LogRhythm

Updated 3 months ago by Elvis Hovor

Introduction

TruSTAR is a threat intelligence platform designed to accelerate incident analysis process and exchange of intelligence among various internal and external teams. This document provides a description how to utilize LogRhythm’s Threat Intelligence Service to collect Indicators of Compromise (IOC) data from TruSTAR and make it available for analysis in LogRhythm.

Workflow Illustration

Prerequisites

This integration requires LogRhythm Threat Intelligence Service and the LogRhythm Threat Intelligence Module. Please refer to LogRhythm’s Threat Intelligence Service User Guide for additional information on how to configure these modules. The Threat Intelligence Service installer can be downloaded from the LogRhythm Support portal and further information can also be found on the Support portal.

Overview

The LogRhythm Threat Intelligence Service supports integration with any threat intelligence provider that is STIX/TAXII compliant and is discoverable through a TAXII service endpoint. TruSTAR utilizes this feature of LogRhythm to let LogRhythm users take full advantage of TruSTAR’s high quality threat data.

Configure TruSTAR Integration

After you have installed and configured the connection between LogRhythm Threat Intelligence Service Manager and LogRhythm you will need to follow these steps on the Threat Intelligence Service Manager:

  1. Ensure the service has been started by clicking on the Start Service link at the top.
  2. Click on Add STIX/TAXII Provider button.
  3. You will see this screen
  4. Fill the form with the following details:

    • TAXII Collection Endpoint: https://taxii.trustar.co/services/collection-management
    • Username: This is your API Authentication Key available on TruSTAR station. Click here to get it: https://station.trustar.co/settings/api
    • Password: This is your API Secret available on TruSTAR station. Click here to get it: https://station.trustar.co/settings/api
    • Certificate Authentication: Leave unchecked and ignore Certificate Password and Certificate Path.
  5. Threat Provider Name:  TruSTAR Threat Intel (you can use any name your of choice.)

  6. Click on Test button. You should see the following pop up
  7. Click on OK and then Save.
  8. You will see “TruSTAR Threat Intel” in the left hand side list. In the main portion of the app you should see 9 different feeds. NOTE: Not all of these can be consumed by LogRhythm. See next step to enable specific feeds.
  9. Check the Enabled box. This will automatically enable all feeds. Deselect the feeds that are not relevant to your LogRhythm correlation rules and investigation processes.
  10. Click on the Test button. You should a pop up with the message Test connection is successful. Click on OK button.

  11. You can configure the “Download every” and “First Run at” parameters based on your operational requirements.
  12. Click on Save button. You will the following pop up message. Click on OK button.

Please reach out to support@trustar.co for any additional questions.


How Did We Do?