Panther supports ingesting SOCRadar threat intelligence via webhook
Overview
Panther has the ability to ingest SOCRadar security incidents in real-time through HTTP webhooks. SOCRadar is an Extended Threat Intelligence platform that provides comprehensive visibility into cyber threats including Deep & Dark Web monitoring, digital risk protection, attack surface management, and threat intelligence.
How to onboard SOCRadar logs to Panther
Step 1: Create a new SOCRadar source in Panther
In the left-hand navigation bar of your Panther Console, click Configure > Log Sources.
Click Create New.
Search for "SOCRadar," then click its tile.
In the upper-right corner, click Start Setup.
In the Basic Information sectionm, fill in the following fields:
Name: Enter a descriptive name for the source.
Schemas - Optional: Should be prepopulated with SOCRadar.Incidents.
Select your preferred authentication method.
Basic: Enter Username and Password values.
Be sure to securely store your Password value. It will not be visible in the Panther Console.
Bearer: Enter a Bearer Token. In the value you enter, do not include "Bearer."
Be sure to securely store your Bearer Token value. It will not be visible in the Panther Console.
Click Setup.
You will be directed to a verification screen. Leave this open while you configure SOCRadar in the next step.
Take note of your HTTP Source URL. You will need these values in the next step.
Step 2: Configure webhook in SOCRadar
Instructions may vary based on your SOCRadar plan.
Navigate to Settings > Integrations or Notifications.
Select the webhook or HTTP notification option.
Create a new webhook integration with the following details:
Webhook URL: Paste the URL from Step 1.
Authentication: Configure according to your chosen method (Basic or Bearer token).
Event Types: Select the incident types you want to send to Panther.
Save the webhook configuration.
Test the webhook connection using SOCRadar's test feature, if available.
If you send a test event from SOCRadar using their built-in test feature, it will fail to classify in Panther. This is expected behavior, as SOCRadar sends test events that do not match the structure of normal SOCRadar incident events. Real incidents from SOCRadar will classify correctly.
Supported log types
SOCRadar.Incidents
SOCRadar security incidents provide visibility into various threats including dark web findings, credential intelligence, phishing detection, attack surface monitoring, and compliance tracking.