Skip to main content

Integrating Darktrace with FA&I

Automated Investigations based on model alerts and AIA incident events

  1. To integrate the two platforms, please follow the previous document here to log into the FA&I instance and create an API key. Select Darktrace as the role.
  2. In Darktrace Threat Visualizer screen, navigate to System Config > Modules (/system-config#modules)
  3. Select Modules, Workflow Integrations then click on Darktrace /Forensic Acquisition & Investigation

Modules

  1. Make sure the Integration is Enabled then click on + New
  2. Ensure 'Send Alerts' is enabled, and insert the URL for the FA&I SaaS instance and the Darktrace role API key that you have just created

Settings

  1. You can configure the alerts sent at a more granular level using the advanced options. Ensure Send Cyber AI Analyst Alerts and Send Model Alerts is enabled at a minimum.

Advanced

  1. Click Save
  2. Click on Verify alert settings

Manual Investigations

NOTE: In later Darktrace versions, the Forensic module can be automatically configured by enabling the 'Allow auto-configuration' setting. If this is not available to you, follow these steps:

  1. To manually configure the Forensics module, close the Workflow Integrations screen and select Forensics module, then click on Darktrace /Forensic Acquisition & Investigation

Manual

  1. Select Settings, then use the same URL and API Key for the workflow integration in the form, then click on Save. Leave Groups, Users, and JWT fields blank.

Manual

  1. Click on Authorize

Manual