CoPilot is an innovative application developed by SOCFortress, designed to simplify the management of open-source security tools. As organizations increasingly rely on multiple security tools for their Security Information and Event Management (SIEM), managing these tools can become unwieldy. CoPilot addresses this challenge by acting as the central “brains” of your security stack, unifying the diverse tools you use and streamlining their management.
As the number of open-source security tools grows, so does the complexity involved in managing them. Whether you're a beginner just getting started or an expert, efficiently integrating and managing these tools can be overwhelming. Tools like Wazuh, Graylog, Grafana, Shuffle, and more are powerful, but there has been no cohesive solution that brings them all together—until now.
CoPilot fills this gap by acting as a unifying layer that interfaces between you and these tools. Rather than replacing them, it enhances their usability by leveraging their robust APIs to offer a single management platform. For instance, you can deploy Office 365 integrations using Wazuh or manage a comprehensive open-source stack provided by SOCFortress—all through one interface.
By integrating CoPilot into your security workflow, you unlock greater customization and freedom to implement features and integrations previously limited by the tools themselves. CoPilot is an open-source solution that evolves based on user feedback and meets the community's needs.
CoPilot Connectors are integrations within the CoPilot application that allow it to interface with various external tools and services, particularly in the open-source security realm. These connectors serve as a link between CoPilot and each individual security tool in your stack. By leveraging connectors, CoPilot can automate, manage, and unify these tools into a single interface.
Key Functions of CoPilot Connectors:
See how the Wazuh Indexer is configured in the video below:
Wazuh Indexer and CoPilot Integration
See how the Wazuh Manager is configured in the video below:
Wazuh Manager and CoPilot Integration
See how Velociraptor is configured in the video below:
Velociraptor and CoPilot Integration
See how Graylog is configured in the video below:
Graylog and CoPilot Integration
See how InfluxDB is configured in the video below:
CoPilot and InfluxDB: Monitor Your SIEM Stack Servers
See how Grafana is configured in the video below:
Grafana and CoPilot Integration
See how the Wazuh Worker is configured in the video below:
Wazuh Worker and CoPilot Integration
This section provides a step-by-step guide on using CoPilot to provision a new customer. The provisioning process includes configuring the Wazuh group, setting up Graylog indices, and deploying Grafana dashboards tailored for each customer.
Before you begin, ensure CoPilot is properly connected and verified with:
All connections between CoPilot and these applications should be established and verified. If not, see the respective setup tutorials above.
See the Provisioning Walkthrough Video:
Customer Provisioning Walkthrough Video
Enter the domain name or IP address used to access your Grafana instance (e.g., https://yourdomain.com).
Use CoPilot's provisioning wizard to configure essential settings:
CoPilot will then create indexes in Graylog, set up streams, and configure Wazuh groups in the background.
🚩Enable the Provisioning of Wazuh Worker and HAProxy
Refresh Grafana to see the newly created organization. Ensure the data source is correctly pointing to the relevant index for this customer.
Navigate to the dashboards under the customer's organization. You can use them as-is or customize as needed.
Conclusion: CoPilot's provisioning feature automates the process of setting up new customers in your SIEM stack, including Wazuh, Graylog, and Grafana configurations.
Besides core open-source security tools, CoPilot can also bring in security events from external services like Office 365, Mimecast, and CrowdStrike. This allows you to centralize these events in your SIEM for a unified security view.
CoPilot supports numerous third-party integrations to ingest security events, alerts, and logs from services such as:
Prerequisites for Integration: Make sure you have configured a customer code, provisioning settings, and necessary API access or permissions within the third-party service (e.g., Office 365 or Mimecast).
See these videos for examples:
Firewalls are crucial for monitoring network security. CoPilot supports integrating with various firewall solutions (e.g., Fortinet) to ingest logs and alerts into your SIEM.
Examples include FortiGate, which helps monitor network traffic, IDS/IPS alerts, and threat intelligence data.
Similar to other third-party integrations, ensure your customer code and prerequisites are properly set up.
See the following video:
Fortinet Firewall Integration with CoPilot
In CoPilot, agents are crucial for monitoring and managing customer endpoints (e.g., Windows servers, workstations, Linux servers, Mac machines). These endpoints run EDR agents like Wazuh and Velociraptor, allowing them to communicate with the CoPilot platform.
Video: Agent Management and Overview
The Agent Vulnerabilities section provides a detailed overview of vulnerabilities on each endpoint, integrating the Exploit Prediction Scoring System (EPSS) to help prioritize remediation.
Integrate EPSS with Wazuh for Top-Notch Vulnerability Management
The SCA module (powered by Wazuh) evaluates endpoint configurations against various security policies.
Wazuh SCA and CoPilot Overview
By integrating Velociraptor, CoPilot enables you to run remote artifact collections and commands across Windows and Linux endpoints.
Velociraptor Integration Demo
CoPilot's Active Response feature uses Wazuh to automate responses to security events on endpoints, such as blocking IP addresses via the local firewall.
Mastering Wazuh's Active Response with CoPilot
As cloud adoption grows, securing cloud environments is critical. CoPilot integrates with Scout Suite, an open-source tool for multi-cloud security auditing.
Scout Suite uses cloud provider APIs to gather configuration data and identify potential risks across AWS, Azure, and Google Cloud. It simplifies finding and fixing security issues. By embedding Scout Suite within CoPilot, you can monitor and assess your cloud posture in one place.
Simplify Cloud Security with ScoutSuite and Copilot
Securing web applications is crucial for protecting data and preventing breaches. CoPilot integrates with Nuclei, an open-source vulnerability scanner, to automate web application security assessments.
Integrating CoPilot with Nuclei for Web App Security
Threat intelligence is essential for real-time identification and response to potential threats. CoPilot's Threat Intel feature enriches Wazuh events with actionable data, helping you stay proactive against attacks.
Auto-Enrich Wazuh Events with Threat Intel Feeds
CoPilot can generate custom reports from your Grafana dashboards. This is particularly useful for sharing insights about security posture with clients or upper management.
Creating Custom PDF Reports in Grafana
CoPilot manages alerts generated by your SIEM stack. Graylog queries the Wazuh Indexer periodically to detect alerts. When found, they appear as pending in CoPilot, which then processes them into incidents in the Incident Management platform.
Wazuh-generated alerts are captured using Graylog, then forwarded to CoPilot for incident creation and management.
Powerful Wazuh Alert Management With CoPilot
CoPilot also supports creating custom alerts based on your own criteria or integrations.
Custom Alerts in CoPilot
customer_code
You may only want to trigger alerts for critical Huntress events (level 1). Once set up, CoPilot automatically creates incidents for these events, streamlining your workflow.
CoPilot leverages Shuffle to enhance your security workflows by combining AI-driven insights with robust automation.
Revolutionize Your SIEM Alerts: Integrate CoPilot & Shuffle
Was this article helpfu?
Thank you for voting
You are related to multiple companies. Please select the company you wish to login as.