Community
Questions Library
Docs
Blog
Events
Swag
Github
Slack
JupiterOne
Discussions
Release Notes
Contact Us
Cisco Secure Endpoint - AskJ1 Community
<main> <article class="userContent"> <h2 data-id="cisco-secure-endpoint-jupiterone-integration-benefits">Cisco Secure Endpoint + JupiterOne Integration Benefits</h2> <ul><li><p>Visualize Cisco Secure Endpoint agents and the devices they protect in the<br> JupiterOne graph.</p></li> <li><p>Map Cisco Secure Endpoint agents to devices and devices to the employee who is<br> the owner.</p></li> <li><p>Monitor changes to Cisco Secure Endpoint endpoints using JupiterOne alerts.</p></li> </ul><h2 data-id="how-it-works">How it Works</h2> <ul><li><p>JupiterOne periodically fetches Cisco Secure Endpoint endpoints and the<br> devices they protect to update the graph.</p></li> <li><p>Write JupiterOne queries to review and monitor updates to the graph.</p></li> <li>Configure alerts to take action when the JupiterOne graph changes.</li> </ul><h2 data-id="requirements">Requirements</h2> <ul><li><p>JupiterOne requires the endpoint hostname of the Cisco Secure Endpoint<br> account. The API Client ID and Key are also required.</p></li> <li><p>You must have permission in JupiterOne to install new integrations.</p></li> </ul><h2 data-id="support">Support</h2> <p>If you need help with this integration, please contact<br><a rel="nofollow" href="https://support.jupiterone.io">JupiterOne Support</a>.</p> <h2 data-id="integration-walkthrough">Integration Walkthrough</h2> <p>The integration connects directly to <a rel="nofollow" href="https://api-docs.amp.cisco.com/">Cisco Secure Endpoint REST API</a> to<br> obtain endpoint protection and configuration information.</p> <h2 data-id="in-cisco-secure-endpoint">In Cisco Secure Endpoint</h2> <p>To generate a Client ID and API Key:</p> <ul><li>Log in to your <strong>Secure Endpoint Console</strong>.</li> <li>Go to <strong>Accounts</strong> > <strong>API Credentials</strong>.</li> <li>Click <strong>New API Credentials</strong> to generate the Client ID and secure API Key.</li> </ul><p>Valid API Endpoints include:</p> <ul><li><code class="code codeInline" spellcheck="false" tabindex="0">api.amp.cisco.com</code></li> <li><code class="code codeInline" spellcheck="false" tabindex="0">api.apjc.amp.cisco.com</code></li> <li><code class="code codeInline" spellcheck="false" tabindex="0">api.eu.amp.cisco.com</code></li> </ul><h3 data-id="in-jupiterone">In JupiterOne</h3> <ol><li>From the top navigation of the J1 Search homepage, select <strong>Integrations</strong>.</li> <li>Scroll to the <strong>Cisco Secure Endpoint</strong> integration tile and click it.</li> <li>Click the <strong>Add Configuration</strong> button and configure the following settings:</li> </ol><ul><li><p>Enter the <strong>Account Name</strong> by which you'd like to identify this Cisco Secure<br> Endpoint account in JupiterOne. Ingested entities will have this value stored<br> in <code class="code codeInline" spellcheck="false" tabindex="0">tag.AccountName</code> when <strong>Tag with Account Name</strong> is checked.</p></li> <li><p>Enter a <strong>Description</strong> that will further assist your team when identifying<br> the integration instance.</p></li> <li><p>Select a <strong>Polling Interval</strong> that you feel is sufficient for your monitoring<br> needs. You may leave this as <code class="code codeInline" spellcheck="false" tabindex="0">DISABLED</code> and manually execute the integration.</p></li> <li><p>Enter the <strong>API Endpoint Hostname</strong> associated with your Cisco Secure Endpoint<br> account.</p></li> <li><p>Enter the <strong>API Client ID"</strong> configured in your Cisco Secure Endpoint account.</p></li> <li>Enter the <strong>API Key</strong> associated with the Client ID, configured for read<br> access.</li> </ul><ol start="4"><li>Click <strong>Create Configuration</strong> once all values are provided.</li> </ol><h2 data-id="how-to-uninstall">How to Uninstall</h2> <ol><li>From the top navigation of the J1 Search homepage, select <strong>Integrations</strong>.</li> <li>Scroll to the <strong>Cisco Secure Endpoint</strong> integration tile and click it.</li> <li>Identify and click the <strong>integration to delete</strong>.</li> <li>Click the <strong>trash can</strong> icon.</li> <li>Click the <strong>Remove</strong> button to delete the integration.</li> </ol><p><br></p> <h2 data-id="data-model">Data Model</h2> <h3 data-id="entities">Entities</h3> <p>The following entities are created:</p> <table><thead><tr><th>Resources</th> <th>Entity <code class="code codeInline" spellcheck="false" tabindex="0">_type</code></th> <th>Entity <code class="code codeInline" spellcheck="false" tabindex="0">_class</code></th> </tr></thead><tbody><tr><td>Account</td> <td><code class="code codeInline" spellcheck="false" tabindex="0">cisco_amp_account</code></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">Account</code></td> </tr><tr><td>Computer</td> <td><code class="code codeInline" spellcheck="false" tabindex="0">cisco_amp_endpoint</code></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">HostAgent</code></td> </tr><tr><td>Finding</td> <td><code class="code codeInline" spellcheck="false" tabindex="0">cisco_amp_finding</code></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">Finding</code></td> </tr><tr><td>Vulnerability</td> <td><code class="code codeInline" spellcheck="false" tabindex="0">cve</code></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">Vulnerability</code></td> </tr></tbody></table><h3 data-id="relationships">Relationships</h3> <p>The following relationships are created:</p> <table><thead><tr><th>Source Entity <code class="code codeInline" spellcheck="false" tabindex="0">_type</code></th> <th>Relationship <code class="code codeInline" spellcheck="false" tabindex="0">_class</code></th> <th>Target Entity <code class="code codeInline" spellcheck="false" tabindex="0">_type</code></th> </tr></thead><tbody><tr><td><code class="code codeInline" spellcheck="false" tabindex="0">cisco_amp_account</code></td> <td><strong>HAS</strong></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">cisco_amp_endpoint</code></td> </tr><tr><td><code class="code codeInline" spellcheck="false" tabindex="0">cisco_amp_endpoint</code></td> <td><strong>IDENTIFIED</strong></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">cisco_amp_finding</code></td> </tr><tr><td><code class="code codeInline" spellcheck="false" tabindex="0">cisco_amp_finding</code></td> <td><strong>IS</strong></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">cve</code></td> </tr></tbody></table><h3 data-id="mapped-relationships">Mapped Relationships</h3> <p>The following mapped relationships are created:</p> <table><thead><tr><th>Source Entity <code class="code codeInline" spellcheck="false" tabindex="0">_type</code></th> <th>Relationship <code class="code codeInline" spellcheck="false" tabindex="0">_class</code></th> <th>Target Entity <code class="code codeInline" spellcheck="false" tabindex="0">_type</code></th> <th>Direction</th> </tr></thead><tbody><tr><td><code class="code codeInline" spellcheck="false" tabindex="0">cisco_amp_endpoint</code></td> <td><strong>PROTECTS</strong></td> <td><code class="code codeInline" spellcheck="false" tabindex="0">*user_endpoint*</code></td> <td>FORWARD</td> </tr></tbody></table><p><br></p> </article> </main>