Select the tab
ESET Connect – Table of Contents

Cisco

The added value

Cisco is a leading provider of enterprise cybersecurity solutions, offering a wide range of solutions that cover network, cloud, endpoint, and identity security. Cisco's strength lies in combining networking and security, helping organizations gain clear visibility into their systems, apply consistent security policies, and respond to threats quickly across mixed network environments. This approach improves security and makes management easier through a unified ecosystem.

Integrating the ESET PROTECT Platform with Cisco XDR enables users to pull detection and incident data using the ESET API and import it to Cisco XDR via the Cisco Private-Intel API. The app pulls newly created incident and detection data from the ESET PROTECT Platform. Detection data is transformed to Sightings (Events) and Judgments. To learn more about Modeling Threat Intelligence in CTIM (Cisco Threat Intelligence Model), refer to the CTIM Model tutorial on GitHub.

The pulled Incidents, as well as Events and Judgments, are available in Cisco XDR UI.

Integration type

API-based integration

How to enable the integration

Ensure you meet prerequisites and follow the steps below to set up the ESET PROTECT Platform and Cisco integration app.

Prerequisites

You have created the API user account.

You have access to Cisco XDR as an administrator.

You have created the Cisco API Client with a minimum scope of privileges—Private Intel (Access Private Intelligence), and saved the Client ID and the Client Password.

You have installed Docker on the server where you want to set up the integration app.

You have installed Docker Compose on the server where you want to set up the integration app.


Note

The ESET PROTECT Platform and Cisco integration solution was prepared and tested with Ubuntu 22.04.5.

Integration configuration steps


Note

The ESET PROTECT Platform and Cisco integration app is available for download on GitHub. See the latest integration app version under Releases on the GitHub page.


Important

Before running the installation commands, set the INTEGRATION_PATH environment variable to specify the path to the installation directory of your choice; for example, export INTEGRATION_PATH="/usr/local/integrations". The installation steps use this environment variable, so you do not need to specify the path in every command.

1.Log in to the server where you want to set up the the ESET PROTECT Platform and Cisco integration app and download the app. Specify the latest app version, for example, 1.0.0, in the following command:

2.Create the .env file in the integration app folder, $INTEGRATION_PATH/ESET-Integration-Cisco, or set the required variables in the environment:

CISCO_XDR_API_CLIENT_ID—The Client ID of your Cisco API Client, which you have previously created and saved

CISCO_XDR_API_CLIENT_PASSWORD—The Client Password of your Cisco API Client, which you have previously created and saved

CISCO_XDR_API_REGION—The region of the Cisco XDR API you are using; the options are: eu, us, apjc.

EP_INSTANCE—The ESET application that Cisco uses to pull detections and incidents; the options are yes/no. Set yes if you have an ESET PROTECT instance.

EI_INSTANCE—The ESET application that Cisco uses to pull detections and incidents; the options are yes/no. Set yes if you have an ESET Inspect instance.

ECOS_INSTANCE—The ESET application that Cisco uses to pull detections and incidents; the options are yes/no. Set yes if you have an ESET Cloud Office Security instance.

INTERVAL—The time interval (in minutes) for the app to run and pull detections and incidents; the minimum value is three.

INSTANCE_REGION—The location of your ESET PROTECT/ESET Inspect/ESET Cloud Office Security instance; the options are: ca, de, eu, jpn, us.

USERNAME_INTEGRATION—The API user's email

PASSWORD_INTEGRATION—The API user's password

To create the .env file in the $INTEGRATION_PATH/ESET-Integration-Cisco folder, use the following command:

To edit the .env file, use an editor of your preference. In the following example, the nano text editor is used:

Refer to the example of the .env file contents:

3.Build and run the ESET PROTECT Platform and Cisco integration app using the Docker Compose command:

Integration verification

After configuring the integration, you can see the running app logs.

1.Use the following command to show all the running containers. Find the ESET PROTECT Platform and Cisco integration app container and copy its name:

2.Use the following command to show the running ESET PROTECT Platform and Cisco integration app logs; paste the container name copied in the previous step:

Additionally, review the newly pulled incidents in Cisco XDR > Incidents:

Incidents shown in Cisco XDR

Review detections transformed to Sightings (Events) in Cisco XDR > Intelligence > Events > Private:

Events shown in Cisco XDR

Review detections transformed to Judgments based on the identified observables using the Modeling Threat Intelligence in CTIM in Cisco XDR > Intelligence > Judgments > Private:

Judgments shown in Cisco XDR

Troubleshooting

If you experience an issue with the integration, reach out to the local Partner in the respective country/region where you purchased your ESET subscription, or the respective ESET office, by opening a support request via the support form.

Ensure to include the required details from the list; they will help the support agent investigate the issue:

Your API username

Logs from the ESET PROTECT Platform and Cisco integration app container