USM Anywhere™

AlienApp for Carbon Black EDR Orchestration

With the AlienApp for Carbon Black EDR, USM Anywhere can send a request to Carbon Black EDR to isolate an endpoint instantly — through a user-executed action or an automated rule — to coordinate threat detection and response in a single action. The bidirectional capabilities of the AlienApp for Carbon Black EDR enable USM Anywhere to incorporate data from Carbon Black (see Collecting Logs from Carbon Black EDR) into its threat analysis and orchestrate response actions by passing compromised endpoints identified by USM Anywhere to Carbon Black EDR.

Important: Using the AlienApp for Carbon Black EDR orchestration actions require that the AlienApp is enabled on a deployed USM Anywhere Sensor with a configured integration to the Carbon Black EDR API. See Configuring the AlienApp for Carbon Black EDR for more information.

As USM Anywhere surfaces eventsAny traffic or data exchange detected by AT&T Cybersecurity products through a sensor, or through external devices such as a firewall. and alarmsAlarms provide notification of an event or sequence of events that require attention or investigation., your team determines which items require a response action from the AlienApp for Carbon Black EDR. Rather than manually isolating an affected endpoint within Carbon Black EDR, you can use the orchestration actions to respond to threats identified in the event or alarm. The following table lists the available actions from the AlienApp.

Actions for the AlienApp for Carbon Black EDR
Action Function

Isolate hosts from an alarm

Run this app action directly from an alarm to send a request to Carbon Black EDR to isolate the associated endpoint(s).

Isolate hosts from an orchestration rule

Run this app action in an orchestration rule to send a request to Carbon Black EDR to isolate the associated endpoint(s) for future events that trigger the rule.

To view information about these actions in USM Anywhere

  1. In USM Anywhere, go to Data Sources > AlienApps.
  2. Click the Available Apps tab.
  3. Search for the AlienApp, and then click the tile.
  4. Click the Actions tab to display information for the supported actions.
  5. Click the History tab to display information about the executed orchestration actions.