Silent Push integrates seamlessly with Google SecOps to empower security teams with advanced threat intelligence. This allows users to enrich events and alerts with contextual data, automate incident investigations, and streamline detection and response processes. By leveraging Silent Push's API, you can perform actions like reputation checks, DNS lookups, certificate retrievals, and more directly within the Google SecOps environment.
Prerequisites
Active access to a Google SecOps instance.
Valid Silent Push API credentials (API key required).
Familiarity with Google SecOps Marketplace, Response IDE, and case simulation features.
Installation and Configuration
Log in to your Google SecOps dashboard.
Navigate to the Google SecOps Marketplace and search for Silent Push.

Click Install to add the Silent Push integration.
After installation, click Configure and enter the required parameters:
API Key: Your Silent Push API key.
Silent Push Server: The endpoint for Silent Push services (default or custom as provided).

Navigate to the Application Menu, go to Response > IDE, then search for Silent Push to view the available actions.

Set Up Test Cases for Action Execution
To test or run actions, create a simulated test case in Google SecOps:
From the left dashboard, select Cases.

Click the icon to add a new case.

Choose Simulate Cases, click the icon to Add or Import Case.
Select Add New Case and provide details such as:
Source / SIEM Name
Rule Name
Alert Product
Alert Name
Event Name
Additional Alert Fields
Additional Event Fields
Click Save to create the case.
Reopen the Simulated Cases list, search for your case, and select it.

Click Create, choose the environment, and select Simulate.
Return to the Cases list; your case should now appear.
Open the case, click the three-dot menu (⋮), and select Ingest alert as test case.
The test case is now available in the Test Case dropdown for running actions.
Steps to Run Silent Push Actions
In the Response IDE, select the desired Silent Push action from the list.
Open the Testing panel.

Select:
Scope: All Entities
Test Case: For example, Silent Push
Integration Instance: Default
Enter the mandatory parameters (and optional ones for refinement).
Click Run to execute.
View results in the expandable panel below.

Available Actions and Usage
Below is a list of key actions with descriptions, required parameters, and execution notes. All actions require the setup above. Optional parameters can enhance filtering or output.
Add Feed: Creates a new feed for organizing indicators.
Required: Feed details (e.g., name, type).
Usage: Enter feed parameters and run to add.
Add Feed Tags: Adds tags to an existing feed for better organization.
Required: Feed UUID, tags.
Usage: Specify feed and tags; optional for custom filtering.
Add Indicator: Adds domains, IPs, or other indicators to a feed.
Required: Feed UUID, indicator value.
Usage: Provide indicator details; optional timestamps or metadata.
Add Indicator Tags: Attaches tags to indicators in a feed.
Required: Feed UUID, indicator, tags.
Usage: Useful for classification; optional for bulk operations.
Density Lookup: Checks Domain Density on a nameserver to detect suspicious infrastructure.
Required: qtype (e.g., NS), query (nameserver).
Usage: Run with scope and test case; view density metrics in results.
Forward Padns Lookup: Performs forward Passive DNS lookups with filters.
Required: qtype (e.g., A), qname (domain).
Usage: Optional filters, such as time range; results show DNS resolution.
Get ASN Reputation: Retrieves reputation data for a specific ASN.
Required: asn (e.g., 12345).
Usage: Optional historical data; results include risk scores.
Get ASN Takedown Reputation: Fetches takedown history and reputation for an ASN.
Required: asn.
Usage: Helps assess provider reliability.
Get ASNs for Domain: Lists ASNs used by a domain's A records in the last 30 days.
Required: Domain name.
Usage: Includes subdomains; useful for tracking infrastructure changes.
Get Data Exports: Downloads exported datasets, such as scan results.
Required: feed_url.
Usage: Optional format (e.g., CSV); results provide download links.
Get Domain Certificates: Retrieves certificates associated with a domain.
Required: domain.
Usage: Optional validity filters; results list cert details.
Get Enrichment Data: Provides enriched info for a domain or resource.
Required: resource (e.g., domain), value.
Usage: Comprehensive context, including Whois and history.
Get Future Attack Indicator: Predicts potential attack indicators from a feed.
Required: feed_uuid.
Usage: Proactive threat hunting; optional scoring thresholds.
Get IPv4 Reputation: Gets the reputation for an IPv4 address.
Required: IPv4 address.
Usage: Risk assessment; optional historical views.
Get Nameserver Reputation: Retrieves the reputation for a nameserver.
Required: nameserver.
Usage: Detects malicious DNS infrastructure.
Get Subnet Reputation: Fetches reputation for an IPv4 subnet.
Required: subnet (e.g., 192.168.1.0/24).
Usage: Broad network analysis.
Get Job Status: Checks the status or results of a running job.
Required: job_id.
Usage: Monitor asynchronous tasks.
List Domain Information: Fetches detailed info for one or more domains.
Required: domains (comma-separated).
Usage: Includes registration, DNS, and more.
List Domain Infratags: Lists infrastructure tags for a domain.
Required: feed_url (or domain).
Usage: Categorizes domain attributes.
List IP Information: Provides details for IPv4/IPv6 addresses.
Required: IPs (comma-separated).
Usage: Geolocation, ownership, etc.
Live URL Scan: Scans a URL for hosted metadata and threats.
Required: URL.
Usage: Real-time analysis; results include content type and risks.
Ping: Verifies API connectivity and health.
Required: None.
Usage: Quick health check.
Troubleshooting Tips
If any action fails, verify the API key and server configuration.
Ensure test cases are properly ingested.
For detailed errors, check the results panel in the Testing tab.
Refer to the Silent Push API documentation for advanced parameter usage.