Connector Setup Guide

Step-by-step instructions for configuring each connector type.

Overview

Connectors enable Triage Warden to:

  • Ingest alerts from SIEMs and security tools
  • Enrich incidents with threat intelligence
  • Execute actions like creating tickets or isolating hosts
  • Send notifications to communication platforms

Adding a Connector

  1. Navigate to Settings → Connectors
  2. Click Add Connector
  3. Select connector type
  4. Fill in the required fields
  5. Click Test Connection to verify
  6. Click Save

Threat Intelligence Connectors

VirusTotal

Enriches file hashes, URLs, IPs, and domains with reputation data.

Prerequisites:

Configuration:

FieldValue
NameVirusTotal
Typevirustotal
API KeyYour API key
Rate Limit4 (free) or 500 (premium)

Rate Limits:

  • Free tier: 4 requests/minute
  • Premium: 500+ requests/minute

Verify It Works:

  1. Create a test incident with a known-bad hash
  2. Check incident enrichments for VirusTotal data

AlienVault OTX

Open threat intelligence from AlienVault.

Prerequisites:

Configuration:

FieldValue
NameAlienVault OTX
Typealienvault
API KeyYour OTX API key

SIEM Connectors

Splunk

Ingest alerts from Splunk and run queries.

Prerequisites:

  • Splunk Enterprise or Cloud
  • HTTP Event Collector (HEC) token
  • User with search capabilities

Configuration:

FieldValue
NameSplunk Production
Typesplunk
Hosthttps://splunk.company.com:8089
UsernameService account username
PasswordService account password
Appsearch (or your app context)

Setting Up Webhooks:

  1. In Splunk, create an alert action that sends to webhook
  2. Configure webhook URL: https://triage.company.com/api/webhooks/splunk
  3. Set webhook secret in Triage Warden connector config

Elastic Security

Connect to Elastic Security for SIEM alerts.

Prerequisites:

  • Elasticsearch 7.x or 8.x
  • User with read access to security indices

Configuration:

FieldValue
NameElastic SIEM
Typeelastic
URLhttps://elasticsearch.company.com:9200
UsernameService account username
PasswordService account password
Index Patternsecurity-* or .alerts-security.*

Microsoft Sentinel

Azure Sentinel integration for cloud SIEM.

Prerequisites:

  • Azure subscription with Sentinel workspace
  • App registration with Log Analytics Reader role

Configuration:

FieldValue
NameAzure Sentinel
Typesentinel
Workspace IDLog Analytics Workspace ID
Tenant IDAzure AD Tenant ID
Client IDApp Registration Client ID
Client SecretApp Registration Secret

Azure Setup:

  1. Create App Registration in Azure AD
  2. Grant Log Analytics Reader role on Sentinel workspace
  3. Create client secret
  4. Copy IDs and secret to Triage Warden

EDR Connectors

CrowdStrike Falcon

Endpoint detection and host isolation.

Prerequisites:

  • CrowdStrike Falcon subscription
  • API client with appropriate scopes

Configuration:

FieldValue
NameCrowdStrike Falcon
Typecrowdstrike
Regionus-1, us-2, eu-1, or us-gov-1
Client IDOAuth Client ID
Client SecretOAuth Client Secret

Required API Scopes:

  • Detections: Read
  • Hosts: Read, Write (for isolation)
  • Incidents: Read

CrowdStrike Setup:

  1. Go to Support → API Clients and Keys
  2. Create new API client
  3. Select required scopes
  4. Copy Client ID and Secret

Microsoft Defender for Endpoint

MDE integration for alerts and host actions.

Prerequisites:

  • Microsoft 365 E5 or Defender for Endpoint license
  • App registration with Defender API permissions

Configuration:

FieldValue
NameDefender for Endpoint
Typedefender
Tenant IDAzure AD Tenant ID
Client IDApp Registration Client ID
Client SecretApp Registration Secret

Required API Permissions:

  • Alert.Read.All
  • Machine.Read.All
  • Machine.Isolate (for isolation actions)

SentinelOne

SentinelOne EDR integration.

Prerequisites:

  • SentinelOne console access
  • API token with appropriate permissions

Configuration:

FieldValue
NameSentinelOne
Typesentinelone
Console URLhttps://usea1-pax8.sentinelone.net
API TokenYour API token

Ticketing Connectors

Jira

Create and manage security tickets.

Prerequisites:

  • Jira Cloud or Server instance
  • API token (Cloud) or password (Server)

Configuration:

FieldValue
NameJira Security
Typejira
URLhttps://yourcompany.atlassian.net
EmailYour Jira email
API TokenAPI token from Atlassian account
Default ProjectSEC (your security project key)

Jira Cloud Setup:

  1. Go to id.atlassian.com/manage-profile/security/api-tokens
  2. Create API token
  3. Use your email as username

Jira Server Setup:

  • Use password instead of API token
  • Ensure user has project access

ServiceNow

ServiceNow ITSM integration.

Prerequisites:

  • ServiceNow instance
  • User with incident table access

Configuration:

FieldValue
NameServiceNow
Typeservicenow
Instance URLhttps://yourcompany.service-now.com
UsernameService account username
PasswordService account password

Identity Connectors

Microsoft 365 / Azure AD

User management and sign-in data.

Prerequisites:

  • Azure AD with appropriate licenses
  • App registration with Graph API permissions

Configuration:

FieldValue
NameMicrosoft 365
Typem365
Tenant IDAzure AD Tenant ID
Client IDApp Registration Client ID
Client SecretApp Registration Secret

Required API Permissions:

  • User.Read.All
  • AuditLog.Read.All
  • User.RevokeSessions.All (for user disable)

Google Workspace

Google Workspace user management.

Prerequisites:

  • Google Workspace admin access
  • Service account with domain-wide delegation

Configuration:

FieldValue
NameGoogle Workspace
Typegoogle
Service Account JSONPaste JSON key file contents
Domaincompany.com

Google Setup:

  1. Create service account in Google Cloud Console
  2. Enable domain-wide delegation
  3. Add required OAuth scopes in Google Admin
  4. Download JSON key file

Testing Connectors

After configuration, always test:

  1. Click Test Connection in connector settings
  2. Check the response for success/errors
  3. For ingestion connectors, verify sample data appears

Common Issues

ErrorSolution
Connection refusedCheck URL and network access
401 UnauthorizedVerify credentials/API key
403 ForbiddenCheck permissions/scopes
SSL certificate errorVerify certificate or disable verification
Rate limitedReduce request rate or upgrade tier

Connector Health

Monitor connector health at Settings → Connectors or via API:

curl http://localhost:8080/health/detailed | jq '.components.connectors'

Healthy connectors show status connected. Troubleshoot any showing error or disconnected.