Awake Security
Awake Security (Arista NDR) is a network traffic analysis solution capable of detecting and visualizing behavioral, mal-intent and compliance incidents.
Use Cases the Adapter Solves
The Awake Security adapter could be used in various use cases, including:
- Add Network-Discovered Devices to the Inventory - Fetch assets identified by the Awake Security passive network analysis to discover unmanaged devices, IoT devices, or devices without a management agent.
- Prioritize Network Threats - Combine the Awake Security threat data with asset details (owner, software, vulnerabilities) to help prioritize risk and response.
- Query for Network Anomalies - Identify devices with unusual network behavior or policy violations as detected by Awake Security.
- Configure Automated Actions on Threat Detection - Use the Awake Security threat or incident data as a trigger for Enforcement Center actions, such as tagging an asset or creating a service desk ticket.
Asset Types Fetched
This Awake Security adapter fetches the following types of assets:
- Devices
Data Retrieved through the Adapter
The following data is retrieved through the Awake Security adapter:
- Network Details - IP address (IPv4, IPv6), MAC address, and hostname.
- Device Identification - Device type (for example: IoT, printer, server), manufacturer, and operating system (as observed from network traffic).
- Location - Network segment or VLAN on which the device was seen.
- Threat and Incident Data - Associated threat scores, risk levels, and specific incident/threat names.
- Activity Details - Protocols used (for example: SSH, RDP), as well as domains or IP addresses communicated with.
- First/Last Seen - Timestamps for when the device was first and last observed on the network.
Before You Begin
Required Ports
- TCP port 443
Authentication Methods
You must have the Username and Password of a user account on the Awake Security appliance.
Required Permissions
The Awake Security appliance user account must have a role with Read-Only access to the Awake Security data.
APIs
The Awake Security adapter connects to the Awake Appliance API. The API resources are hosted under the /awakeapi/v1/ path prefix.
Connection Parameters
To connect the adapter in Axonius, provide the following parameters.
Required Parameters
- Host Name or IP Address - Enter the hostname or IP address of the Awake Security server that Axonius can communicate with via the Required Ports. Specify either
http://orhttps://in the beginning of the hostname or IP address. - User Name and Password - Enter the credentials for a user account that has permission to fetch assets.
Optional Parameters
- Verify SSL - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
- Scan History (Days) - Enter the number of days that defines the period for fetching data with this adapter. You can enter a number of days or keep the default value of 30 days.
- HTTPS Proxy - Enter an HTTPS proxy address to connect the adapter to a proxy instead of directly connecting it to the domain.
- HTTPS Proxy User Name - The user name to use when connecting to the value supplied in Host Name or IP Address via the value supplied in HTTPS Proxy.
- HTTPS Proxy Password - The password to use when connecting to the server using the HTTPS Proxy.
To learn about additional optional/common adapter connection parameters and options, see Adding a New Adapter Connection.
Updated 1 day ago
