Trellix Email Security - Cloud
This Integration is part of the Trellix Email Security - Cloud Pack.#
Trellix Email Security - Cloud#
Overview#
Use the Trellix Email Security - Cloud integration to import messages as incidents, search for messages with specific attributes, and retrieve alert data.
Use Cases#
- Search for messages using specific message attributes as indicators.
- Import messages as Cortex XSOAR incidents, using the message status as indicator.
Prerequisites#
Make sure you obtain the following information.
- Valid Trellix Email Security - Cloud account
- Configure an API key on the ETP Web portal. Select the product as both Email Threat Prevention and Identity Access Management. Select all entitlements.
- Upon Authentication errors, contact Trellix Email Security - Cloud Technical Support to let them know the IP address of your Cortex XSOAR Server and the URL you are accessing , e.g. https://etp.us.fireeye.com. Trellix will add these details to their Firewall rules so that the bidirectional traffic can be allowed between Cortex XSOAR and Trellix Email Security - Cloud.
Configure Trellix Email Security - Cloud in Cortex#
- Name: a textual name for the integration instance.
- Server URL: ETP server URL. Use the endpoint in the region that hosts your ETP service:- US instance: https://etp.us.fireeye.com
- EMEA instance: https://etp.eu.fireeye.com
- US GOV instance: https://etp.us.fireeyegov.com
 
- API key: The API key configured in the ETP Web Portal.
- Messages status: All status specified messages will be imported as incidents. Valid values are:- accepted
- deleted
- delivered
- delivered (retroactive)
- dropped
- dropped oob
- dropped (oob retroactive)
- permanent failure
- processing
- quarantined
- rejected
- temporary failure
 
Fetched Incidents Data#
To use Fetch incidents:
- Configure a new instance.
- Navigate to instance settings, and specify the message status (using the valid values).
- Select Fetch incidents option.
The integration will fetch alerts as incidents. It is possible to filter alerts using the specified message status.
Commands#
You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
- Search for messages: fireeye-etp-search-messages
- Get metadata of a specified message: fireeye-etp-get-message
- Get summary of all alerts: fireeye-etp-get-alerts
- Get details of a specified alert: fireeye-etp-get-alert
Search for messages#
Search for messages using specific message attributes as indicators.
Base Command#
fireeye-etp-search-messages
Input#
| Parameter | Description | More Information | 
|---|---|---|
| from_email | List of sender email addresses | Maximum 10 arguments | 
| from_email_not_in | List of sender email addresses to be excluded | Maximum 10 arguments | 
| recipients | List of recipient email addresses (including "cc") | Maximum 10 arguments | 
| recipients_not_in | list of recipient email addresses to be excluded (including "cc") | Maximum 10 arguments | 
| subject | List of subjects in string format | Maximum 10 arguments | 
| from_accepted_date_time | The start date of the search range, in time stamp format | For example, 2017-10-24T10:48:51.000Z | 
| to_accepted_date_time | The end date of the search range, in time stamp format | For example, 2017-10-24T10:48:51.000Z | 
| rejection_reason | List of ETP rejection-reason-codes | Valid rejection-reason-codes are: 
 | 
| sender_ip | List of sender IP addresses | Maximum of 10 arguments | 
| status | List of email status values | Valid statuses are: 
 | 
| status_not_in | List of email status values to exclude | Valid statuses are: 
 | 
| last_modified_date_time | Last modification date, in timestamp format, along with one of the following operators to indicate if to limit to before or after the specified date and time: 
 | For example, to search for messages that were last modified before this specific date and time, use the following value: <2017-10-24T18:00:00.000Z | 
| domain | List of domain names | |
| has_attachments | Indicates if the message has attachments | Boolean value | 
| max_message_size | Maximum message size | Default value is 20 KB. Maximum value is 100 KB. | 
Context Output#
| Path | Description | 
|---|---|
| FireEyeETP.Message.acceptedDateTime | Date and time that the message was accepted | 
| FireEyeETP.Message.countryCode | Country code of sender | 
| FireEyeETP.Message.domain | Domain | 
| FireEyeETP.Message.emailSize | Email size in KB | 
| FireEyeETP.Message.lastModifiedDateTime | Last modification date of message | 
| FireEyeETP.Message.recipientHeader | List of message recipients display names and email addresses | 
| FireEyeETP.Message.recipients | List of message recipients | 
| FireEyeETP.Message.senderHeader | Display name and email address of the message sender | 
| FireEyeETP.Message.sender | Email address of message sender | 
| FireEyeETP.Message.senderSMTP | SMTP of Message sender | 
| FireEyeETP.Message.senderIP | Message sender IP address | 
| FireEyeETP.Message.status | Message status | 
| FireEyeETP.Message.subject | Message subject | 
| FireEyeETP.Message.verdicts.AS | Verdict for AS (pass/fail) | 
| FireEyeETP.Message.verdicts.AV | Verdict for AV (pass/fail) | 
| FireEyeETP.Message.verdicts.AT | Verdict for AT (pass/fail) | 
| FireEyeETP.Message.verdicts.PV | Verdict for PV (pass/fail) | 
| FireEyeETP.Message.id | Message ID | 
Command example 1#
!fireeye-etp-search-messages to_accepted_date_time=2017-10- 24T10:00:00.000Z from_accepted_date_time=2017-10- 24T10:30:00.000Z
Command example 2#
!fireeye-etp-search-messages from_email=diana@corp.com,charles@corp.com
Raw Output#
Get metadata of a specified message#
Get the metadata of a specified message.
Base Command#
fireeye-etp-get-message
Input#
| Parameter | Description | 
|---|---|
| message_id | Message ID | 
Context Output#
| Path | Description | 
|---|---|
| FireEyeETP.Message.acceptedDateTime | Date and time that the message was accepted | 
| FireEyeETP.Message.countryCode | Country code of sender | 
| FireEyeETP.Message.domain | Domain | 
| FireEyeETP.Message.emailSize | Email size in KB | 
| FireEyeETP.Message.lastModifiedDateTime | Message last modification date | 
| FireEyeETP.Message.recipientHeader | List of message recipients display names and email addresses | 
| FireEyeETP.Message.recipients | List of message recipients | 
| FireEyeETP.Message.senderHeader | Display name and email address of the message sender | 
| FireEyeETP.Message.sender | Message sender address | 
| FireEyeETP.Message.senderSMTP | Message sender SMTP | 
| FireEyeETP.Message.senderIP | Message sender IP address | 
| FireEyeETP.Message.status | Message status | 
| FireEyeETP.Message.subject | Message subject | 
| FireEyeETP.Message.verdicts.AS | Verdict for AS (pass/fail) | 
| FireEyeETP.Message.verdicts.AV | Verdict for AV (pass/fail) | 
| FireEyeETP.Message.verdicts.AT | Verdict for AT (pass/fail) | 
| FireEyeETP.Message.verdicts.PV | Verdict for PV (pass/fail) | 
| FireEyeETP.Message.id | Message ID | 
Command example#
!fireeye-etp-get-message message_id= C88B18749AAAAB1B55fc0fa78
Raw Output#
There is no raw output for this command.
Get summary of all alerts#
Get summary-format information about the alerts. Alerts that are more than 90 days old are not available.
Base Command#
fireeye-etp-get-alerts
Input#
| Parameter | Description | More Information | 
|---|---|---|
| legacy_id | Alert ID as shown in ETP Web Portal | |
| from_last_modified_on | Last modification date and time in the following format: yyy-mm-ddThh:mm:ss.fff | Default is last 90 days. | 
| etp_message_id | Email message ID | |
| size | Number of alerts intended in response | Default is 20. Valid range is 1-100. | 
Context Output#
| Path | Description | 
|---|---|
| FireEyeETP.Alerts.meta.read | Has the email been read? | 
| FireEyeETP.Alerts.meta.last_modified_on | Last modification date in timestamp format | 
| FireEyeETP.Alerts.meta.legacy_id | Alert ID as shown in ETP web portal | 
| FireEyeETP.Alerts.alert.product | Product alerted | 
| FireEyeETP.Alerts.alert.timestamp | Alert timestamp | 
| FireEyeETP.Alerts.alert.malware_md5 | MD5 of file attached | 
| FireEyeETP.Alerts.email.status | Email status | 
| FireEyeETP.Alerts.email.source_ip | Email source IP address | 
| FireEyeETP.Alerts.email.smtp.rcpt_to | Recipient SMTP | 
| FireEyeETP.Alerts.email.smtp.mail_from | Sender SMTP | 
| FireEyeETP.Alerts.email.etp_message_id | Message ID | 
| FireEyeETP.Alerts.email.headers.cc | Email 'cc' recipients | 
| FireEyeETP.Alerts.email.headers.to | Email recipients | 
| FireEyeETP.Alerts.email.headers.from | Email sender | 
| FireEyeETP.Alerts.email.headers.subject | Email subject | 
| FireEyeETP.Alerts.email.attachment | File name or URL pointing to file | 
| FireEyeETP.Alerts.email.timestamp.accepted | Time the email was accepted | 
| FireEyeETP.Alerts.id | Alert ID | 
Command example#
!fireeye-etp-get-alerts legacy_id=50038117
Raw Output#
Get details of specified alert#
Returns detailed information for any specified alert. Alerts that are more than 90 days old are not available.
Base Command#
fireeye-etp-get-alert
Input#
| Parameter | Description | 
|---|---|
| alert_id | Alert ID | 
Context Output#
| Path | Description | 
|---|---|
| FireEyeETP.Alerts.meta.read | Has the email been read? | 
| FireEyeETP.Alerts.meta.last_modified_on | Last modification date in timestampformat | 
| FireEyeETP.Alerts.meta.legacy_id | Alert ID as shown in ETP web portal | 
| FireEyeETP.Alerts.meta.acknowledged | If acknowledged | 
| FireEyeETP.Alerts.alert.product | Product that generated the alert | 
| FireEyeETP.Alerts.alert.alert_typeA | Alert type code | 
| FireEyeETP.Alerts.alert.severity | Severity code | 
| FireEyeETP.Alerts.alert.explanation.analysis | Analysis | 
| FireEyeETP.Alerts.alert.explanation.anomaly | Anomaly | 
| FireEyeETP.Alerts.alert.explanation.malware_detected.malware.domain | Malware domain | 
| FireEyeETP.Alerts.alert.explanation.malware_detected.malware.downloaded_at | Time malware was downloaded in timestamp format | 
| FireEyeETP.Alerts.alert.explanation.malware_detected.malware.executed_at | Malware executed at timestamp | 
| FireEyeETP.Alerts.alert.explanation.malware_detected.malware.name | Malware name | 
| FireEyeETP.Alerts.alert.explanation.malware_detected.malware.sid | Malware SID | 
| FireEyeETP.Alerts.alert.explanation.malware_detected.malware.stype | Malware type | 
| FireEyeETP.Alerts.alert.explanation.malware_detected.malware.submitted_at | Where the malware was submitted | 
| FireEyeETP.Alerts.alert.explanation.protocol | Protocol | 
| FireEyeETP.Alerts.alert.explanation.timestamp | Explanation timestamp | 
| FireEyeETP.Alerts.alert.timestamp | Alert timestamp | 
| FireEyeETP.Alerts.alert.action | Alert action | 
| FireEyeETP.Alerts.alert.name | Alert name | 
| FireEyeETP.Alerts.email.status | Email status | 
| FireEyeETP.Alerts.email.source_ip | Email source IP address | 
| FireEyeETP.Alerts.email.smtp.rcpt_to | Recipient SMTP | 
| FireEyeETP.Alerts.email.smtp.mail_from | Sender SMTP | 
| FireEyeETP.Alerts.email.etp_message_id | Trellix Email Security - Cloud unique message ID | 
| FireEyeETP.Alerts.email.headers.cc | Email cc recipients | 
| FireEyeETP.Alerts.email.headers.to | Email recipients | 
| FireEyeETP.Alerts.email.headers.from | Email sender | 
| FireEyeETP.Alerts.email.headers.subject | Email subject | 
| FireEyeETP.Alerts.email.attachment | File name or URL pointing to file | 
| FireEyeETP.Alerts.email.timestamp.accepted | Time that the email was accepted | 
| FireEyeETP.Alerts.id | The alert unique ID | 
Command example#
!fireeye-etp-get-alert alert_id= AWKMOs-2_r7_CWOc2okO
Raw Output#
fireeye-etp-download-yara-file#
Downloads a YARA file.
Base Command#
fireeye-etp-download-yara-file
Input#
| Argument Name | Description | Required | 
|---|---|---|
| policy_uuid | Universally unique identifier (UUID) of the policy. (Can be found on the URL of the ETP Policies). | Required | 
| ruleset_uuid | Universally unique identifier (UUID) of the ruleset. | Required | 
Context Output#
There is no context output for this command.
fireeye-etp-get-events-data#
Returns all events of the alert by the alert ID.
Base Command#
fireeye-etp-get-events-data
Input#
| Argument Name | Description | Required | 
|---|---|---|
| message_id | Message ID of alert. | Required | 
Context Output#
| Path | Type | Description | 
|---|---|---|
| FireEyeETP.Events | unknown | The events of the alert. | 
| FireEyeETP.Events.Delivered_msg | unknown | Display if event is delivered successfully or not. | 
| FireEyeETP.Events.Delivered_status | unknown | The status of the message. | 
| FireEyeETP.Events.InternetMessageId | unknown | The internet message ID of the alert. | 
| FireEyeETP.Events.Logs | unknown | The logs of the alert. | 
fireeye-etp-list-yara-rulesets#
Fetch the list of YARA rulesets and return a list with all the rules.
Base Command#
fireeye-etp-list-yara-rulesets
Input#
| Argument Name | Description | Required | 
|---|---|---|
| policy_uuid | Universally unique identifier (UUID) of the policy. (Can be found on the URL of the ETP Policies). | Required | 
Context Output#
| Path | Type | Description | 
|---|---|---|
| FireEyeETP.Policy | unknown | The policy id. | 
fireeye-etp-upload-yara-file#
Update or replace the YARA rule file in the existing ruleset.
Base Command#
fireeye-etp-upload-yara-file
Input#
| Argument Name | Description | Required | 
|---|---|---|
| policy_uuid | Universally unique identifier (UUID) of the policy. (Can be found on the URL of the ETP Policies). | Required | 
| ruleset_uuid | Universally unique identifier (UUID) of the ruleset. | Required | 
| entryID | Entry ID of yara file to upload. | Required | 
Context Output#
There is no context output for this command.
fireeye-etp-download-alert-artifact#
Downloads all case files of the alert specified by the alert ID, in a zip file. You can obtain the ID from the Alert Summary response, for example "id": "AV7zzRy7kvIwrKcfu0I".
Base Command#
fireeye-etp-download-alert-artifact
Input#
| Argument Name | Description | Required | 
|---|---|---|
| alert_id | The alert ID. | Required | 
Context Output#
There is no context output for this command.
fireeye-etp-quarantine-release#
Releases the email file present in the quarantine for the given email. Cloud message ID.
Base Command#
fireeye-etp-quarantine-release
Input#
| Argument Name | Description | Required | 
|---|---|---|
| message_id | The message ID. | Optional | 
Context Output#
There is no context output for this command.