Armis¶
About¶
Allows for reports over various periods of time to support everything from business intelligence and investment strategies to cyber intelligence and threat hunting.
Product Details¶
Vendor URL: ARMIS
Product Type: EDR
Product Tier: Tier III
Integration Method: SYSLOG
Parser Details¶
Log Format: JSON
Expected Normalization Rate: 95%
Data Label: ARMIS
UDM Fields (list of all UDM fields leveraged in the Parser):
Log File Field | UDM Field |
---|---|
activities.0.title | security_result.description |
activities.0.type | security_result.category_details |
auth_target | target.hostname |
auth_target | target.ip |
classification | security_result.category_details |
content | vulns.description |
decision_data.host | target.hostname |
decision_data.port | target.port |
decision_data.protocol | target.application |
displayTitle | principal.hostname |
id | metadata.product_log_id |
isAccessPoint | security_result.detection_fields |
isCorporate | security_result.detection_fields |
isEncrypted | security_result.detection_fields |
isNetworkBridge | security_result.detection_fields |
isSensor | security_result.detection_fields |
isShadowNetwork | security_result.detection_fields |
isUnencrypted | security_result.detection_fields |
policy.actionType | security_result.severity |
policy.owner | observer.hostname |
policy.rules | security_result.about.labels Rules |
relatedDevices.0.category | principal.asset.category |
relatedDevices.0.ip | principal.ip |
relatedDevices.0.model | principal.asset.hardware |
relatedDevices.0.user | principal.user.userid |
riskLevel | security_result.severity_details |
status | security_result.outcomes |
title | security_result.summary |
type | metadata.product_event_type |
Product Event Types¶
Event | UDM Event Classification |
---|---|
Generic | GENERIC_EVENT |
Log Sample¶
<14>1 2023-12-10T04:24:43.884625+00:00 armisappliance8153 armis 1 - - {"id": 1234, "type": "SYSTEM_POLICY_VIOLATION", "_time": "2023-12-10T04:25:01.589+00:00", "title": "AWS Assets without EPP/EDR Agent", "policy": {"actionParams": {"title": "AWS Assets without EPP/EDR Agent", "alertDescription": "Cloud Assets without EPP/EDR agent installed. You can always edit policy conditions once added to be specific for your available EPP/EDR.", "alertClassificationId": 1, "timeBack": null, "emailRecipients": ""}, "actions": [{"actionParams": {"title": "AWS Assets without EPP/EDR Agent", "alertDescription": "Cloud Assets without EPP/EDR agent installed. You can always edit policy conditions once added to be specific for your available EPP/EDR.", "alertClassificationId": 1, "timeBack": null, "emailRecipients": ""}, "actionType": "ALERT_MEDIUM", "actionTypeDisplay": "Alert Medium"}], "actionType": "ALERT_MEDIUM", "actionTypeDisplay": "Alert Medium", "alertClassificationId": 1, "timeBack": null, "creationTime": 1676563953158, "description": "Cloud Assets without EPP/EDR agent installed. You can always edit policy conditions once added to be specific for your available EPP/EDR.", "enforcementListId": null, "groupingElement": null, "hourFilter": null, "id": 12345, "isActive": true, "isBoundary": false, "isEditable": true, "isRepeating": false, "labels": ["aws", "value_pack"], "lastActiveChange": null, "modificationTime": 1676565299653, "optionsKey": null, "owner": "observer@example.com", "parentId": null, "policyParams": {}, "recurringThreshold": 1, "repeatingTimeFrame": {"unit": "Seconds", "amount": 30.0}, "rootAqlEntity": "DEVICE", "rules": {"and": ["dataSource:(name:AWS) !dataSource:(name:CrowdStrike,CylancePROTECT,SentinelOne,\"Carbon Black Defense\",\"Symantec Endpoint Protection\",\"FireEye Endpoint Protection\") inventoryStatus:Managed type:\"Virtual Machines\""]}, "sensors": null, "tags": [], "timezone": "America/New_York", "title": "AWS Assets without EPP/EDR Agent", "weekdayFilter": null}, "status": "UNKNOWN_STATUS", "content": "The Armis security platform has detected a violation of a policy and generated an alert.\n\n**Recommended actions**:\n\n * Find and quarantine the offending device/s if necessary. They are located near the sensor labeled <sensor id=\"1334\">Amazon Web Services (AWS) (AWS)</sensor>.\n\n * Look at the timeline of other activities by the same devices, and see if there are any other activities that might be important, and create policies for those or for combinations of them.\n\n * Investigate other activities that would generate this alert and refine the policy if necessary.\n\n", "severity": "MEDIUM", "riskLevel": 7, "timestamp": "2023-12-10T04:25:01.589+00:00", "activities": [{"UUID": "A1234B1234C1234-W", "type": "DEVICE_PROFILE_POLICY_VIOLATION", "title": "Detected device profile policy violation for api-example-2023", "content": "", "timestamp": "2023-12-10T04:25:01.589+00:00", "decision_data": null}], "description": "Cloud Assets without EPP/EDR agent installed. You can always edit policy conditions once added to be specific for your available EPP/EDR.", "relatedLinks": [], "classification": "Security - Other", "relatedDevices": [{"id": 123456, "ip": "10.10.1.11", "ipv6": null, "name": "api-example-2023", "site": null, "type": "VIRTUAL_MACHINE", "user": "* * * *", "model": "t2.small", "sensor": {"name": "Amazon Web Services (AWS) (AWS)", "type": "Amazon Web Services"}, "category": "COMPUTER", "isSensor": false, "riskLevel": 1, "identifier": "01:2B:C3:D4:56:7D", "isCorporate": false, "isEncrypted": false, "displayTitle": "api-example-2023", "isAccessPoint": false, "isUnencrypted": false, "isNetworkBridge": false, "isShadowNetwork": false}]}
Sample Parsing¶
extensions.vulns.vulnerabilities.description = "The Armis security platform has detected a violation of a policy and generated an alert.\n\n**Recommended actions**:\n\n * Find and quarantine the offending device/s if necessary. They are located near the sensor labeled <sensor id=\"1334\">Amazon Web Services (AWS) (AWS)</sensor>.\n\n * Look at the timeline of other activities by the same devices, and see if there are any other activities that might be important, and create policies for those or for combinations of them.\n\n * Investigate other activities that would generate this alert and refine the policy if necessary.\n\n"
metadata.base_labels.log_types = "ARMIS"
metadata.description = "Cloud Assets without EPP/EDR agent installed. You can always edit policy conditions once added to be specific for your available EPP/EDR."
metadata.event_type = "GENERIC_EVENT"
metadata.log_type = "ARMIS"
metadata.product_event_type = "SYSTEM_POLICY_VIOLATION"
metadata.product_log_id = "1234"
metadata.vendor_name = "ARMIS"
observer.hostname = "observer@example.com"
principal.asset.category = "COMPUTER"
principal.asset.hardware.model = "t2.small"
principal.hostname = "api-example-2023"
principal.ip = "10.10.1.11"
principal.user.userid = "* * * *"
security_result.category_details = "DEVICE_PROFILE_POLICY_VIOLATION"
security_result.category_details = "Security - Other"
security_result.description = "Detected device profile policy violation for api-example-2023"
security_result.detection_fields.key = "isAccessPoint"
security_result.detection_fields.value = "false"
security_result.detection_fields.key = "isCorporate"
security_result.detection_fields.value = "false"
security_result.detection_fields.key = "isEncrypted"
security_result.detection_fields.value = "false"
security_result.detection_fields.key = "isSensor"
security_result.detection_fields.value = "false"
security_result.detection_fields.key = "isUnencrypted"
security_result.detection_fields.value = "false"
security_result.detection_fields.key = "isNetworkBridge"
security_result.detection_fields.value = "false"
security_result.detection_fields.key = "isShadowNetwork"
security_result.detection_fields.value = "false"
security_result.severity = "MEDIUM"
security_result.severity_details = "7"
security_result.summary = "AWS Assets without EPP/EDR Agent"