DeepSurface: Carbon Black Cloud
DocumentationInstallation GuideOverviewLet DeepSurface Host For YouGetting StartedSystem RequirementsSelf Hosted Quick Start - Installing to Cloud PlatformsSelf Hosted - Installation Using an OVARegistration, Package Installation, and InitializationFirst Steps After Initialization of the ConsoleDeployment OptionsMain and Subordinate ConsolesAgent-Based DeploymentUser Managed Scan DeploymentCredentialed Scanning DeploymentMixed EnvironmentDeployment ToolsActive Directory Group PolicyMicrosoft Endpoint Configuration Manager (part of InTune)Tanium DeployHCL BigFixIvantiVirtual MachinesVMWareVirtual BoxVirtualBox Guest AdditionsAWS EC2 (BYOL)AWS EC2 (Usage Based)Azure CloudGoogle CloudAdditional Items to ConsiderMain Console Server CertificatesLDAPTOFUClock SyncDeepSurface CommandsMultiple Vulnerability SourcesAPI DocumentationUser GuideReportingDashboardsExportsRisk InsightHostsPatchesVulnerabilitiesVulnerability InstancesUsersRemediation Workflow ManagerPlansSettingsIntegrationsWorkflowExportingAccepted Risk PlansAccepted Risk WorkflowExploreModelPathsActivityTasksConfiguration AlertsScan LogsNotification SettingsScanningStatusAgentsUser ManagedCredentialed Scanning SettingsCredentialsScan GroupsGeneral SettingsCloud ScanningNetwork ConnectivitySubordinatesVulnerability SourcesSetupSensitive Assets: PolicesSensitive Assets: ManualAdmin SettingsSMTP SettingsCertificatesOutbound ProxyAuthentication ProvidersUsersTagsIntegrations GuideVulnerability SourcesCrowdStrike SpotlightSentinelOneCarbon Black CloudMicrosoft Defender for EndpointWazuhLansweeper CloudNessus APITenable.io APISecurity Center/Tenable.sc APIRapid7 InsightVM APIQualys APINozomi GuardianEclypsiumAWS InspectorRemediationJira SoftwareTanium (BETA)Authentication ProvidersLDAP (Active Directory)SAML (Azure Active Directory)SAML (Google)SAML (Okta)PAMCyberArkDelinea (Thycotic)Microsoft LAPSSecurity GuideFirewall ConfigurationBase Network RequirementsAgent Network RequirementsCredentialed Scanning Network RequirementsAPI Network RequirementsHow DeepSurface Scans WorkDomain (LDAP) ScanningHost Scanning RoutineReasons for the Administrative Access RequirementEndpoint Protection ConsiderationsOther ItemsScope of Data Storage and RetentionIPS/IDS ConsiderationsLoggingResetting the DSADMIN passwordProduct InformationChangelogsOpen source LicensesEnd User License Agreement (EULA)
DeepSurface supports pulling vulnerability scan results from Carbon Black Cloud. To enable this integration we need to add Carbon Black as a third-party vulnerability scanning source. Results from Carbon Black can be imported to DeepSurface by connecting to the Carbon Black API.
Setting Up Carbon Black Cloud API Integration
To set up Carbon Black Cloud API access, please set up API credentials in your Carbon Black Cloud account, note your Org Key within API Access during that process for later use, and follow the instructions at the following pages in Carbon Black Cloud's documentation to set up a "Custom" Access Level for the credentials you create:
Then, in the DeepSurface console, navigate to Scanning > Settings > Vulnerability Scanners, click + Vulnerability Scanner
, select Carbon Black Cloud
, and fill out the following information:
Hostname: the base of the url you use to connect to the Carbon Black Cloud console, which should match one of the urls listed on Carbon Black Cloud Authentication: hostnames without the protocol (remove https://
from the front).
Org Key: You can find your Org Key in the Carbon Black Cloud Console under Settings > API Access on the top left of the page under the API Keys tab.
API ID: The API ID you received when setting up API credentials.
API Secret Key: The API Secret Key you received when setting up API credentials.
Trust on First Use (TOFU)