Cisco AMP Cloud V0
What is Discovered and Monitored
Protocol | Logs Collected | Used For |
---|---|---|
CloudAMP API | End point malware activity | Security Monitoring |
Event Types
In ADMIN > Device Support > Event, search for "Cisco FireAMP Cloud" in the Search column to see the event types associated with this device.
Configuration
Configure Cisco AMP Cloud V0
- Login in https://auth.amp.cisco.com/.
- Click Accounts-> API Credentials.
- Click New API Credential.
- Input Application name and click Create.
- Record the API Client ID and API key. You will need them in a later step.
Create Credentials in FortiSIEM
- Log in to the FortiSIEM Supervisor node.
- Go to ADMIN> Setup > Credentials.
- Click Add to create a new credential.
- Set Device Type to Cisco FireAMP Cloud.
- Set Password config to Manual.
- Set Client ID to CiscoAMP Client ID.
- Set Client Secret to CiscoAMP API Key.
- Click Save.
Test Connectivity and Event Pulling
- Log in to the FortiSIEM Supervisor node.
- Go to ADMIN> Setup > IP to Credential Mapping.
- Click Add to create a new mapping.
- For Name/IP/IP Range, enter api.amp.cisco.com.
- For Credentials use the credentials you created in Create FireAMP credentials in FortiSIEM.
- Click Save
- Go to Admin > Credentials, select the credential, and run Test Connectivity.
The result is a success.
- Go to Admin > Pull Events. An entry will appear in the Event Pulling table. That means events are being pulled.
- Go to the Analytics page to see the events.
Sample Events
[FireAMP_Cloud_Threat_Detected]:[eventSeverity]=PHL_CRITICAL, [connectorGUID]=12345,[date]=2015-11- 25T19:17:39+00:00,[detection]=W32.DFC.MalParent, [detectionId]=6159251516445163587,[eventId]=6159251516445163587, [eventType]=Threat Detected,[eventTypeId]=1090519054, [fileDispostion]=Malicious,[fileName]=rjtsbks.exe, [fileSHA256]=3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370,