Set up IoT Security and XSOAR for ServiceNow Integration

Set up IoT Security and Cortex XSOAR to integrate with ServiceNow.
To set up IoT Security to integrate with ServiceNow, you need the URL of your ServiceNow instance and the username and password of a ServiceNow user account that allows XSOAR to add device attributes, security alerts, and device vulnerabilities to the device and incident tables you created in ServiceNow.
  1. Log in to the IoT Security portal and then access ServiceNow settings in Cortex XSOAR.
    1. Log in to IoT Security and then click
      Integrations
      .
    2. IoT Security uses Cortex XSOAR to integrate with ServiceNow, and the settings you must configure to integrate with it are in the XSOAR interface. To access these settings, click
      Launch Cortex XSOAR
      .
      The Cortex XSOAR interface opens in a new browser window.
    3. Click
      Settings
      in the left navigation menu, search for
      servicenow
      to locate it among other instances.
  2. Configure the ServiceNow integration instance.
    1. Click the integration instance settings icon ( ) for PANW IoT 3rd Party ServiceNow Integration Instance to open the settings panel.
      Do not change the default integration instance name (PANW IoT 3rd Party ServiceNow Integration Instance). XSOAR jobs for ServiceNow use playbooks that refer to this integration instance name specifically
    2. Scroll down until you reach the section with the ServiceNow URL, Username/Client ID, and Password fields.
    3. Fill in these three fields with the URL of the ServiceNow instance and the username and password of the user account you created in ServiceNow. Leave the other settings at their default values.
    4. When finished, click
      Run test
      or
      Test
      .
      If the test is successful, a Success message appears. If not, check that the settings were entered correctly and then test the configuration again.
    5. After the test succeeds, click
      Save & exit
      to save your changes and close the settings panel.
  3. If you want to convert the device category names that IoT Security sends to ServiceNow to match those that ServiceNow uses, create category name mappings.
    In XSOAR, map the names for IoT Security device categories to those in ServiceNow. You must define these mappings in the two jobs that XSOAR uses to send device attributes to ServiceNow.
    1. Click
      Jobs
      and then search for
      servicenow
      . XSOAR displays two jobs:
      PANW IoT Bulk Export To Servicenow
      and
      PANW IoT ServiceNow integration
      .
    2. Select
      PANW IoT ServiceNow integration
      , and then click
      Edit
      .
    3. Scroll down to the Custom Fields section and find the PANW-ServiceNow-Category-Map table.
    4. Click
      + Add row
      and enter a name in the PANW IoT Category column and its corresponding name in the ServiceNow Category column.
    5. Continue adding rows and entries in the two columns to map more IoT Security device categories to ServiceNow categories.
    6. When done, click
      Update Job
      .
    7. Add the same entries to the PANW-ServiceNow-Category-Map table in the PANW IoT Bulk Export To Servicenow job.
  4. If you use an existing device cmdb table with a different table label or different column labels, set the corresponding table and column names in Cortex XSOAR jobs that send device records to ServiceNow.
    If you are using the default table and column labels in ServiceNow, skip this step.
    1. Click
      Jobs
      , select
      PANW IoT ServiceNow integration
      , and then click
      Edit
      .
    2. Edit the default values to match those you used in the ServiceNow table to which XSOAR will send device records.
    3. When done, click
      Update Job
      .
    4. Select
      PANW IoT Bulk Export to ServiceNow
      , click
      Edit
      , make the same changes there, and then click
      Update Job
      .
  5. To enable the ServiceNow integration instance, click
    Settings
    and then click
    Enable
    next to the instance name.
  6. Return to the IoT Security portal and check the status of the ServiceNow integration.
    XSOAR automatically runs a preconfigured job for ServiceNow integration and reports the integration instance to IoT Security, which displays it on the Integrations page. The integration instance can be in one of the following four states as shown in the Status column on the Integrations page:
    • Disabled
      means that either the integration was configured but intentionally disabled or it was never configured and a job that references it is enabled and running.
    • Error
      means that the integration was configured and enabled but is not functioning properly, possibly due to a configuration error or network condition.
    • Inactive
      means that the integration was configured and enabled but no job has run for at least the past 60 minutes.
    • Active
      means that the integration was configured and enabled and is functioning properly.
    When you see that the integration instance status has changed from
    Disabled
    to
    Active
    , its setup is complete.
    XSOAR begins an automated process that sends ServiceNow incrementally updated data from IoT Security about changes to device attributes occurring within the last 15 minutes.
  7. Export the IoT device inventory from IoT Security to ServiceNow.
    Although regular, automated incremental updates are now in progress, ServiceNow doesn’t yet have a complete device inventory from IoT Security. This requires a bulk data export from IoT Security to ServiceNow that you initiate from the XSOAR interface. The process is somewhat time consuming; for example, exporting an inventory of 30,000–40,000 IoT devices can take up to 36 hours.
    To start the bulk export of the entire device inventory, click
    Launch Cortex Access
    to return to the XSOAR interface. Click
    Jobs
    , select
    PANW IoT Bulk Export to ServiceNow
    , and then click
    Run now
    .
    During the bulk export and after the job completes, the automated incremental update will continue running every 15 minutes.

Recommended For You