Stealthwatch SOAR Integration

Overview

This integration provides tools for interacting with Cisco Stealthwatch from within the Chronicle SOAR platform. It allows searching for security events and network flows associated with specific hosts or IP addresses, and testing connectivity.

Tools

stealthwatch_search_events

Get a host’s security events for a given time frame

Parameters:

  • case_id (str, required): The ID of the case.

  • alert_group_identifiers (List[str], required): Identifiers for the alert groups.

  • timeframe (str, required): Time frame in hours.

  • target_entities (List[TargetEntity], optional, default=[]): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (str, optional, default=“All entities”): Defines the scope for the action.

stealthwatch_ping

Test Connectivity

Parameters:

  • case_id (str, required): The ID of the case.

  • alert_group_identifiers (List[str], required): Identifiers for the alert groups.

  • target_entities (List[TargetEntity], optional, default=[]): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (str, optional, default=“All entities”): Defines the scope for the action.

stealthwatch_search_flows

Get flows by IP address for a given time frame

Parameters:

  • case_id (str, required): The ID of the case.

  • alert_group_identifiers (List[str], required): Identifiers for the alert groups.

  • timeframe (str, required): Time frame in hours(e.g: 3).

  • limit (str, required): The limit of the recieved flow.

  • target_entities (List[TargetEntity], optional, default=[]): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (str, optional, default=“All entities”): Defines the scope for the action.