What this integration is
This integration ingests Darktrace alert logs into your SOCFortress SIEM stack. Darktrace provides multiple event types that can be useful for SOC operations:- AI Analyst alerts
- Model breach alerts
- System status alerts
Data path (how it flows)
- Darktrace → API pull (token-authenticated)
- CoPilot collector → SIEM ingestion
- Optional: alerting and case workflows
Credentials you’ll need
Darktrace requires an API token pair (Public + Private). You typically need one per Master instance. Ways to obtain tokens:Per-user token
- Enable “API Access” for a local user (Threat Visualizer → Admin → Permissions)
- Log in as that user → Account Settings → generate API tokens
Global token
- Threat Visualizer → System Config → Settings → generate API tokens
CoPilot setup (recommended workflow)
- Provision the customer.
- Add Darktrace integration under the customer.
- Provide the Darktrace API endpoint + token pair.
- Validate alerts begin flowing.
Success criteria
- AI Analyst / Model Breach alerts show up in the SIEM
- Events are associated with the correct customer
Troubleshooting
- Confirm the user used for token creation has API access enabled.
- Confirm tokens are stored correctly and haven’t been rotated.
- Validate time range/polling schedule in the collector.
