Security Operations email parsing

Generate new Security Operations records from external detection systems by using Email Parsing. This feature provides a method of integrating information from external tools, such as malware detection, vulnerability detection, firewalls, threat intelligence, and more.

How emails are parsed

Any system that can send an email, can create Security Operations records, for example, security incidents, requests, vulnerable items, vulnerabilities, security incident observables, attack methods, and more.

All Security Operations plugins (Security Incident Response, Threat Intelligence, and Vulnerability Response) have a property (email_to ) that defines the email address where external integrations should send emails to, to be parsed by the email parsers. See Email Processing > Properties for more information.

Email sent to any of the Security Operations email addresses is stored in an email events table. These emails are processed to determine whether they match any existing email parser.

Emails that have a match are flagged and the transform and duplication rules create or update a Security Operations record. The email is linked to that record and flagged as matched.

Emails that do not match are removed from the table and listed in Unmatched Emails. These emails can be reviewed to help build email parsers to handle these emails. A reprocess action allows you to run the unmatched email through the parsers again. The original email log is linked to that record.

The duplication rules for the email transform manage multiple emails relating to the same issue. These rules define what makes a duplicate record and can prevent duplicate records from being created. When a duplicate is detected, the rule specifies what action to take; no action (does not create a new record), create the new record as a child of the existing record, or update the existing record. The duplicate rule specifies which fields in the existing record are updated.

By default, email events are deleted after 30 days.

Multiple records

External detection systems (malware detectors, vulnerability, and so on) can send emails that report on multiple items at one time. The email parser supports separators within the email.

For example, a malware detector could send you an email report about about all systems within your network infected by one particular malware, with information about the malware first, followed by a list of the systems affected.

Malicious email example

In this example, when the Record Separator is set within your Email Transform as =================, it splits the email into four sections that are evaluated separately. This creates a Security Incident for three affected systems. The header section is detected as not having any affected systems, so it is used in all three records, and does not create a 4th record.

Field Transforms pull in data from each section. If something is in a header or footer of the email, applies to all records, such as Malware Hash, Malware Name, and Type in this example, the field transform for them should set Search for value to a value that searches within the email body, either at At the start of a line in the email body or Anywhere in the email body.

Field transforms must be set to search At the start of a line within the record section or Anywhere in the record section for data that is defined within each section, such as System, IP address, or Status.. The record section options are only available when there is a record separator defined within the email transform.

When parsing an email with a separator defined, records are only created for sections with at least one piece of section-specific data.

In this example, three records are created, even though there are four sections defined. The first section is a header, and it lacks anything specific to only one system. If any of the fields within the first section were filled in (System, IP, or Status), then a record would be created for that section, as well.