Integrate Behavior Threats Incidents with Cortex XSIAM
Focus
Focus
SaaS Security

Integrate Behavior Threats Incidents with Cortex XSIAM

Table of Contents

Integrate Behavior Threats Incidents with Cortex XSIAM

Integrate Behavior Threats incidents with Cortex XSIAM.
SaaS Security supports streaming Behavior Threats incidents into Cortex XSIAM. By integrating these platforms, security teams can centralize behavioral alerts alongside other security telemetry, enabling a unified response to sophisticated threats. The integration leverages a push-based model where BT incidents are forwarded to a dedicated HTTP Log Collector in XSIAM. Once the connection is established, BT automatically sends incident data in JSON format, including detailed descriptions, severity levels, and user-specific identifiers.
The setup is a two-part process: preparing the destination in XSIAM and then registering that destination within the BT environment via the SRE/Engineering support service.
  1. Prepare the XSIAM HTTP Log Collector.
    Before BT can send data, you must define the entry point in Cortex XSIAM. Ensure the collector is configured to accept JSON log format. Upon creation, XSIAM will provide a unique URL and API Key. Save these credentials; they are required for the registration step.
  2. Register the XSIAM Tenant in Behavior Threats.
    Currently, the registration process requires an SRE or Engineering team member to interact with the BT support service. Provide TSG ID, URL, and region details to the support service.
    After configuration, BT will push incidents to XSIAM. The payload uses the ba_incident_event log type.
    Incident Attribute Reference
    AttributeDescription
    asv_tenant_idInternal BT-specific tenant identifier.
    tsg_idThe Tenant Service Group identifier.
    log_typeHardcoded to ba_incident_event.
    descriptionDetailed narrative of the detected behavior (for example, "Impossible Travel").
    incident_idUnique identifier for the incident in the BT system.
    severityNumerical value (0–5).
    severity_labelQualitative value (Very Low, Low, Medium, High, Critical).
    user_emailThe email address of the user associated with the activity.
    timestampThe time the incident was published to the syslog.
    The following is a sample of the data packet sent from BT to the XSIAM HTTP Log Collector:
    JSON
    { "asv_tenant_id": "lclnetsecprism6992",
    "tsg_id": "12345",
    "incident_id": "1234567",
    "log_type": "ba_incident_event",
    "description": "ChainLink accessed the application ms-office365-base from different locations which are too far apart to travel...",
    "date": "2025-08-11T12:00Z",
    "severity": 3,
    "severity_label": "Medium",
    "policy_id": 101,
    "policy_name": "policy_name",
    "user_email": "abc@example.com",
    "timestamp": "2025-12-02T11:06Z" }