Darktrace Email
Configure the Darktrace email connector.
In this guide, you will create an API token in Darktrace and instantiate a Radiant Security email connector to pull suspicious emails for triaging.
At the end of this configuration, you will provide Radiant Security with these values:
Your Darktrace URL
Important note: The domain should be in the following form https://xxxxxx.cloud.darktrace.com
.
Public Token
Private Token
Anomaly Score Threshold
Prerequisites
Create a local user
Darktrace API tokens are user-specific and available only for local users created directly within the Darktrace Threat Visualizer. This means API tokens are not supported for users authenticated via LDAP or SAML SSO. The following steps guide you through creating a local user and generating API tokens for integration with Radiant Security.
If you already have a local Admin user, use that account to complete the steps. Otherwise, use your regular Admin-level account.
On the Threat Visualizer of the instance from which you wish to request data, click Menu and then click Admin > Permissions Admin.
Click the Created Accounts tab.
On the left side, click Create new user.
Give the user a recognizable Username (e.g.
radiant_connector
) and a Password.Click User Templates.
For Select a user template, select Administrator.
Click Threat Tray Behavior Categories to go to the next step.
Keep all default settings for Threat Tray Behavior Categories unchanged and then click Flags.
Toggle the API Access selector to Yes.
Note: If this selector cannot be changed, keep proceeding with the user creation. The next section, Troubleshoot users with no API Access, will guide you on troubleshooting this.
Add this user to the Darktrace Admins Group.
Click Add Threat Visualizer permissions.
Leave the next setup steps unchanged by clicking the proceeding buttons.
In the Summary page, click Update user to save changes.
Troubleshoot users with no API access
If you weren’t able to toggle the API access in step 9, then you must contact DarkTrace support. In most cases, this happens because the API was never used before and it can be quickly resolved. After contacting support, all icons in the Flags column should be green for the newly created user.

Generate the API token
Log in to Threat Visualizer with the user created previously.
Click Account Settings from the main menu.
Click the API Access button.
In the pop-up, click New. A Public and Private Token will appear.
Important note: Ensure you copy the token values as you won’t be able to retrieve the Private Token again. You will need to provide these values to Radiant Security at the end of the configuration.
Add the credentials in Radiant Security
Log in to Radiant Security.
From the navigation menu, select Settings > Credentials and click + Add Credential.
Search for and select the Darktrace API option from the list and then click Configure Credential.
Give the credential an identifiable name (e.g.
Darktrace <user> API Tokens
) and add the required fields:Tenant URL: Your Darktrace Console URL, it will look like
https://name.cloud.darktrace.com
Public Token: 40 digit Public Token copied in the previous step.
Private Token: 40 digit Private Token copied in the previous step.
Anomaly Score Threshold: This value ranges from 0 to 100 and represents the Antigena Email Score assigned by Darktrace to each analyzed email.
A threshold of 0 means every email will be triaged by Radiant.
A threshold of 100 means only emails that Darktrace deems highly likely to be malicious will be triaged.
A good starting value is 80 because it avoids triaging all emails while ensuring those with lower confidence scores by Darktrace still undergo further analysis.
Add the data connector in Radiant Security
From the navigation menu, select Settings > Data Connectors and click + Add Connector.
Search for and select the Darktrace API option and then click Data Feeds.
Select Darktrace Email Alerts and click Credentials.
Select the credentials created previously and click Add Connector.
Last updated