.

Observable Enrichment

No

When checked, enables you to perform Observable Enrichment operations, either automatically or manually. 

Best practice is to select this checkbox as an alternative if auto submission of incident or security incident is not selected.

  1. When you have finished configuring the parameters, click Update Configuration.

Best Practices

To automatically fetch enrichment from  TruSTAR, check the Incident or Security Incident parameter on the Auto Submission tab. 

If you choose to not use the Auto Submission parameters, you can perform threat lookups and observable enrichment by checking the Threat Lookup and Observable Enrichment parameters on the Security Operations tab or by manually performing submission and enrichment actions as explained in the User Guide.


How Did We Do?