FireEye Central Management (CM)

Version: 1.1
Updated: Jul 06, 2023
Centralized device and intelligence management to correlate data across attack vectors.
Actions
- Get Alert Info (Enrichment) - Query FireEye CM for alert details.
- Get ATI Details (Enrichment) - Query FireEye Advanced Threat Intelligence for intelligence data.
- Get Event Info (Enrichment) - Get information from previously generated event.
- Add Snort Rule (Containment) - Add a new Snort rule.
- Add YARA Rule (Containment) - Add a new YARA rule.
- Acknowledge Alert (Containment) - Notate previously generated alert.
Configure FireEye Central Management (CM) in Automation Service and Cloud SOAR
Before you can use this automation integration, you must configure its authentication settings so that the product you're integrating with can communicate with Sumo Logic. For general guidance, see Configure Authentication for Automation Integrations.
How to open the integration's configuration dialog
- Access App Central and install the integration. (You can configure at installation, or after installation with the following steps.)
- Go to the Integrations page.
Classic UI. In the main Sumo Logic menu, select Automation and then select Integrations in the left nav bar.
New UI. In the main Sumo Logic menu, select Automation > Integrations. You can also click the Go To... menu at the top of the screen and select Integrations. - Select the installed integration.
- Hover over the resource name and click the Edit button that appears.
In the configuration dialog, enter information from the product you're integrating with. When done, click TEST to test the configuration, and click SAVE to save the configuration.

For information about Trellix Central Management (formerly FireEye Central Management), see Trellix documentation.
Change Log
- June 21, 2019 - First upload
- July 6, 2023 (v1.1) - Updated the integration with Environmental Variables