Am I reading the correct user guide?
Am I reading the correct user guide?
Some connectors on the Vulcan help center offer multiple user guides tailored to different setups and versions.
To open the correct user guide for your setup and version, go to the connector's setup page and click How to connect.
Connector details
About Cortex XDR
Cortex XDR is a detection and response app that natively integrates network, endpoint, and cloud data to stop sophisticated attacks. It accurately detects threats with behavioral analytics and reveals the root cause to speed up investigations.
Support scope
Supported products | |
Category | Endpoint Security |
Ingestion type | Assets and vulnerabilities |
Ingested asset type(s) | Hosts Cloud Resources |
Integration type | UNI directional (data is transferred from the Connector to the Vulcan Platform in one direction) |
Supported version and type | SaaS (latest) |
Connector Setup
Prerequisites and user permissions
Before you begin configuring the Connector, make sure you have the following:
Cortex XDR Pro per Endpoint license is needed to run the integration.
Corted XDR credentials:
FQDN
API Key
API ID
Generating FQDN, API, and ID Keys
Follow the instructions at: Get Started with Cortex XDR APIs
Configuring the Cortex XDR connector
Login to the Vulcan ExposureOS platform and go to Connectors > Add a Connector.
Click on the Cortex XDR icon.
Set up the Connector as follows:
If a gateway is required, refer to the Vulcan Gateway guide to configure the gateway before proceeding. If not, continue following the steps in this guide.
Enter the FQDN, API key, and API ID you generated earlier.
Data pulling configuration:
This configuration has dynamic settings tailored to the specific connector and integration type. Below are the configurations relevant to this connector.
Asset Retention: Configure the retention period for inactive assets based on their last seen date. If an asset has not been detected or updated in a scan within the specified days, it will be automatically removed from the Vulcan ExposureOS platform. This ensures your asset inventory stays current and relevant.
Example:
Click the Test Connectivity button to verify that Vulcan Cyber can connect to your Cortex XDR instance.
Notes:
A successful connectivity test confirms that the platform can connect to the Cortex XDR instance. However, it does not guarantee that the synchronization process will succeed, as additional syncing or processing issues may arise.
Example:If the connectivity test fails, an error message with details about the issue will appear. Click the arrow next to the error message for more information about the exact error.
Example:
Connector scheduling: Set the connector's sync time and days. By default, all days are selected.
Click Create to start syncing the new connector, or Save Changes if editing an existing connector.
Allow some time for the sync to complete. Then, you can review the sync status on the Connectors main page or under Connector sync logs on the connector's specific setup page.
To confirm the sync is complete, navigate to the Connectors page. The sync is complete once the Cortex XDR icon shows Connected.
Example:
Cortex XDR in the Vulcan platform
Viewing findings
To view findings (instances) ingested by the Cortex XDR connector:
Go to the Findings page.
Click on Filter and set the condition to Vulnerability > Source > is > Cortex XDR.
Example:
You can also:
Filter by Business Group and add more filters to narrow your search further.
Filter by Connector-specific parameters (also known as Native Parameters) if available.
Click on a finding for more details.
Viewing vulnerabilities
To view vulnerabilities ingested by the Cortex XDR connector:
Go to the Vulnerabilities page.
Click on Filter and set the condition to Vulnerability > Source > is > Cortex XDR.
Example:
You can also:
Filter by Business Group and add more filters to narrow your search further.
Filter by Connector-specific parameters (also known as Native Parameters) if available.
Click on a vulnerability for more details.
Viewing assets
To view assets ingested by the Cortex XDR connector:
Go to the Assets page.
Click on Filter and set the condition to Asset > Source > is > Cortex XDR.
Example:
You can also:
Filter by Business Group and add more filters to narrow your search further.
Filter by Connector-specific parameters (also known as Native Parameters) if available.
Click on an asset for more details.
Taking action on vulnerabilities and assets
To take remediation action on vulnerabilities and assets ingested by Cortex XDR:
Go to the Vulnerabilities or Assets Page.
Use the Filter to view the assets/vulnerabilities by source. You can always filter by Business Group and add more filters to narrow your search.
Select the relevant vulnerabilities/assets from the results list.
Click on Take Action to proceed with remediation or further actions.
Example:
Automating remediation actions on vulnerabilities
Use Vulcan Playbooks to create automation and remediate vulnerabilities at scale.
Data Mapping
The Vulcan Platform integrates with Cortex XDR through an API that pulls relevant vulnerability and asset data and maps it to the platform's pages and fields. The vulnerabilities and/or assets data is ingested from the vendor platform and mapped into the Vulcan ExposureOs platform.
Host data mapping
Asset data
Cortex XDR UI field | Cortex XDR API field | Vulcan field |
Asset name | endpoint_name | Asset Uniqueness criteria |
endpoint_id | endpoint_id | Cloud ID cloud_instance_id |
Asset name | endpoint_name | Host Name (hostname) |
Operating system | operating_system | Host OS (os) |
os version | os_version | Host OS Version (os_version) |
IP Address | ip | Host IP (ip ) |
- | public_ip | Host external IP (ip ) |
- | domain | Host FQDN (fqdn, if list fqdns) |
MAC Address | mac_address | Host MAC addresses (mac_address) |
First observed | first_seen | Host first Seen (first_seen) |
Last observed | last_seen | Host Last report (last_seen) |
external ip" | public_ip os_type users | Host details (added_data)
|
tags | tags | Host Tags - Vendor’s tags (tags) |
Unique vulnerability data
Cortex XDR UI field | Cortex XDR API field | Vulcan field |
- | cve_id | Unique Vulnerability uniqueness criteria |
CVE / Title if available | name | Vulnerability title (title) |
Severity score | severity_score | Vulnerability score (cvss_score) |
Description | description | Vulnerability description (description) |
Type (Application/ Operating system) | type os_type publication_date modification_date | Vulnerability details (added_data) |
CVE | name | CVE/S (report_item_cve) |
Finding data (asset-instance connection)
Cortex XDR UI field | Cortex XDR API field | Vulcan field |
- | endpoint_name, | Vulnerability instance uniqueness criteria |
Vulnerability status mapping
Findings (instances) ingested from connectors are mapped into the Vulcan platform by status.
Cortex XDR status | Vulcan status |
In Cortex XDR, connections/findings do not include a specific status. Consequently, upon integration with Vulcan, all connections are ingested as vulnerable. | Vulnerable |
The statuses are mapped into the Findings page > Show <status> view:
Vulnerability score mapping
Risk scores ingested from connectors are converted into numeric scores and mapped into the Vulcan platform risk score field, eventually impacting the contextualized risk calculation.
Based on the
SCORE
field
Cortex XDR score | Vulcan score |
Critical | 10 |
High | 7 |
Medium | 5 |
Low | 3 |
- | 0 |
The scores are mapped into the Score field of the Vulnerability details:
Status update Mechanisms
Every day, the Vulcan Platform syncs with the vendor's platform to receive updates on existing vulnerabilities and assets and to retrieve new ones.
The table below lists how the status update mechanism works in the <X Connector> for the vulnerabilities and assets in the Vulcan Platform.
Status change | When? |
The asset is archived | - Asset not found on the connector's last sync - Asset not seen for X days according to "Last Seen" |
The vulnerability instance status changes to "Fixed" | - If the vulnerability no longer appears in the scan findings |
Note: Asset or vulnerability updates on the vendor side are reflected on the Vulcan Platform only on the next scheduled connector sync (the next day).
API endpoints in use
API | Use in Vulcan | Permission required |
Get the asset count and the assets themself. | Cortex XDR Pro per Endpoint license | |
Get vulnerabilities and findings. | Cortex XDR Pro per Endpoint license |
Data Validation
This section shows how to validate and compare data between Vulcan ExposureOS and the Cortex XDR platform.
Matching Asset Count
Objective: Ensure the number of endpoints (assets) in Cortex XDR aligns with the assets displayed in Vulcan.
In Cortex XDR:
Go to the All Endpoints section where all endpoints are listed. These endpoints represent the assets that should be ingested into Vulcan.
Example:
In Vulcan:
Go to Assets and filter by connector (Set
Where → Asset → Connector
to Cortex XDR).
The filtered list in Vulcan should match the number of endpoints in Cortex XDR.
Example:
Validations if an asset is not present in Vulcan:
Archive by date: Ensure the asset is not archived in Vulcan based on an outdated last-seen date.
Archive by status: If the asset is no longer present or valid, confirm that it was removed or deleted.
Data pulling configuration: Verify that the relevant data-pulling configurations are correctly set on the connectors setup page. Make sure to click Save Changes if you modify the connector's setup.
Matching vulnerabilities count
Objective: Ensure the number of unique vulnerabilities in Cortex XDR aligns with Vulcan’s unique vulnerabilities.
In Cortex XDR:
Go to All Assets > Vulnerability Assessment.
Example:
In Vulcan:
Go to Vulnerabilities and filter by connector (Set
Where → Vulnerability → Source
to Cortex XDR).
Example:
Validations if vulnerability is not present in Vulcan:
No asset has this vulnerability: Check if the vulnerability is tied to an asset in Cortex XDR that exists in Vulcan.
Matching findings (instances) count
Objective: Ensure the total number of vulnerability instances (findings) between Cortex XDR and Vulcan is consistent.
Note: There's currently no straightforward way to confirm that an asset-vulnerability connection is aligned in the Cortex XDR platform. The only resource available is a vulnerability table, where each vulnerability includes a field labeled Affected Endpoints, listing the assets impacted by that vulnerability. To verify the numbers are consistent, users must count the assets under each vulnerability and sum them manually. Cortex XDR does not explicitly display the total number of asset-vulnerability connections (findings).
In Cortex XDR:
Go to All Assets > Vulnerability Assessment.
For each vulnerability, look for the Affected Endpoints field, which displays all the endpoints associated with that specific vulnerability.
Example:
In Vulcan:
Go to Findings and filter by connector (Set
Where → Asset → Connector
to Xortex XDR).Compare the findings to Cortex XDR vulnerability-asset connections. There should be a match between the two platforms.
Example:
Possible discrepancies:
Fix or Resolution: If a vulnerability instance is fixed in Cortex XDR, you should see it on Vulcan’s Fixed screen.