Thinkst Canary integration overview
You can integrate Thinkst Canary with Sophos Central so that it sends alerts to Sophos for analysis.
This page gives you an overview of the integration.
Thinkst Canary product overview
Thinkst Canary offers honeypots and tokens designed to detect intruders in your environment. By mimicking genuine assets, Canaries attract attackers, triggering alerts when interacted with. These high-fidelity alerts give security teams early warning of potential breaches with minimal false positives.
Sophos documents
What we ingest
Sample alerts seen by Sophos:
Host Port ScanCanarytoken triggeredCanary DisconnectedSSH Login AttemptShared File OpenedConsolidated Network Port ScanMultiple Canaries DisconnectedMSSQL Login AttemptFTP Login AttemptGit Repository Clone AttemptHTTP Page Load
Filtering
We filter messages as follows:
- We ALLOW only messages that are in the correct format.
- We DENY messages that aren't in the correct format but we don't DROP the data.
Sample threat mappings
We define the alert type as follows:
If the field description.events exists and has a length greater than 0, and the first entry in description.events.type exists, concatenate the field summary with the first entry in description.events.type.
If the field description.events doesn't exist or has a length of 0, use the field summary instead.
Sample mappings:
{"alertType": "MySQL Login Attempt", "threatId": "TA0008", "threatName": "Lateral Movement"}
{"alertType": "TFTP request", "threatId": "T1046", "threatName": "Network Service Scanning"}
{"alertType": "Canary Disconnected", "threatId": "T1489", "threatName": "Service Stop"}