ExtraHop RevealX 360
Overview
The ExtraHop RevealX 360 integration connects the Praetorian Guard Platform (PGP) with ExtraHop's cloud-native network detection and response platform. By importing network devices and security detections, PGP gains comprehensive visibility into your network infrastructure, including devices that may not appear in traditional asset inventories.
Network-based discovery is a powerful complement to other asset discovery methods. Devices that communicate on your network are automatically detected by ExtraHop, and this integration brings that device intelligence into PGP along with security hardening detections. This allows your security team to correlate network-level findings with vulnerabilities and risks discovered through other PGP integrations.
The integration operates in a read-only capacity, querying the ExtraHop REST API to retrieve device information and security detections. It does not modify any configurations or data within your ExtraHop environment.
What the Integration Does
The ExtraHop RevealX 360 integration performs two primary data collection tasks:
Device Discovery: Queries the ExtraHop device search API to discover all devices that have been active within the last 7 days. Each device with a valid IP address (IPv4 or IPv6) is imported as an asset into PGP.
Detection Import: Queries the ExtraHop detection search API for security hardening detections (category
sec.hardening). Each detection is mapped to a previously discovered device and imported as a risk in PGP, complete with severity scoring, descriptions, and proof data.
Detections are correlated with devices through participant data. The integration maps ExtraHop risk scores to PGP triage levels: Critical (90+), High (70-89), Medium (50-69), Low (30-49), and Info (below 30).
All operations are strictly read-only. PGP does not modify, create, or delete any data in your ExtraHop environment.
Prerequisites
Before setting up the ExtraHop RevealX 360 integration, ensure you have:
An ExtraHop RevealX 360 account with API access enabled
REST API credentials: A Client ID and Client Secret with read access to devices and detections
Your ExtraHop API base URL: The cloud console URL for your ExtraHop instance (e.g.,
https://your-instance.extrahop.com)
Creating API Credentials
Sign in to your ExtraHop RevealX 360 console.
Navigate to Administration > API Access.
Click Create Credentials to generate a new Client ID and Client Secret pair.
Ensure the credentials have read permissions for devices and detections.
Copy the Client ID and Client Secret. The secret is only shown once at creation time.
Setup
In PGP, navigate to the Integrations page.
Select ExtraHop RevealX 360 from the list of available integrations.
Enter the required credentials and your ExtraHop base URL.
Save the integration. PGP will validate connectivity by requesting an OAuth2 access token.
Field Reference
What Data Is Synced
Network Devices (Assets)
Devices active within the last 7 days are imported as assets. The integration resolves the best available name for each device using the following priority: DNS name, DHCP name, display name, then IP address.
Devices without any IP address (neither IPv4 nor IPv6) are skipped.
Security Detections (Risks)
Security hardening detections are imported as risks and linked to their associated device assets.
Severity Mapping
API Endpoints Used
The integration uses OAuth2 client credentials flow for authentication. Tokens are automatically refreshed at 90% of their expiry time to ensure uninterrupted access during data collection.
Troubleshooting
Security and Data Handling
The ExtraHop RevealX 360 integration operates in a strictly read-only mode. It queries the ExtraHop REST API to retrieve device metadata and security detections and does not modify any configurations, rules, or data within your ExtraHop environment.
Credentials are handled securely within PGP. The Client ID and Client Secret are encrypted at rest and used exclusively to obtain short-lived OAuth2 access tokens via the client credentials grant. Access tokens are held in memory only for the duration of the sync operation and are not persisted to disk.
PGP imports only device metadata (IP addresses, hostnames, display names) and detection summaries (type, severity, description). No packet captures, network traffic data, or raw telemetry is accessed or stored.