Set up Forescout for Integration
Table of Contents
Expand all | Collapse all
-
- Integrate IoT Security with AIMS
- Set up AIMS for Integration
- Set up IoT Security and XSOAR for AIMS Integration
- Send Work Orders to AIMS
- Integrate IoT Security with Microsoft SCCM
- Set up Microsoft SCCM for Integration
- Set up IoT Security and XSOAR for SCCM Integration
- Integrate IoT Security with Nuvolo
- Set up Nuvolo for Integration
- Set up IoT Security and XSOAR for Nuvolo Integration
- Send Security Alerts to Nuvolo
- Send Vulnerabilities to Nuvolo
- Integrate IoT Security with ServiceNow
- Set up ServiceNow for Integration
- Set up IoT Security and XSOAR for ServiceNow Integration
- Send Security Alerts to ServiceNow
- Send Vulnerabilities to ServiceNow
- Integrate IoT Security with ServiceNow Service Graph Connector
-
- Integrate IoT Security with Cortex XDR
- Set up Cortex XDR for Integration
- Set up IoT Security and XSOAR for XDR Integration
- Integrate IoT Security with CrowdStrike
- Set up CrowdStrike for Integration
- Set up IoT Security and XSOAR for CrowdStrike Integration
- Integrate IoT Security with Microsoft Defender XDR
- Set up Microsoft Defender XDR for Integration
- Set up IoT Security and Cortex XSOAR for Microsoft Defender XDR Integration
- Integrate IoT Security with Tanium
- Set up Tanium for Integration
- Set up IoT Security and XSOAR for Tanium Integration
-
- Integrate IoT Security with Aruba AirWave
- Set up Aruba AirWave for Integration
- Set up IoT Security and Cortex XSOAR for Aruba AirWave Integration
- View Device Location Information
- Integrate IoT Security with Aruba Central
- Set up Aruba Central for Integration
- Set up IoT Security and XSOAR for Aruba Central Integration
- Integrate IoT Security with Cisco DNA Center
- Set up Cisco DNA Center to Connect with XSOAR Engines
- Set up IoT Security and XSOAR for DNA Center Integration
- Integrate IoT Security with Cisco Meraki Cloud
- Set up Cisco Meraki Cloud for Integration
- Set up IoT Security and XSOAR for Cisco Meraki Cloud
- Integrate IoT Security with Cisco Prime
- Set up Cisco Prime to Accept Connections from IoT Security
- Set up IoT Security and XSOAR for Cisco Prime Integration
- Integrate IoT Security with Network Switches for SNMP Discovery
- Set up IoT Security and Cortex XSOAR for SNMP Discovery
- Integrate IoT Security with Switches for Network Discovery
- Set up IoT Security and Cortex XSOAR for Network Discovery
-
- Integrate IoT Security with Aruba WLAN Controllers
- Set up Aruba WLAN Controllers for Integration
- Set up IoT Security and XSOAR for Aruba WLAN Controllers
- Integrate IoT Security with Cisco WLAN Controllers
- Set up Cisco WLAN Controllers for Integration
- Set up IoT Security and XSOAR for Cisco WLAN Controllers
-
- Integrate IoT Security with Aruba ClearPass
- Set up Aruba ClearPass for Integration
- Set up IoT Security and XSOAR for ClearPass Integration
- Put a Device in Quarantine Using Aruba ClearPass
- Release a Device from Quarantine Using Aruba ClearPass
- Integrate IoT Security with Cisco ISE
- Set up Cisco ISE to Identify IoT Devices
- Set up Cisco ISE to Identify and Quarantine IoT Devices
- Configure ISE Servers as an HA Pair
- Set up IoT Security and XSOAR for Cisco ISE Integration
- Put a Device in Quarantine Using Cisco ISE
- Release a Device from Quarantine Using Cisco ISE
- Apply Access Control Lists through Cisco ISE
- Integrate IoT Security with Cisco ISE pxGrid
- Set up Integration with Cisco ISE pxGrid
- Put a Device in Quarantine Using Cisco ISE pxGrid
- Release a Device from Quarantine Using Cisco ISE pxGrid
- Integrate IoT Security with Forescout
- Set up Forescout for Integration
- Set up IoT Security and XSOAR for Forescout Integration
- Put a Device in Quarantine Using Forescout
- Release a Device from Quarantine Using Forescout
-
- Integrate IoT Security with Qualys
- Set up QualysGuard Express for Integration
- Set up IoT Security and XSOAR for Qualys Integration
- Perform a Vulnerability Scan Using Qualys
- Get Vulnerability Scan Reports from Qualys
- Integrate IoT Security with Rapid7
- Set up Rapid7 InsightVM for Integration
- Set up IoT Security and XSOAR for Rapid7 Integration
- Perform a Vulnerability Scan Using Rapid7
- Get Vulnerability Scan Reports from Rapid7
- Integrate IoT Security with Tenable
- Set up Tenable for Integration
- Set up IoT Security and XSOAR for Tenable Integration
- Perform a Vulnerability Scan Using Tenable
- Get Vulnerability Scan Reports from Tenable
Set up Forescout for Integration
Set up Forescout for integration with IoT Security through
Cortex XSOAR.
Configure the following on Forescout:
- A Forescout Data Exchange (DEX) account
- Host properties that IoT Security can populate with device attributes
- An IP address, range, or subnet from which Forescout accepts communications
The PanwIoTQuarantine host property
will receive data that IoT Security submits for use in Forescout
policies that quarantine devices and release them from quarantine.
Therefore, you must also configure these policies on Forescout:
- A quarantine policy with its condition set as PanwIoTQuarantine = on
- A policy that releases devices from quarantine with the condition set as PanwIoTQuarantine = off
- Add a Data Exchange account.
- Log in to the Forescout console and click ToolsOptionsData Exchange (DEX).To access the console, use a remote desktop application such as the Remote Desktop Connection application on Windows or Microsoft Remote Desktop for Mac.
- In the Data Exchange (DEX) section, click CounterACT Web ServiceAccounts and then Add.
- Enter the following in the Add Account dialog box that appears and then click OK:Name: Enter a name for the web service account.Description: Enter a note about the user account for future reference.Username: Enter a username that an XSOAR engine will use when authenticating itself to Forescout when interacting with it.Password: Enter a password for the user account.
Create host properties.- Click Properties and then click Add.
- Complete the three-part wizard that appears to add host properties such as the following:PanwIoTIP, PanwIoTProfile, PanwIoTCategory, PanwIoTRiskScore, PanwIoTConfidence, PanwIoTTag, PanwIoTHostname, PanwIoTOS, PanwIoTModel, PanwIoTVendor, PanwIoTSerial, PanwIoTEPP, PanwIoTInternetAccess, PanwIoTAET, PanwIoTQuarantineIf you want to enter different host property names than those shown here, change the default names for their corresponding attributes in Cortex XSOAR so they match each other. The attribute names are editable in the incremental and bulk export job settings for Forescout in the Cortex XSOAR module. See Configure IoT Security and Cortex XSOAR for Forescout.
Host Property Name Description PanwIoTIP Device IP address PanwIoTProfile Device profile PanwIoTCategory Category of device PanwIoTRiskScore Risk score of device calculated by IoT Security PanwIoTConfidence IoT Security device identification confidence level PanwIoTTag User-defined tag applied to device in IoT Security PanwIoTHostname Device hostname PanwIoTOS Device operating system PanwIoTModel Device model PanwIoTVendor Device vendor PanwIoTSerial Device serial number PanwIoTEPP If device has endpoint protection (EPP) PanwIoTInternetAccess If device has Internet access PanwIoTAET Application entity title (for DICOM devices) PanwIoTQuarantine Put device in quarantine when the value is on; remove from quarantine when the value is off The next steps explain how to add a host property. Repeat them to add all the host properties described above. - On the General tab, enter the following and then click Next:Property Name: PanwIoTIPProperty Tag (ASCII only): PanwIoTIP (automatically fills based on the Property Name)Description: Enter a note about the host property for future reference.Account: Choose the same web service account name you entered in the Name field in the Add Account dialog box.
- On the Map Data panel, select Single Value Property, choose String in the Data Type drop-down list, and then click Next.
- On the Display/Track panel, select the places in the Forescout UI where you want the host property to appear and then click Finish.When done, the Properties page will have a complete set of host properties.
Set an IP address, range of addresses, or subnet from which allow connections to Forescout.- Click Security Settings and then click Add.
- Select either All IPv4 or IPv4 Range. If you select IPv4 Range, enter the IP address, range, or subnet from which Forescout will accept connections and then click OK. Make sure it includes the XSOAR engine IP address.
- Click Apply to save the configuration of your account, host properties, and security settings.
Configure policies to quarantine devices and release them from quarantine.One policy has a condition set as PanwIoTQuarantine = on and quarantines devices when the value of their PanwIoTQuarantine host property is on.The other policy has a condition set as PanwIoTQuarantine = off and releases devices when the value of their PanwIoTQuarantine host property is off.