LogRhythm SOAR Ecosystem November 2021
LogRhythm SOAR Ecosystem November 2021
Disclaimer
The information contained in this document is subject to change without notice. LogRhythm, Inc. makes
no warranty of any kind with respect to this information. LogRhythm, Inc. specifically disclaims the
implied warranty of merchantability and fitness for a particular purpose. LogRhythm, Inc. shall not be
liable for any direct, indirect, incidental, consequential, or other damages alleged in connection with the
furnishing or use of this information.
Trademark
LogRhythm is a registered trademark of LogRhythm, Inc. All other company or product names mentioned
may be trademarks, registered trademarks, or service marks of their respective holders.
LogRhythm Inc.
4780 Pearl East Circle
Boulder, CO 80301
(303) 413-8745
www.logrhythm.com
At LogRhythm, we believe in empowering a culture of success — for you and for your business. Our
platform is designed by security professionals who understand how complicated your job is. This laser
focus on security translates into targeted innovation that gives your team solutions that help reduce the
challenges and complexities your team faces every day.
In our world, threats don’t stop, and they’re constantly changing. Our LogRhythm Labs team continually
provides research and relevant content updates that help to protect your organization from the latest-
breaking threat.
From R&D to customer success, we see ourselves as a partner in your fight against cyberthreats. It’s one
of our core values as a company.
Threat Lifecycle Management is the fundamental workflow of an effective security operations center
(SOC). This series of aligned SecOps capabilities and processes gives your team holistic visibility of your
IT and OT environments so you can quickly detect, mitigate, and recover from a security incident.
LogRhythm delivers Threat Lifecycle Management by bringing together traditionally disparate
capabilities into one unified platform. With LogRhythm, your team has a single UI where they can
evaluate alarms, investigate threats, and respond to incidents.
NextGen SIEM
Our NextGen SIEM solution operates as your team’s central nervous system to alert on threats and enact
countermeasures — all in real time. With LogRhythm, your team will detect and respond to threats
measurably faster.
Compliance
LogRhythm helps you address unique compliance challenges with preconfigured compliance automation
modules that address regulatory frameworks such as GDPR, SOX, PCI-DSS, HIPAA, and many more.
1. SRP - Extra This action queries a .csv data A user accesses many
Context source to return contextual data on potentially sensitive files,
any value you define. Any type of but this user’s role is
data can be entered, as long as it unclear, as it is not
exists in the data source. The result defined within Active
can help reveal additional Directory. Because you
information on a value that would have this user’s user
not otherwise be captured in the name, you access an HR
SIEM. spreadsheet that provides
information about the
user’s employee status
and role to gain further
insight into whether the
user’s activity is
legitimate
1. SRP - This action queries In the course of
HaveIBeenPwned HaveIBeenPwned.com to investigating a user
determine whether a given credential
email address or user account compromise, it is
name is associated with any determined that the
breached websites user used the same
password internally
as on external
websites. A quick
lookup determines
the source of the
credential
compromise and the
extent of the user’s
compromise
1. SRP - Cisco Determine the proper Stealthwatch This action queries the
Stealthwatch Domain ID numbers for use in a Stealthwatch API for all
“Top” Stealthwatch query Domain ID numbers that
exist on the Stealthwatch
deployment, returning a
Each SmartResponse Plugin can list of all Domain ID
have one or more actions. This numbers. A Domain ID
plugin contains the following number is a required
actions: parameter for all plugin
actions, with the
• Get Domains Map exception of Get
• Get Host Groups Map Domains Map and Get
• Top Applications Host Groups Map.
• Top Conversations
• Top Hosts
• Top Peers
• Top Ports
• Top Services
1. SRP - Freq.py This action calculates the entropy Determine the entropy of
of the target string using the a file name, URL,
“English, lower-case” frequency account name, or other
table provided by Freq.py. This string encountered
action is recommended for strings during an investigation
that contain only lower-case
characters.
• Automatic/Remediation. Executed
as the result of an Alarm action
(ARM or AI Engine)
1. SRP - Cisco This action queries the OpenDNS An internal host is
Umbrella Investigate API to return contextual communicating with an
data about a domain name or IP unknown external host.
(OpenDNS)
address. Data returned contains Using this plugin, an
information such as associated IP analyst determines if the
addresses and domain names, external host is malicious
content categorization, and whether and finds associated IP
the item has been classified as addresses and domains to
malicious. This action can add the
1. SRP - Update List This action adds an item or comma- In the course of a
separated list of items to a list. matched Alarm Rule
Comma-separated lists are added as criteria, an analyst
separate entities. performs a quick lookup
for a list. Items are
checked for existence
and are then added to a
list
1. SRP - Beyond Trust This action creates and launches a After matching Alarm
scan against a specified host Rule criteria, an analyst
creates and launches a
vulnerability scan against
a target host.
• Disable Azure AD
Account
• Display Azure AD
Account Info
• Enable Azure AD
Account
• Reset Password for
Azure AD Account
1. SRP - Shodan
Supports the following
actions:
• API Info
o Returns the
current API usage
and remaining
queries available
• Host Info
o Returns the host
information
based on Shodan
observations.
o Enumerates all
services.
o Inspects SSL
certificates and
notates expired,
self-signed, and
Let's Encrypt
observations.
• Request Scan
• Create ServiceNow
Incident
• Get ServiceNow Incident
• Close ServiceNow
Incident
• ServiceNow Incident:
Add Comment
• ServiceNow Incident:
Add Work Note
• ServiceNow Incident to
LogRhythm Case
• LogRhythm Case to
ServiceNow Incident
• ServiceNow Table Query
• Account History
• Disable User
• Enable User
• Force Credential Change
• Lower Account Security
Policy
• Raise Account Security
Policy
• Search
o Initiates a Content
Search based on
the following
criteria
Sender
Recipient
Subject
Attachment
Name
• Purge
o Initiates a Content
SoftDelete based
on a previously
completed search
• Search & Purge
o Combines the
functionality of
actions Search
and Purge
• Create Incident
• List On-Call
• Run Response Play
• Add/remove
"quarantine=true"
attribute to endpoint
given an IP address
• Add/remove
"quarantine=true"
attribute to endpoint
given a MAC address
• Add/remove
"quarantine=true"
attribute to endpoint(s)
associated with a
username
• Block Host
• Create Meraki
Configuration File
• Disable Switch Port
• Display Host
Information
• Display Network List
• Enable Switch Port
• Set Host Policy
• Unblock Host
1. SRP - VirusTotal
V2 VirusTotal SmartResponse
Plugin V2 uses the VirusTotal
API to scan domains, file
hashes, IP addresses, and
URLs for malicious content and
generate reports to help guide
follow-up actions.
This plugin contains the
following actions:
• Create VirusTotal
Configuration File
• Get Domain Report
• Get File Hash Report
• Get IP Report
• Get URL Report
• Create Demisto
Configuration File
• Create New Incident
• Azure Configuration
• Block IP
• Deallocate VM
• Delete NSG Rule
• Dismiss Security Alert
• Get Resource Details
• Restart VM
• Snapshot VM
• Start VM
• Stop VM
1. SRP - Carbon
Black Defense This plugin contains the
following actions:
• Create CB LiveOps
Configuration File
• Create Policy
• Delete File
• Device Status
• Directory List
• Dump Memory
• Get File
• Kill Process
• Process List
• Quarantine Device
Requirements:
SEPM Server IP/Name
Admin user username and
password
Actions:
1. Remote command
execution
2. Better Logging of SRP
output (Understands
some time LR won’t
keep whole output.)
• Create GCP
Configuration File
• Get Resource Details
• Stop VM
• Create G Suite
Configuration File
• Disable User
• Get User Information
• Permanently Delete Mail
• Reset Password
• Trash Mail
• Get IP Information
• Block IP
• Create AWS EC2
Configuration File
• Get EC2 Instance Details
• Remove EC2 Instance
• Restart EC2 Instance
• SnapShot EC2 Instance
• Start EC2 Instance
• Stop EC2 Instance
Notes:
1. SRP - Carbon
Black Defense This plugin contains the
following actions:
• Create CB LiveOps
Configuration File
• Delete File
• Device Status
• Directory List
• Dump Memory
• Get File
• Kill Process
• Process List
• Create Siemplify
Configuration File
• Create Siemplify Case
• Close Siemplify Case
• Raise Incident
• Create Case
• Create Cisco SecureX V1
Configuration File
• Create Incident
• View Incident(s)
• Create GPO
Configuration File
• Get GPO Information
• Data Masking for GUID
• Add Item
• Add URL in Web Control
Policy
• Block Item
• Create Sophos Central
V1 Configuration file
• List Endpoints
• Start Scan on Endpoint
1. SRP – Pulse
Secure This plugin contains the
following actions: