ExtraHop Reveal(X) 360
  • 13 Oct 2024
  • 1 Minute to read
  • Contributors
  • Dark
    Light

ExtraHop Reveal(X) 360

  • Dark
    Light

Article summary

ExtraHop 

ExtraHop gives organizations visibility into cyber threats, vulnerabilities, and network performance issues that evade their existing security and IT tools. With this insight, organizations can investigate smarter, stop threats faster, and keep operations running. 

Integration Method: API
Tables: Device Inventory, Detection Finding

DataBee connects to ExtraHop APIs for the purpose of getting data related to Alerts and Devices. This integration has been tested against the ExtraHop API version v1. 

ExtraHop Configuration

  1. Login to the Extrahop Dashboard. 

A screenshot of a login form  Description automatically generated 

  1. Navigate to System Settings and then select All Administration 

A screenshot of a computer  Description automatically generated 

  1. Navigate to API Access from All Administration page. 

A screenshot of a graph  Description automatically generated 

  1. Enable the Manage API Access then click create credentials 

A screenshot of a computer  Description automatically generated

  1. Click on Create Credentials and enter the credentials Name, and select the access rights. DataBee requires Read Only access 

 

  1. Click on Save and then you’ll see the id , secret and token URL.  Copy the credentials and save it in your machine for Authentication.   

  

DataBee Configuration

  1. In DataBee console, navigate to the Data tab and click on Add new Datasource

A screenshot of a computer  Description automatically generated

  1. Search for ExtraHop and select it.

A screenshot of a computer  Description automatically generated

  1. Click on API Ingest and enter datasource owner information on the dialog box. Click Next A screenshot of a computer  Description automatically generated

  2. In the next set of fields, enter the credentials.

    1. Authorization Method: OAuth2

    2. Client Key: Replace with ID saved earlier

    3. Client Secret: Replace with Secret saved earlier

    4. Token URL & API URL: Replace the instance with your specific sub domain

  3. Click Submit

A screenshot of a computer  Description automatically generated

 


Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence