Skip to content

Capabilities At a Glance🔗

The following summarizes the integration and configuration capabilities of Secureworks® Taegis™ XDR, including what data sources are compatible and what data from those sources are needed and/or available to XDR Detectors and the watchlists XDR can ingest.

Tip

Explore our video series to enhance your understanding of data integrations and how they serve effective coverage for threat detection. The training covers how data in Taegis XDR is parsed and normalized into schemas, feeding data into our detectors listed below: Training: Understanding XDR Data.

Regions🔗

Availability of XDR features depend upon the region your environment is deployed in.

For a gathered list of what is not supported in the EU region, see Unsupported Features in EU.

Detector Inputs🔗

The following lists the data sources or schemas that each Taegis detector requires:

Data Retention Policy🔗

Secureworks retains event and alert data for 12 months from the date the data is received. All other data concerns are covered in the Secureworks Cloud Services Interface Privacy Statement.

Provided Data from Integrations🔗

Provided data is categorized as Normalized Data, Out-of-the-Box Detections, or Vendor-Specific Detections.

Note

XDR detectors are not guaranteed to be triggered, even if a data source's logs are normalized to a schema associated with a given detector. However, you can create Custom Alert Rules to generate alerts based on normalized data from a data source.

Cloud🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Amazon GuardDuty     Thirdparty
AWS Application Load Balancer   HTTP  
AWS CloudTrail     Auth, CloudAudit
AWS VPC Flow Logs   Netflow  
AWS Web Application Firewall   HTTP HTTP
Cisco Umbrella   DNS, HTTP, Netflow  
Google Cloud Platform CloudAudit Netflow Thirdparty
Google Workspace   Auth, HTTP Auth, CloudAudit, Thirdparty
MS Azure Active Directory Auth, CloudAudit    
MS Azure Active Directory Activity Reports   Auth CloudAudit
MS Azure Active Directory Identity Protection     CloudAudit, Thirdparty
MS Azure Activity Logs     CloudAudit
MS Azure Firewall   DNS, HTTP, Netflow  
MS Azure Flow Logs   Netflow  
MS Azure WAF on Application Gateway   HTTP  
MS Azure WAF on Front Door   HTTP  
MS Graph Security     CloudAudit, Thirdparty
MS Office 365   Auth Auth, CloudAudit, Email, Thirdparty
Oracle Cloud Infrastructure (OCI) CloudAudit HTTP, Netflow NIDS, Thirdparty
Salesforce Real-Time Event Monitoring Auth, CloudAudit, HTTP, Thirdparty Thirdparty

Email Security🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Abnormal Inbound Email Security Email    
Mimecast   HTTP Email
Proofpoint   HTTP Email

Endpoints🔗

  Alerts Auth DNS File Collection HTTP NIDS Netflow Process File Modification API Call Registry Scriptblock Management Persistence Thread Injection Generic
Taegis Windows Endpoint Agent        
Taegis macOS Endpoint Agent                  
Taegis Linux Endpoint Agent                
Red Cloak Windows Endpoint Agent                
Red Cloak Linux Endpoint Agent                          
VMware Carbon Black Response Cloud                            
VMware Carbon Black Cloud Endpoint™ Standard              
VMware Carbon Black Cloud Enterprise EDR              
CrowdStrike      
Microsoft Defender for Endpoint       * * *
SentinelOne      
EDR OCSF Ingest                    

Note

The Endpoints table will be updated to use the new integration definitions in a future release.

Firewalls/Next-Gen Firewalls🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Barracuda Firewall   Netflow  
Check Point Firewall Email Auth, HTTP, Netflow Antivirus, Thirdparty
Cisco ASA Firewall DHCP, Managementevent Auth, DNS, HTTP, Netflow NIDS
Cisco FTD Firewall (Syslog only, see eStreamer via eNCore for NIDS) DHCP, Managementevent Auth, DNS, HTTP, Netflow NIDS
Cisco Meraki Firewall File Auth, HTTP, Netflow NIDS
Forecepoint Firewall DHCP Auth, HTTP, Netflow Thirdparty
Fortigate Firewall Email Auth, DNS, HTTP, Netflow Antivirus, Thirdparty
Juniper SRX Firewall File Auth, HTTP, Netflow NIDS
OPNsense Firewall Netflow
Palo Alto Firewall Auth, HTTP, Netflow NIDS
pfSense Firewall Netflow
SonicWall Firewall DHCP Auth, DNS, HTTP, Netflow NIDS
Sophos XGS Firewall Antivirus, DHCP, Managementevent Auth, HTTP, Netflow Email, NIDS
WatchGuard Firewall Auth DNS, HTTP, Netflow
Zscaler Cloud Firewall DNS, Netflow

Host-Based Intrusion Detection Systems🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
McAfee ePO Antivirus, Auth, Thirdparty Process
Symantec Endpoint Protection Antivirus, NIDS
Trend Micro Deep Security Filemod, NIDS, Thirdparty HTTP, Netflow Antivirus

Identity and Access Management🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Cisco Duo Auth
Cisco ISE Process Auth
CyberArk CloudAudit Auth Thirdparty
Okta CloudAudit Auth

Infrastructure Management🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
vCenter Management Auth

Microsegmentation Software🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Akamai Guardicore Segmentation Thirdparty Netflow, Process

Network Intrusion Detection Systems🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Taegis NDR Netflow, NIDS NIDS
Corelight (Zeek) DHCP Auth, DNS, Encrypt, HTTP, Netflow, NIDS NIDS
Darktrace Thirdparty
eStreamer via eNCore Netflow, NIDS NIDS
LastLine Auth NIDS
Suricata DNS, HTTP, Netflow, NIDS NIDS

OT Security🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Claroty CTD Netflow Thirdparty
Dragos Platform Netflow Thirdparty
Nozomi Guardian Thirdparty
SCADAfence Thirdparty Netflow, NIDS

Important

Adding an OT Security integration to your XDR tenant requires XDR for OT. Contact your account manager or CSM to acquire the required license.

Security Service Edge🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Cato Networks Antivirus, Auth, DHCP, Thirdparty Netflow
Cloudflare CloudAudit, NIDS, Thirdparty DNS, HTTP, Netflow
Netskope Auth HTTP, Netflow Antivirus, NIDS, Thirdparty
Palo Alto Prisma Access Auth, HTTP, Netflow NIDS

Server Logs🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
InfoBlox (DNS via named process) DNS
Microsoft Windows Event Log (Microsoft-Windows-Security-Auditing) File, Management, Process, Thirdparty Auth, Netflow
Microsoft DHCP DHCP
Microsoft DNS DNS
Microsoft IIS HTTP
Non-Microsoft-based servers (processes like sudo/su/sshd/named) Management Auth, DNS

VPN Appliances🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
PulseSecure VPN Auth

Web Application Firewalls/LoadBalancers🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Akamai App & API Protector Thirdparty HTTP
F5 ASM WAF HTTP
F5 LTM* Management Auth
Barracuda WAF HTTP
Fortinet FortiWeb Netflow Thirdparty
Imperva WAF HTTP
Imperva Cloud WAF CloudAudit, Thirdparty Auth
Citrix ADC Management Auth, HTTP, Netflow

Web Proxies🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Akamai Enterprise Application Access (EAA) Auth, HTTP
Forcepoint Web Security HTTP
Cisco IronPort Auth HTTP
Skyhigh Secure Web Gateway HTTP
Symantec (Blue Coat) ProxySG WebProxy HTTP
Zscaler Secure Web Gateway HTTP Thirdparty

Other Network Appliances🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Cisco IOS based Switches and Routers Management Auth
Aruba ClearPass NAC Auth

Other Integrations🔗

HRMS & Identity🔗

Azure Active Directory🔗

Features Supported:

  • Enable/Disable AD Account
  • Force Password Change
  • Login History

How We Integrate

We implement the Microsoft Graph API.

Compatible Detectors

Stolen Credentials, and Tactic Graphs™ Detector.

SIEM/Security🔗

Splunk Heavy Forwarder🔗

Replicates all data sent from Splunk using their Heavy Forwarder to XDR.

How We Integrate

XDR is configured to receive data from Splunk Heavy Forwarder through a TLS encrypted Syslog ingestor. A XDR technical representative can help you get the appropriate TLS certificate issued. Once the certificate has been issued, you can configure a Splunk Heavy Forwarder to send data to XDR. This involves updating the output.conf file for Splunk Heavy Forwarder.

Note

We only support forwarded data types for integrations that are supported by XDR.

Compatible Detectors

All XDR detectors are capable of using Splunk provided data. Usage is dependent on your configuration and the data Splunk is forwarding.

Perimeter/Proxy🔗

NDR🔗

NDR is a Network IDS/IPS available from Secureworks. It leverages our latest threat intelligence to detect network-level threat signatures on the perimeter. NDR is a separately contracted feature that may be included with Secureworks® Taegis™ MDR.

Features Supported

  • Inline and passive deep packet inspection
  • Integration in TDR Threat Intelligence
  • Blocking Devices on the network

Compatible Detectors

DGA, Rare Program to Rare IP, Stolen Credentials, Tactic Graphs Detector, Punycode, IP Watchlist, and Domain Watchlists.

Palo Alto Networks🔗

We use XDR’s On-Premises Data Collector to pull NetFlow data from PAN devices.

Features Supported

  • Netflow Capture
  • Integration in TDR Threat Intelligence

Supported Devices

  • Palo Alto Firewall PANOS 6.1 - 7.0 - 7.1
  • Panorama 6.1 - 6.7, including Wildfire Security Logs
  • Palo Alto Firewall PANOS 8.0 - 9.x - 10.0
  • Panorama 8.0 - 9.0 - 9.1

How We Integrate

We collect Syslog information from Palo Alto using the XDR Collector. For more information see On-Prem Data Collector.

Compatible Detectors

DGA, Rare Program to Rare IP, Stolen Credentials, Tactic Graphs Detector, Punycode, IP Watchlist.

Cisco🔗

Features Supported

  • WAF features
  • Netflow Capture
  • Integration in TDR Threat Intelligence

Supported Devices

  • Cisco ASA
  • Cisco FTD
  • Cisco Meraki

How We Integrate

We collect Syslog information from Cisco using the XDR Collector, and use eStreamer to collect security events/logs from FTD devices. For more information see On-Prem Data Collector.

Compatible Detectors

DGA, Rare Program to Rare IP, Stolen Credentials, Tactic Graphs Detector, Punycode, IP Watchlist.

Cloud Applications🔗

Office 365 / Azure🔗

Features Supported

  • Office 365 Audit Log Data (Logins to Services, Changes to accounts, Sends/Receive E-mail metadata). Normalizing this data into a normalized auth type. Picking out logins across these services, and feeding them into the anomaly detector. Too far away, etc. Looking for behavior.
  • XDR’s integration uses a collector that supports Microsoft Graph Security Alerts. These are alerts that are generated across all Microsoft products, including third-party partners like Palo Alto.
  • Azure AD Audit Logs.

Compatible Detectors

Stolen Credentials, and Tactic Graphs Detector.

Amazon Web Services🔗

Our AWS Integration uses a custom-developed AWS Collector for supporting GuardDuty Findings, importing findings and displaying those findings to the user. We do not support Cloudwatch or Cloudwatch Agent at this time.

We also support data collected by a custom serverless collector that supports AWS Application Load Balancers, AWS CloudTrail, AWS VPC Flow logs, and AWS WAF. We additionally support integration with Cisco Umbrella services deployed to AWS.

Compatible Detectors

Stolen Credentials, and Tactic Graphs Detector.

Endpoint🔗

Red Cloak Endpoint Agent🔗

The Secureworks Red Cloak™ Endpoint Agent is included with XDR. This agent captures a rich set of telemetry from endpoints, including DNS, IP, Processes, Windows Logs, and Linux Logs.

Compatible Detectors

All of XDR’s proprietary detectors make use of Red Cloak Endpoint Agent telemetry: DGA, Rare Program to Rare IP, Stolen Credentials, Tactic Graphs Detector, Punycode, IP Watchlist, and Domain Watchlists.

CrowdStrike🔗

The CrowdStrike agent captures a rich set of telemetry from endpoints, including DNS, IP, Processes, Windows Logs, and Linux Logs.

Note

You must have CrowdStrike Falcon Insight (EDR) for XDR to receive any telemetry from CrowdStrike Falcon Prevent (NGAV). Falcon Insight gathers the telemetry that is sent to XDR. You can purchase the license for Falcon Insight from Secureworks or CrowdStrike.

Falcon Prevent (NGAV) is only an alert provider; therefore, if you only have CrowdStrike Falcon Prevent (NGAV), then XDR will not receive any telemetry from it.

Compatible Detectors

All of XDR’s proprietary detectors make use of CrowdStrike data, including DGA, Rare Program to Rare IP, Stolen Credentials, Tactic Graphs Detector, Punycode, IP Watchlist, and Domain Watchlists.

VMware Carbon Black Cloud Endpoint Standard and Enterprise EDR🔗

Carbon Black’s traditional AV service. XDR has access to Carbon Black telemetry which enables endpoint, detection, and response (EDR) capabilities with this service. Integrated with XDR.

Carbon Black Response Cloud🔗

Carbon Black’s Endpoint, Detection, and Response (EDR) service. We have access to Carbon Black telemetry which enables EDR capabilities with this service.

Okta🔗

This integration further strengthens XDR’s knowledgebase of your security landscape by receiving user information telemetry directly from Okta via an Okta API.

Using an Okta connector, information related to Authentication Events, Policy Changes, and User Management lists are directly fed into the XDR platform, further providing insights to security analysts during investigations.

Unsupported Features in the EU Region🔗

All XDR features except the following are supported in the EU region:

Endpoint Integrations🔗

  • NGAV is not supported in the EU region.