Set up Microsoft SCCM with a user account that Cortex XSOAR can use when securely connecting to it.
Where Can I Use This?
What Do I Need?
IoT Security (Managed by IoT Security)
IoT Security subscription for an advanced
IoT Security product (Enterprise Plus, Industrial
OT, or Medical)
One of the following Cortex XSOAR setups:
An IoT Security Third-party Integration Add-on
license that includes a cohosted, limited-featured
Cortex XSOAR instance
AND
A Cortex XSOAR Engine (on-premises integration)
A full-featured Cortex XSOAR server
The only configuration that’s required for Microsoft SCCM is the creation of a user for
Cortex XSOAR to authenticate itself to the SQL server when connecting.
Configure a user account for Cortex XSOAR.
Log in to the Microsoft SQL Server Management Studio
with an account that has permissions to create user accounts.
Click Security in the navigation panel,
right-click Logins, and then click New
Login.
The Login - New dialog box appears.
In the General panel, configure a user account with either
Windows authentication or SQL Server authentication and specify
a default SQL database to which the account has access.
Windows
authentication: Select this option to authenticate the
user through Active Directory.
Login name:
Enter the Windows DOMAINNAME\USERNAME for a
user that was previously configured in Active Directory and has
read-only access to the SQL server. For example: ACMECORP\XSOAR
or
SQL
Server authentication: Select this option to authenticate
the user from accounts stored locally on the SQL server.
Login
name: Enter a name for the user account. For example: XSOAR
Password and Confirm
Password: Enter a password for the user account.
User
must change password at next login: (clear)
Default
database: Choose the database from which you want Cortex XSOAR to retrieve device information.
In the User Mapping panel, give the account read-only access
to the default database as well as any additional databases.
Users
mapped to this login: Select the check box for the SQL
databases that you want to allow the account to access.
Database
role membership for <database-name>: For each database,
select db_datareader.