HarfangLab EDR Integration
Integrate Noxys with HarfangLab EDR to correlate AI interaction events with endpoint detection and response data.
Overview
This integration enables:
- AI activity visibility in HarfangLab console
- Event correlation between AI and endpoint data
- Custom detection rules for AI threats
- Automated incident response via playbooks
- EU data residency — French EDR platform
Benefits:
- European alternative to US-based EDR
- Native French language support
- GDPR-compliant architecture
- Specialized in APT targeting French organizations
Data Flow:
Noxys Event → Webhook → HarfangLab API → Incident correlation → Alerts & Response
Prerequisites
- HarfangLab EDR subscription
- HarfangLab admin access
- Noxys admin role
- API token or credentials
Step 1: Generate HarfangLab API Token
Create API credentials for Noxys.
- HarfangLab Console → Settings → API Integration
- Click Create API Token
- Configure:
- Name:
Noxys AI Firewall - Description: "Integration for AI interaction data"
- Permissions: Select:
- ✓
events.write— Create events - ✓
incidents.write— Create incidents - ✓
alerts.write— Create alerts
- ✓
- Name:
- Click Generate
- Copy API Token (displayed once only)
Step 2: Get HarfangLab API Endpoint
Find your HarfangLab API endpoint.
- Settings → API Integration
- Note API Base URL:
- Typical format:
https://harfanglab.yourdomain.fr/api/v1
- Typical format:
- Copy for use in Noxys configuration
Step 3: Configure Webhook in Noxys
Set up event forwarding to HarfangLab.
- Noxys Admin Panel → Integrations → Webhooks
- Click Create Webhook
- Configure:
| Field | Value |
|---|---|
| URL | https://harfanglab.yourdomain.fr/api/v1/events |
| Events | interaction.policy_violated, interaction.high_risk, alert.severity_critical, alert.severity_high |
| Headers | Add: Authorization: Token <api-token-from-step-1> |
| Description | "HarfangLab EDR Integration" |
- Click Create
- Test to verify connectivity
Step 4: Verify Events in HarfangLab
Confirm Noxys events are appearing.
- HarfangLab Console → Events
- Filter:
source="noxys" - Should see events with:
- Event type (policy violation, high risk, etc.)
- Platform name (ChatGPT, Claude, etc.)
- Risk score
- Classifications detected
- User information
Step 5: Create Detection Rules
Build detection rules in HarfangLab.
Rule 1: Blocked Access to Unauthorized AI Platform
- HarfangLab → Detection → Rules → New Rule
- Configure:
Name: "Blocked attempt to use unauthorized AI platform"
Trigger Condition:
event.type == "interaction.policy_violated"
AND event.data.platform_id NOT IN ["chatgpt", "claude", "gemini"]
AND event.data.policy_decision == "block"
Response:
- Severity: High
- Create incident
- Notify SOC team
- (Optional) Isolate endpoint
- Save & Enable
Rule 2: PII Exposure Attempt
event.type == "interaction.high_risk"
AND event.data.risk_score > 0.9
AND event.data.classifications IN ["CREDIT_CARD", "IBAN", "PASSPORT"]
→ Severity: Critical
→ Create incident immediately
Rule 3: Repeated Violations from Same User
event.type == "interaction.policy_violated"
| stats count by user_id
| where count > 5 in last 60 minutes
→ Severity: Medium
→ Create incident for investigation
Step 6: Create Response Playbooks
Automate incident response.
- HarfangLab → Response → Playbooks → New Playbook
- Create playbook:
Trigger: Incident created from Noxys (Rule 1)
Steps:
1. Extract user_id and device_id from event
2. Query user's last 24h activity on this device
3. Check if user has completed security training
4. Send notification to user's manager
5. Create remediation task:
- Verify user didn't submit actual credentials
- Reset any exposed credentials if needed
- Schedule security awareness training
6. Close playbook
- Enable Playbook
Step 7: Build Dashboard
Create visibility dashboard for AI threats.
- HarfangLab → Dashboards → Create New
- Add widgets:
Widget 1: AI Events Volume (24h)
Count of Noxys events by time
Widget 2: Policy Violations by Platform
Distribution of violations across AI platforms
Widget 3: Top Affected Users
Users with most violations in last 7 days
Widget 4: Incident Trend
Number of incidents created from Noxys events
Widget 5: Blocked Events
Interactions blocked by policy
Trending up/down
Step 8: Test Integration
Verify end-to-end functionality.
- In Noxys:
- Create test interaction with PII
- Trigger policy violation
- In HarfangLab:
- Check event appears in Events list
- Verify detection rule triggers
- Confirm incident is created
- Verify notifications:
- Check email/Slack notification received
- Verify playbook executed (if applicable)
Advanced: Threat Hunting Integration
Use HarfangLab threat hunting on Noxys data.
-
Threat Hunting → Create Hunt
-
Query Noxys events:
source="noxys"
AND risk_score > 0.8
AND timestamp > NOW - 7 days -
Find patterns:
- Users accessing suspicious platforms
- Repeating patterns of violations
- Unusual times of activity
-
Create indicators of compromise (IOCs)
-
Block detections automatically
Compliance & Audit
Generate compliance reports:
- Reports → Compliance
- Create report:
- Title: "AI Threat Activity Report"
- Period: Last month
- Include: Incidents, violations, trends
- Export for compliance audit
Troubleshooting
Events Not Appearing
- Verify webhook is active
- Check API token is correct and hasn't expired
- Verify API endpoint URL is correct
- Test webhook manually:
- Click Test button
- Check response status
- Review HarfangLab API logs
Detection Rules Not Triggering
- Verify rule is Enabled
- Check rule condition logic
- Test rule with manual event creation
- Review rule evaluation logs
Playbook Not Executing
- Verify playbook is Active
- Check trigger condition matches event
- Test playbook manually
- Review execution logs for errors
Cost Considerations
HarfangLab pricing:
- Base EDR: €2000-5000/month
- Response automation add-on: €1000+/month
- Professional services: À la carte
No additional cost for Noxys webhook integration.
Best Practices
-
Filter events appropriately:
- Send only policy violations and high-risk events
- Skip routine created events (too noisy)
-
Test rules before enabling:
- Test with 1-week sample data
- Monitor false positive rate
- Adjust thresholds as needed
-
Use playbooks for automation:
- Automate initial triage
- Create tasks for high-severity incidents
- Reduce manual workload
-
Regular review:
- Weekly: Check detection effectiveness
- Monthly: Review and update rules
- Quarterly: Full security assessment
-
Document everything:
- Keep rules documented
- Document detection rationale
- Track changes over time
Integration with HarfangLab SOAR
If you have HarfangLab SOAR, create automated workflows:
-
SOAR Workflows:
- Trigger: Noxys alert received
- Action: Quarantine host (if configured)
- Notify: Security team via Slack
- Track: Incident in ticketing system
-
Enable cross-platform correlation:
- Link Noxys event to endpoint events
- Build full attack timeline
- Accelerate investigation
Data Retention
- Noxys data in HarfangLab: Per HarfangLab retention policy
- Incidents created: Retained according to HarfangLab settings
- Detection rules: Perpetual (until disabled/deleted)
Disabling Integration
To disable HarfangLab integration:
- Integrations → Webhooks → Delete webhook
- No more events are sent
- Existing incidents remain in HarfangLab
- Rules can be disabled or deleted
To re-enable:
- Follow configuration steps again
- Verify API token is still valid
- Events resume flowing
Support & Resources
- HarfangLab Docs: https://docs.harfanglab.io/
- API Documentation: https://docs.harfanglab.io/api/
- Community: https://community.harfanglab.io/
- Noxys Support: support@noxys.eu
Related Integrations
- Sekoia XDR — Alternative European XDR
- CrowdStrike Falcon — Enterprise EDR (US-based)
- Webhooks API — Custom webhook configuration