Abnormal Email Security
Step 1: Access Abnormal Security Platform #
- Log in to Abnormal Security Dashboard:
- Navigate to your Abnormal Security Management Dashboard.
- Go to Settings > API Access.
- Enable API Access:
- Ensure API access is enabled for your organization.
- Verify that you have the necessary permissions to create API tokens.
Step 2: Generate API Credentials #
- Create API Token:
- Navigate to Settings > API Access in your Abnormal Security dashboard.
- Click “Generate New Token” or “Create API Key”.
- Enter a descriptive name for the token (e.g., “SolCyber Integration”).
- Select the appropriate permissions for threat data access:
threats:read- Read access to threat datathreats:list- List threatsthreats:get- Get individual threat details
- Note API Credentials:
- Copy the API Base URL and Access Token from the API settings.
- These will be used in the SolCyber integration.
- Store the access token securely as it cannot be retrieved again. You will need to provide this information to SolCyber.
Step 3: Configure Threat Data Access #
- Set up Threat Data Permissions:
- Ensure your API token has access to the threat data you want to ingest.
- Verify that threat data is being generated and is accessible via the API.
- Test API Connectivity:
- Use Postman or cURL to test API requests to Abnormal Security.
- Verify that you can successfully retrieve threat data using your credentials.
Step 4: Network Configuration #
- Whitelist Databahn IPs:
- Add Databahn’s IP addresses to your Abnormal Security tenant’s allowed IPs if IP restrictions are enabled.
- Contact Databahn support for the specific IP ranges.
- Configure Rate Limits:
- Review and adjust API rate limits if necessary to accommodate your data ingestion needs.
Abnormal Security Integration Reference
External Documentation
- Refer to the Abnormal Security API Documentation for detailed information on API endpoints and data formats.
- For threat data structure, see Abnormal Security Threats API.