The AlienApp for Check Point provides a set of orchestration actions that you can use to identify and categorize items to send to your firewallVirtual or physical device designed to defend against unauthorized access to data, resources, or a private network. A firewall’s primary purpose is to create segregation between two or more network resources, blocking undesirable traffic between them. as a response to threats identified by USM Anywhere.
As USM Anywhere surfaces eventsAny traffic or data exchange detected by AT&T Cybersecurity products through a sensor, or through external devices such as a firewall., vulnerabilities, and alarmsAlarms provide notification of an event or sequence of events that require attention or investigation., your team determines which items require a response action. Rather than manually tagging threats, you can use the AlienApp for Check Point orchestration actions to enforce protection based on the information associated with the event or alarm. The following table lists the available actions from the AlienApp.
Add a threat indicator using a destination IP address
|Add a threat indicator using a source IP address|
Add a threat indicator using a destination domain
Add a threat indicator using a source domain
Add a threat indicator using a file hash
|Add a threat indicator using a URL|
|Tag a destination IP address from an alarm, event, or rule in the user interface (UI)|
|Tag a source IP address from an alarm, event, or rule in the UI|
To view information about these actions in USM Anywhere
- In USM Anywhere, go to Data Sources > AlienApps.
- Click the Available Apps tab.
- Search for the AlienApp, and then click the tile.
- Click the Actions tab to display information for the supported actions.
- Click the History tab to display information about the executed orchestration actions.