Document toolboxDocument toolbox

Symantec Endpoint Detection and Response (EDR)

Symantec Endpoint Security (SES) Complete delivers comprehensive protection for all your traditional and mobile devices across the entire attack chain.

Connect Symantec EDR with Devo SOAR

  1. Navigate to Automations > Integrations.

  2. Search for Symantec EDR.

  3. Click Details, then the + icon. Enter the required information in the following fields.

  4. Label: Enter a connection name.

  5. Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.

  6. Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).

  7. Remote Agent: Run this integration using the Devo SOAR Remote Agent.

  8. Server URL: Server url for Symantec EDR. Example: 'https\://localhost:443'

  9. Client ID: Client ID of your Symantec EDR Host.

  10. Client Secret: Client Secret of your Symantec EDR Host.

  11. After you've entered all the details, click Connect.

Actions for Symantec EDR

Get Blacklist Policies

Lists blacklist policies from ATP. Search query can be used to get specific blacklist policies.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input Name

Description

Required

Input Name

Description

Required

Query

Jinja-templated text containing JSON formatted query of optional parameters (Default is to fetch 100000). Parameters are id, ip, url, domain, md5, sha256, next and limit.

 

Example:{\"ip\": \"{{ip}}\", \"url\": \"{{url}}\"}.

Required

 

Output

A JSON object containing multiple rows of result:

  • has_error: True/False

  • error: message/null

  • result: Policy Object

Create Blacklist Policies

Creates blacklist policies for blocking or monitoring external communications.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input Name

Description

Required

Input Name

Description

Required

Body

Jinja-templated text containing the body consists of a single json object that defines the blacklist policies to be created.

 

Example: {{body_column}}.

Required

 

Output

A JSON object containing multiple rows of result:

  • has_error: True/False

  • error: message/null

  • result: Policy Object

  • maximum_policy_limit: Maximum policy allowed

  • remaining_policy_limit: Remaining policy that can be created

Release Notes

  • v2.0.0 - Updated architecture to support IO via filesystem