Skip to content

VMware Carbon Black Integration

Overview

VMware Carbon Black Cloud provides next-gen antivirus and EDR with behavioral detection. KYRA MDR collects Carbon Black alerts and events via the Event Forwarder or API for centralized security monitoring.

Prerequisites

  • A KYRA MDR Collector installed and running
  • Carbon Black Cloud console or CB Response server access
  • API key with appropriate permissions
  • Carbon Black Event Forwarder (for on-premises)

Configuration

For Carbon Black Cloud, configure SIEM integration:

  1. Log in to the Carbon Black Cloud Console
  2. Navigate to Settings > Connectors > SIEM
  3. Generate a SIEM Connector API Key
  4. Configure the KYRA MDR collector:
collector-config.yaml
sources:
- type: carbon-black
url: https://defense.conferdeploy.net
org_key: <org-key>
api_id: <api-id>
api_secret: <api-secret>
poll_interval: 60s
  1. Restart the collector service

Collected Log Types

Log TypeDescriptionSecurity Use
AlertsThreat and policy alertsEndpoint threat detection
Watchlist HitsCustom IOC matchesThreat intelligence correlation
Feed HitsThreat feed matchesKnown malware detection
Process EventsProcess execution dataBehavioral analysis, hunting
Network EventsEndpoint connectionsLateral movement detection
File EventsFile modificationsRansomware detection, forensics

Troubleshooting

No alerts from Cloud: Verify the SIEM API key permissions include Alerts and Notifications.

Event Forwarder issues: For on-premises CB Response, ensure the Event Forwarder service is running and RabbitMQ connection is healthy.

Missing process events: Carbon Black Cloud requires an Enterprise EDR license for full process telemetry.

Contact kyra@seekerslab.com for support.