Skip to main content
Skip table of contents

Abnormal Security

What is Abnormal Security?

Abnormal provides cloud-native, AI-powered protection against email attacks including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.

Why Should You Use the Abnormal Security Connector?

The Abnormal Security connector provides visibility into the threats and assets in your environment. You can use this visibility to:

  • manage threats

  • ensure assets are managed per your security policies

  • derive relationships between assets, users, applications, and data

How Does This Connector Work?

Lucidum executes read-only requests to the Abnormal Security REST API and ingests only meta-data about Abnormal Security devices. Lucidum does not retrieve any data stored on your assets.

Configuring the Connector in Lucidum

Field

Description

Example

Profile Name

Name of the profile

Lucidum

URL

The URL for the Abnormal Security API.

https://api.abnormalplatform.com

API Token

API key for a Abnormal Security account with read access.

For details on generating an API token in Abnormal Security, see https://abnormalsecurity.my.site.com/knowledgebase/s/article/Abnormal-REST-API-Integration#Integration-Steps

************

Source Documentation

Creating Credentials

For details on creating credentials in Abnormal Security for use by the Lucidum connector, see https://abnormalsecurity.my.site.com/knowledgebase/s/article/Abnormal-REST-API-Integration#Integration-Steps

Required Permissions

The API token includes read and write permissions.

API Documentation

https://app.swaggerhub.com/apis/abnormal-security/abx/1.4.1#/Threats/get_threats__threatId_

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.