Sky Atp API Overview
Sky Atp API Overview
Sky Advanced Threat Prevention (Sky ATP) provides the following APIs that can help
you keep your network free of sophisticated malware and cyberattacks by using superior
cloud-based protection:
• Inject an IP, URL, or domain into a C&C feed with a threat level from 1 through 10. You
can create up to 30 different custom C&C feeds.
• Update the threat level of an IP, URL, or domain from 1 through 10.
• Retrieve the current status of an operation (processing) or errors (if any) from the feed
processing engine.
The Threat Intelligence API supports a Swagger API specification in JSON format to allow
programmatic access to it. For more information on the Swagger API specification, see
https://threat-api.sky.junipersecurity.net/swagger.json.
NOTE: C&C regular feeds currently support only HTTP host URLs. For
example, if you create www.example.com/example1/, it will check only
www.example.com.
Blacklist and whitelist feeds (see below) support full URLs with Junos OS
15.1X49-D70 and later releases.
C&C feed 60
Blacklist feed 60
Whitelist feed 60
To access the API, you must create an application token in the Sky ATP Web UI and use
that token as the bearer token in the authorization header.
1. Log in to the Sky ATP Web UI using your credentials. Select Administration > Application
Tokens and click the plus (+) sign. Fill in the name of the token and other required
details in the pop-up box that appears and click OK to create a new token. See Figure 1.
NOTE: You can generate a maximum of 10 tokens per user, and each token
is valid for one year.
For more information on how to create application tokens, see Creating Application Tokens.
Usage Examples
The following cURL examples illustrate the use of the threat intelligence API:
where:
• API HOST is the name of the Open API hostname corresponding to the location of the
customer portal. Please refer to Table 1 for the correct hostname for your location.
• TOKEN is the application token generated in the Sky ATP Web UI.
The Sky ATP API supports a Swagger API specification in JSON format to allow
programmatic access to it. For more information on the Swagger API specification, see
https://api.sky.junipersecurity.net/swagger.json.
The following table lists the rate limits (number of requests you can make per minute)
for the Sky ATP APIs. If you exceed these rate limits, you will receive a 429 - Too many
Requests error.
Hash lookup 50
File submissions 10
Blacklist 60
Whitelist 60
NOTE: Sky ATP supports up to 3,000 entries in the whitelist and 3,000 entires
in the blacklist.
To access the API, you must create an application token in the Sky ATP Web UI and use
that token as the bearer token in the authorization header. See section “Configuration
and Setup” on page 2 for more information on the creation of the token.
Sky ATP hostnames varies by location. Please refer to the following table:
Usage Example
The following cURL example illustrates the use of the Sky ATP API:
where:
• API HOST is the name of the Open API hostname corresponding to the location of the
customer portal. Please refer to Table 1 for the correct hostname for your location.
• TOKEN is the application token generated in the Sky ATP Web UI.
The file/hash API supports a Swagger API specification in JSON format to allow
programmatic access to it. For more information on the Swagger API specification, see
https://api.sky.junipersecurity.net/swagger.json.
To access the API, you must create an application token in the Sky ATP Web UI and use
that token as the bearer token in the authorization header. See section “Configuration
and Setup” on page 2 for more information on the creation of the token.
Usage Example
The following cURL example illustrates the use of the file/hash API:
NOTE: API HOST is the name of the Open API hostname corresponding to
the location of the customer portal. Please refer to Table 1 for the correct
hostname for your location.
where:
• TOKEN is the application token generated in the Sky ATP Web UI.
Full reports will be completely supported in an upcoming release. The report you receive
right now may slightly different in appearance and content.
Associated with the infected host feed are a whitelist and blacklist. These are different
from the generic Sky ATP whitelist and blacklist. The infected host feed uses these lists
to remove hosts that are currently on an infected host feed (whitelist) and to always list
a host in the infected host feed (blacklist.)
The infected host API supports a Swagger API specification in JSON format to allow
programmatic access to it. For more information on the Swagger API specification, see
https://api.sky.junipersecurity.net/swagger.json.
To access the API, you must create an application token in the Sky ATP Web UI and use
that token as the bearer token in the authorization header. See section “Configuration
and Setup” on page 2 for more information on the creation of the token.
The IP filter API supports a Swagger API specification in JSON format to allow
programmatic access to it. For more information on the Swagger API specification, see
https://api.sky.junipersecurity.net/swagger.json.
To access the API, you must create an application token in the Sky ATP Web UI and use
that token as the bearer token in the authorization header. See section “Configuration
and Setup” on page 2 for more information on the creation of the token.
Example
In this example, targeted attacked are being performed against web servers in a DMZ
while concealing their identities via Tor. Tor exit nodes move frequently and keeping an
up-to-date list of all 1000+ exit nodes within a firewall policy is almost impossible. This
can, however, be done easily using Sky ATP’s APIs. For more information on this example,
see Automating Cyber Threat Intelligence with Sky ATP.
• Polls the official TorProject's exit-node list via cURL and extracts legitimate IP
information via grep.
• Utilizes Sky ATP's open API to install and propagate third-party threat intelligence to
all SRX Series devices in the network.
• Runs on an hourly basis via cron to ensure that the active Tor Relays are always being
blocked.
#!/bin/bash
# Cleanup
rm $TorList
# Exit
Once the script has been run successfully, we can see that the latest Tor Nodes are being
blocked during an ICMP request below (feed-name=Tor_Exit_Nodes)
Modified: 2018-06-13