Skip to main content

Defend Integration

CMDB and Defend share a bidirectional data relationship. CMDB provides asset context — criticality, PHI tags, and ownership — that Defend uses to prioritize threats. Defend provides security posture data that CMDB displays on CI records.

How Data Flows

DirectionWhat FlowsPurpose
CMDB → DefendCriticality level, PHI/PII tags, environmentDefend escalates alert severity based on asset importance
Defend → CMDBLast known threat status, security postureCMDB shows whether an asset is clean, at risk, or compromised

Criticality-Based Alert Escalation

When Defend detects a threat on a device, it queries CMDB for the CI's criticality:

CI CriticalityDefend Behavior
CriticalP1 alert, immediate notification to all on-call responders
HighP2 alert, standard escalation timeline
MediumStandard alert priority
LowInformational alert

PHI Amplification

CIs tagged with PHI receive an additional priority boost. A medium-criticality server tagged with PHI is treated as high-priority by Defend — because a data breach on that asset has regulatory implications beyond the operational impact.

Security Posture View

Each CI's detail page in CMDB includes a security posture section showing:

  • Last scan date from Defend
  • Threat status — clean, suspicious activity detected, or active threat
  • Recent alerts — last 5 Defend alerts for this asset
  • Agent status — whether the Defend agent is installed and reporting

This gives technicians a quick security health check when working on an asset without switching to the Defend console.

Setting Up the Integration

The Defend integration works automatically when both products are active in your Hub organization. No additional configuration is required — Defend reads CMDB data via internal service-to-service APIs authenticated with integration keys.

ℹ️

Defend reads CMDB data in real time. When you update a CI's criticality or add a PHI tag, the change takes effect immediately for future Defend alerts.

Bus Events

CMDB emits events that Defend and other products can consume:

EventWhen Emitted
cmdb.config.createdNew CI created
cmdb.config.updatedCI modified (including criticality/tag changes)
cmdb.password.anomalyUnusual password access pattern detected
cmdb.asset.discoveredNew device found via auto-discovery

Defend listens for cmdb.config.updated to refresh its criticality cache when CI metadata changes.

Next Steps