{"title": "VMware Carbon Black EDR setup for Workbench", "url": "https://support.expel.io/hc/en-us/articles/1500002718961-VMware-Carbon-Black-EDR-setup-for-Workbench", "date": "2021-02-17T20:44:52Z", "contents": "This article explains how to connect VMware Carbon Black EDR to Workbench.\n\nVMWare VMware Carbon Black EDR was formerly called Carbon Black Response.\n\n#### In this article\n\n * Step 1: Enable console access\n\n * Create an admin account\n\n * Verify VMware Carbon Black Live EDR is enabled\n\n * Step 2: Generate API credentials\n\n * Obtain the API key for the Expel account\n\n * Step 3: Enable threat feeds\n\n * Step 4: Configure the technology in Workbench\n\n * Step 5: Edit the device to add console access\n\n## Step 1: Enable console access\n\nThis procedure creates a user account for Expel that keeps the Expel activity\nseparate from other activity on the VMware Carbon Black EDR console.\n\n### Note\n\nExpel secures all login information our SOC analysts need about your devices\nin a MFA password product. Access to this login information is protected using\nour internal MFA processes. To learn more about the IP addresses all Expel\ntraffic comes from, go here.\n\n### Create an admin account\n\n 1. Navigate to the Users icon on left and click +Add User.\n\n * For Username type expel.\n\n * For First Name type Expel.\n\n * For Last Name type User.\n\n * For Email Address type soc@expel.io.\n\n * Type a Password.\n\n * Assign to: Administrators.\n\n * Select Global administrator. Global administrator is required to perform the necessary functions within VMware Carbon Black EDR for pulling process listings, and so on.\n\n 2. Click Save changes.\n\n### Verify VMware Carbon Black Live EDR is enabled\n\nThis step allows Expel to interact with your endpoints, for example, pull\nprocess listings, and so on.\n\n 1. Click on the Sensors icon on the left side panel and click any host name.\n\n 2. In the upper right corner, the button Go Live is active if VMware Carbon Black Live EDR is enabled. If it's active, you are DONE!\n\n 3. If VMware Carbon Black Live EDR isn't enabled and is hosted on-prem:\n\n * SSH into the CB appliance and perform the command `vi /etc/cb/cb.conf`.\n\n * Search for `CbLREnabled=False` and change the value from False to True.\n\n * Restart services for the change to take effect: `service cb-enterprise restart`.\n\n 4. If VMware Carbon Black Live EDR is not enabled and cloud-hosted:\n\n * Submit a request to the Carbon Black Cloud Support team requesting this feature be enabled. You can simply send the request with the following: “Please enable Live EDR and VDI Behavior”.\n\n## Step 2: Generate API credentials\n\nTo integrate the technology with Workbench, we need to create secure\ncredentials to the API.\n\nThis step creates an authentication token that allows the Expel Assembler to\naccess the VMware Carbon Black EDR API.\n\n### Obtain the API key for the Expel account\n\n 1. Log out of the VMware Carbon Black EDR Console.\n\n 2. Log back into the VMware Carbon Black EDR Console as the newly-created Expel User.\n\n 3. Click Expel User on the upper right, then My Profile, then API Token.\n\n 4. Make note of the API token. It's used next for registration within Workbench.\n\n## Step 3: Enable threat feeds\n\nExpel recommends enabling the following Carbon Black threat feeds at a\nminimum:\n\n * \\+ CB Advanced Threat\n\n * \\+ CB Community\n\n * \\+ CB Suspicious Feed\n\n * \\+ CB Tamper Detection\n\n * \\+ CB Early Access\n\n * \\+ SANS Feed\n\n * \\+ Expel (this feed is added and enabled by Expel)\n\n 1. Navigate to the Threat Intelligence icon.\n\n 2. Select Enable and the Create Alert options for each of the feeds.\n\n## Step 4: Configure the technology in Workbench\n\nNow that we have the correct access configured and noted the credentials, we\ncan integrate your tech with Workbench.\n\n 1. Login to https://workbench.expel.io/settings/security-devices?setupIntegration=carbon_black.\n\n 2. Enter the following information:\n\n![mceclip0.png](https://support.expel.io/hc/article_attachments/13874984471059/uuid-\ncd551474-a2f2-a52e-7e35-f85216a4b1dc.png)\n\n * Select Cloud or On-Prem (on premises) installation.\n\n * For On-Prem installations only, select an Assembler from the list. Select the assembler you set up in Getting connected to Expel Workbench.\n\n * For Name type the hostname of the VMware Carbon Black EDR device.\n\n * For Location type the geographic location of the appliance.\n\n * For Server address type the VMware Carbon Black EDR device IP or hostname in the following format: `https://10.0.0.10 or https://mycbraddress.com`\n\n * For API key type the API generated in Step 2.\n\n 3. Click Save.\n\n 4. You can provide console access now or set it up later. Use the instructions below to set it up later.\n\nYou can see if the device is healthy on the Security Devices page. It may take\na few minutes to see the device listed as healthy.\n\nTo check if alerts are coming through, navigate to the Alerts Analysis page.\nScroll to the device you want to check and click View alerts. Switch to grid\nview, then check the list for device alerts. It can take 36 to 72 hours for\nalerts to appear after setup, as we tune your device.\n\n## Step 5: Edit the device to add console access\n\nExpel needs console access to your device to allow our SOC analysts to dig\ndeeper during incident investigations. Additionally, our engineering teams use\nthis access to investigate potential health issues, including proper alert\ningestion.\n\n### Note\n\nExpel secures all login information our SOC analysts need about your devices\nin a MFA password product. Access to this login information is protected using\nour internal MFA processes. To learn more about the IP addresses all Expel\ntraffic comes from, go here.\n\n 1. Open Workbench. Go to Organization Settings > Security Devices. Next to the device you just connected, click the down arrow and click Edit.\n\n 2. In the Console Login area, type these details:\n\n * Console URL: type the console URL from the Server address in the Connection Settings area above. At the end of the URL, type **/login**.\n\n * Username: type the user name you created above.\n\n * Password: type the password you created above.\n\n * Two-factor secret key (32-character code): depending on how your organization enforces log-ins, this field may not apply to you. In these cases, you can leave it blank. This field is optional and if you have questions or concerns, reach out to your engagement manager or to support.\n\n 3. Click Save.\n\n### Tip\n\nThis article was accurate at the time of writing, but changes happen. If you\nfind the instructions are outdated, leave a description in the comment field\nbelow and let us know!\n\n"}