FireEye Trellix Helix

FireEye Trellix Helix

API creation and configuration

  1. On the Helix Homepage click on the Profile and Identity Access Management Console

  2. On the IAM page move under “API Keys” and Create a new API Key

  3. Check “API Key with entitlements”, with expiry of 1 year and as Products “Threat Analytics Platform” >

  4. For the entitlements select “tap.alerts.browse”, “tap.alerts.read”, “tap.alerts.edit” >

  5. Copy the API Key to the RedCarbon integrations page >

Mapping

Classification

RC Alert Logic IDDescriptionRC ClassificationNotes
H-1A
H-2AOFFICE 365 ANALYTICS [Abnormal Logon]office_365_analytics
H-3AOFFICE 365 ANALYTICS [Consent To Application With Offline Access]office_365_analytics
H-4AOFFICE 365 [User Added Credentials to Service Principal]office_365
H-5AOFFICE 365 [Mail Forward Attempt]office_365
H-6AOFFICE 365 ANALYTICS [Inbox Rule Delete]office_365_analytics
H-7AOFFICE 365 ANALYTICS [Inbox Rule Mail Forward]office_365_analytics
H-8AOFFICE 365 ANALYTICS [Brute Force Success]office_365_analyticsWINDOWS ANALYTICS [Brute Force Success] it is correlated?
H-9AOFFICE 365 [Brute Force Attempt by IP]office_365_analytics
H-10AOFFICE 365 METHODOLOGY [Strong Authentication Disabled]office_365_methodology
H-11AOFFICE 365 [Malware Detected]office_365
H-12AOFFICE 365 [Suspicious File Type Uploaded]office_365
H-13AOFFICE 365 [Multiple Secure Links Created/Used]office_365
H-14AOFFICE 365 [Tor Authenticated Activity]office_365
H-15AVPN ANALYTICS [Abnormal Logon]vpn_analytics
H-16AFIREEYE NX ALERT [SmartVision-Event]fireeye_nx_alert
H-17AWINDOWS METHODOLOGY [Group Add - Administrators]WINDOWS METHODOLOGY [Group Add - Domains Admins]windows_methodology
H-18AOFFICE365 [Tor Failed Logon]office_365
H-19AWINDOWS ANALYTICS [Brute Force Success]windows_analytics

Other Open Points

  • Currently, we do not handle the type OFFICE 365 [Multiple Owner Changed From Same User] but it is used inside the platform.

Severity

OriginalRC SeverityRebased
low105
medium4020
high7035
critical9045
DEFAULT4020