Triggers (Webhooks)
A quick and easy way of integrating with other security suites
Last updated
A quick and easy way of integrating with other security suites
Last updated
In AIR, webhooks act as triggers that enable integration with other security tools, such as SIEM, SOAR, or EDR systems. They allow AIR to automatically initiate evidence collection, analysis, and presentation of findings in response to alerts received from these tools.
APIs and webhooks both enable system integration and communication between applications but serve different use cases. APIs are often preferred over webhooks due to greater control, flexibility, and broader operational capabilities.
A trigger is the combination of a parser, an acquisition profile, and a destination for saving the collected evidence (either local or remote options are available).
Users access webhooks via the Integrations button in the Main Menu and by selecting Webhooks from the Secondary Menu. To create a new Webhook select +Add New:
Triggers are basic REST endpoints that can be called via HTTP GET or POST methods
Each trigger
Starts with the AIR Console address (AIR-ADDRESS)
Has a name that makes it easy to remember (TRIGGER-NAME)
Has a security token (TRIGGER-TOKEN) attached to it that can be regenerated when needed
Optionally an Endpoint Identifier that could either be the hostname or the IP address of the endpoint trigger is being called for
GET Triggers expect this information in the URL
POST Triggers extracts this information from the Webhook Payload
To make it easier to integrate with any trigger source, AIR provides two alternative methods of receiving endpoint information (name or IP address):
URL Parser (HTTP GET)
Webhook Parser (HTTP POST)
This method requires the trigger source to provide an endpoint name or IP address directly in the URL.
Below is an example GET request and response for collecting "Browsing History" from an endpoint with the name "JohnPC".
Request: http://192.168.1.100/api/trigger/browsing-trigger/JohnPC?token=...
Even without using a SIEM/SOAR, the above URL can be used for starting an acquisition task simply by:
Visiting it with a web browser,
Adding it to the click action of an HTML button in your case management alert reports,
Creating a simple script for making a GET request to this address.
Webhook parsers require the trigger source to provide the endpoint information inside a JSON payload which is POSTed to the trigger.
Splunk Parser which is provided out-of-box is a very basic example of this. After adding a trigger URL as a POST workflow action, whenever Splunk generates an alert for an endpoint, it posts JSON alert data containing the endpoint information as a nested property which is parsed by the trigger parser. The parser then uses this information for starting an acquisition on the endpoint automatically. You can read Splunk POST Workflow Actions documentation for more information.
You can contact [email protected] for requesting additional trigger parsers for major SIEM/SOAR/EDR products.
Each created trigger contains a dedicated security token that can be revoked at any time.
Once you re-generate a security token, all previous integrations using the old security token will start receiving HTTP 401/Unauthorized.