Skip to main content

VMware Carbon Black Cloud Platform

vmware-carbon-black-cloud-platform

Version: 2.4
Updated: Mar 4, 2024

VMware Carbon Black Cloud Platform Integration transform your security with intelligent endpoint and workload protection that adapts to your needs, allows security operators to collect CBC Alerts and Devices information and take action on remote endpoints to Quarantine it or update the Policy of endpoints.

Actions

  • Carbon Black Alerts Daemon (Daemon) - Automatically gather alerts from Carbon Black Cloud.
  • Add Alert Note (Notification) - Add a note to an alert.
  • Delete Endpoint File (Containment) - Delete a File from a device.
  • Disable Bypass (Containment) - Disable Bypass on specific Endpoint.
  • Dismiss Alert (Containment) - Dismiss an alert in Carbon Black Cloud with comments.
  • Dismiss Threat (Containment) - Dismiss a Threat in Carbon Black Cloud with comments.
  • Enable Bypass (Containment) - Enable Bypass on specific Endpoint, it should no longer be monitored but may need to in the future.
  • Execute Custom Script On Endpoint (Containment) - Execute a PowerShell command on a windows endpoint to gather data.
  • Get CBC Alerts (Enrichment) - Queries all Alerts using input search criteria and returns a list of alerts.
  • Get Devices (Enrichment) - Retrieve info about a device.
  • Get Endpoint Vulnerabilities (Enrichment) - Get the vulnerabilities (CVEs) and their risks/exploitability identified for a given endpoint.
  • Get File (Enrichment) - Get the full contents of a suspicious MS Office or PowerShell file that is executed on an endpoint.
  • Get Policies (Enrichment) - Get a list of Policies.
  • Get Process Details (Enrichment) - Get the most up-to-date metadata of a specific process.
  • Get Process Events (Enrichment) - Get relevant endpoint events of a watchlist hit. This is very resource-intensive for CBC and should be used sparingly.
  • Get Registry Key (Enrichment) - Identify if a specific registry key has been set.
  • Get Vulnerable Endpoints (Enrichment) - Given a vulnerability (CVE) identify which endpoints are vulnerable.
  • Kill Process By Path (Containment) - Kill a malicious process by path if it’s still running.
  • Kill Process By PID (Containment) - Kill a malicious process by PID if it’s still running.
  • List Endpoint Directory (Enrichment) - List the files, including metadata such as size and last write time directly from the endpoint.
  • List Running Processes (Enrichment) - Identify if the malicious process is still running.
  • Pause Background Scan (Containment) - If the endpoint is sensitive to high CPU, disable background scanning.
  • Quarantine Device (Containment) - When the endpoint is suspected to be compromised, isolate it so that the only network communication allowed is with Carbon Black Cloud.
  • Search Process (Enrichment) - Find all endpoints where a certain process (by name or hash) has been executed. Find all processes by reputation.
  • Start Background Scan (Containment) - Start Background Scan on an endpoint.
  • Unquarantine Device (Containment) - Remove the quarantine on the specified Device within Carbon Black.
  • Update Device Policy (Containment) - Move the endpoint to a more restrictive policy.

VMware Carbon Black Cloud Platform configuration

  1. Log in to the CBC Console.
  2. Navigate to the Settings menu, and then click on API Access.
    vmware-carbon-black-cloud-platform
  3. From the API ACCESS page, click on Add API Key.
    vmware-carbon-black-cloud-platform
  4. Populate the name, Access Level type, and click the Save button.
    vmware-carbon-black-cloud-platform
  5. Copy the API Credentials (API ID and API Secret Key).
    vmware-carbon-black-cloud-platform
  6. Also you will see the ORG KEY from API Access. You need to copy it.
    vmware-carbon-black-cloud-platform

Configure VMware Carbon Black Cloud Platform in Automation Service and Cloud SOAR

Before you can use the integration, you must configure it so that the vendor can communicate with Sumo Logic. For general guidance, see Configure Authentication for Integrations.

  1. Access App Central and install the integration.
  2. Select the installed integration in the Integrations page.
    Classic UI. In the main Sumo Logic menu, select Automation and then select Integrations in the left nav bar.
    New UI. In the main Sumo Logic menu, select Automation > Integrations. You can also click the Go To... menu at the top of the screen and select Integrations.
  3. Select the integration.
  4. Hover over the resource name and click the Edit button that appears.
    Edit a resource
  5. In the Add Resource dialog, enter the authentication needed by the resource. When done, click TEST to test the configuration, and click SAVE to save the configuration.
  • Label. The name of the resource.
  • API URL. URL to the API of the VMware Carbon Black Cloud Platform instance https://defense.conferdeploy.net.
  • Organization Key. The Organization Key you copied earlier.
  • API ID / Connector ID. The API ID that you copied earlier.
  • API Secret Key. The API Secret Key that you copied earlier.
    vmware-carbon-black-cloud-platform

For information about Carbon Black Cloud, see Carbon Black Cloud documentation.

External Libraries

Category

EDR

Change Log

  • April 7, 2022 - First upload
  • May 11, 2022 - Refactored all actions with CBC SDK
  • June 08, 2022 - Updated integration doc
  • July 19, 2023 (v2.2) - Removed leading/trailing spaces
  • November 7, 2023 (v2.3) - Updated integration for compatibility with new Cloud SOAR API
  • March 4, 2024 (v2.4) - Updated code for compatibility with Python 3.12
Status
Legal
Privacy Statement
Terms of Use

Copyright © 2025 by Sumo Logic, Inc.