Skip to content

Commit 048459b

Browse files
authored
Merge pull request #300 from carbonblack/product-name-updates
Updated product names in documentation sections. Using override on ci/cd as this was documentation changes only.
2 parents 927a2fb + 71fbc04 commit 048459b

10 files changed

+91
-94
lines changed

README.md

+24-26
Original file line numberDiff line numberDiff line change
@@ -2,24 +2,25 @@
22

33
**Latest Version: 1.7.5**
44

5-
_**Notice**: The Carbon Black Cloud portion of CBAPI has moved to https://github.com/carbonblack/carbon-black-cloud-sdk-python. Any future development and bug fixes for Carbon Black Cloud APIs will be made there. Carbon Black EDR and App Control will remain supported at CBAPI_
5+
_**Notice**:_
6+
* The Carbon Black Cloud portion of CBAPI has moved to https://github.com/carbonblack/carbon-black-cloud-sdk-python. Any future development and bug fixes for Carbon Black Cloud APIs will be made there. Carbon Black EDR and App Control will remain supported at CBAPI
7+
* Carbon Black EDR (Endpoint Detection and Response) is the new name for the product formerly called CB Response.
8+
* Carbon Black App Control is the new name for the product formerly called CB Protection.
69

7-
These are the Python bindings for the Carbon Black Enterprise Response and Enterprise Protection REST APIs.
10+
These are the Python bindings for the Carbon Black EDR and App Control REST APIs.
811
To learn more about the REST APIs, visit the Carbon Black Developer Network Website at https://developer.carbonblack.com.
912

10-
Please visit https://cbapi.readthedocs.io for detailed documentation on this API. Additionally, we have a slideshow
11-
available at https://developer.carbonblack.com/2016/07/presentation-on-the-new-carbon-black-python-api/ that provides
12-
an overview of the concepts that underly this API binding.
13+
Please visit https://cbapi.readthedocs.io for detailed documentation on this API.
1314

1415
## Support
1516

1617
1. View all API and integration offerings on the [Developer Network](https://developer.carbonblack.com/) along with reference documentation, video tutorials, and how-to guides.
1718
2. Use the [Developer Community Forum](https://community.carbonblack.com/t5/Developer-Relations/bd-p/developer-relations) to discuss issues and get answers from other API developers in the Carbon Black Community.
18-
3. Report bugs and change requests to [Carbon Black Support](http://carbonblack.com/resources/support/).
19+
3. Report bugs and change requests to [Carbon Black Support](https://www.vmware.com/support/services.html).
1920

2021
## Requirements
2122

22-
The new cbapi is designed to work on Python 2.6.6 and above (including 3.x). If you're just starting out,
23+
The cbapi package is designed to work on Python 2.6.6 and above (including 3.x). If you're just starting out,
2324
we recommend using the latest version of Python 3.6.x or above.
2425

2526
All requirements are installed as part of `pip install`.
@@ -28,11 +29,10 @@ The legacy cbapi (`cbapi.CbApi`) and legacy bit9api (`cbapi.bit9Api`) are still
2829
## Backwards Compatibility
2930

3031
Backwards compatibility with old scripts is maintained through the `cbapi.legacy` module. Old scripts that import
31-
`cbapi.CbApi` directly will continue to work. Once cbapi 2.0.0 is released, the old `CbApi` will be deprecated and
32-
removed entirely no earlier than January 2017.
32+
`cbapi.CbApi` directly will continue to work.
3333

34-
New scripts should use the `cbapi.CbResponseAPI` (for CB Response) and
35-
`cbapi.CbProtectionAPI` (for CB Protection / former Bit9) API entry points.
34+
New scripts should use the `cbapi.CbResponseAPI` (for EDR (CB Response)) and
35+
`cbapi.CbProtectionAPI` (for App Control (CB Protection)) API entry points.
3636

3737
## Getting Started
3838

@@ -49,10 +49,10 @@ Clone this repository, cd into `cbapi-python` then run setup.py with the `develo
4949

5050
### Sample Code
5151

52-
There are several examples in the `examples` directory for both Carbon Black Enterprise Response and Protection. We
53-
will be adding more samples over time. For a quick start, see the following code snippets:
52+
There are several examples in the `examples` directory for both EDR and App Control.
53+
For a quick start, see the following code snippets:
5454

55-
**Carbon Black Enterprise Response**
55+
**Carbon Black EDR**
5656

5757
from cbapi.response.models import Process, Binary, Sensor, Feed, Watchlist, Investigation
5858
from cbapi.response.rest_api import CbEnterpriseResponseAPI
@@ -78,7 +78,7 @@ will be adding more samples over time. For a quick start, see the following code
7878
s.save()
7979

8080

81-
**Carbon Black Enterprise Protection**
81+
**Carbon Black App Control**
8282

8383
from cbapi.protection.models import *
8484
from cbapi.protection.rest_api import CbEnterpriseProtectionAPI
@@ -100,9 +100,8 @@ will be adding more samples over time. For a quick start, see the following code
100100

101101
In order to perform any queries via the API, you will need to get the API token for your CB user. See the documentation
102102
on the Developer Network website on how to acquire the API token for
103-
[CB Response](http://developer.carbonblack.com/reference/enterprise-response/authentication/),
104-
[CB Protection](http://developer.carbonblack.com/reference/enterprise-protection/authentication/), or
105-
[CB Defense](http://developer.carbonblack.com/reference/cb-defense/authentication/).
103+
[CB Response](http://developer.carbonblack.com/reference/enterprise-response/authentication/) or
104+
[CB Protection](http://developer.carbonblack.com/reference/enterprise-protection/authentication/).
106105

107106
Once you acquire your API token, place it in one of the default credentials file locations:
108107

@@ -112,15 +111,14 @@ Once you acquire your API token, place it in one of the default credentials file
112111

113112
For distinction between credentials of different Carbon Black products, use the following naming convention for your credentials files:
114113

115-
* ``credentials.psc`` for CB Defense, CB ThreatHunter, and CB LiveOps
116-
* ``credentials.response`` for CB Response
117-
* ``credentials.protection`` for CB Protection
114+
* ``credentials.response`` for EDR (CB Response)
115+
* ``credentials.protection`` for App Control (CB Protection)
118116

119117
For example, if you use a Carbon Black Cloud product, you should have created a credentials file in one of these locations:
120118

121-
* ``/etc/carbonblack/credentials.psc``
122-
* ``~/.carbonblack/credentials.psc``
123-
* ``/current_working_directory/.carbonblack/credentials.psc``
119+
* ``/etc/carbonblack/credentials.response``
120+
* ``~/.carbonblack/credentials.response``
121+
* ``/current_working_directory/.carbonblack/credentials.response``
124122

125123
Credentials found in a later path will overwrite earlier ones.
126124

@@ -144,7 +142,7 @@ by key-value pairs providing the necessary credential information::
144142

145143
The possible options for each credential profile are:
146144

147-
* **url**: The base URL of the CB server. This should include the protocol (https) and the hostname, and nothing else.
145+
* **url**: The base URL of the Carbon Black server. This should include the protocol (https) and the hostname, and nothing else.
148146
* **token**: The API token for the user ID. More than one credential profile can be specified for a given server, with
149147
different tokens for each.
150148
* **ssl_verify**: True or False; controls whether the SSL/TLS certificate presented by the server is validated against
@@ -156,5 +154,5 @@ The possible options for each credential profile are:
156154
* **ignore_system_proxy**: If you have a system-wide proxy specified, setting this to True will force cbapi to bypass
157155
the proxy and directly connect to the CB server.
158156

159-
Future versions of cbapi will also provide the ability to "pin" the TLS certificate so as to provide certificate
157+
Future versions of cbapi may provide the ability to "pin" the TLS certificate so as to provide certificate
160158
verification on self-signed or internal CA signed certificates.

docs/changelog.rst

+7-7
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ CbAPI 1.7.5 - Released June 16, 2021
88
Updates
99

1010
* General
11-
* Allow the CbAPI to accept a pre-configured Session object to be used for access, to get around unusual configuration requirements.
11+
* Allow the CbAPI to accept a pre-configured Session object to be used for access, to get around unusual configuration requirements.
1212

1313
CbAPI 1.7.4 - Released April 7, 2021
1414
------------------------------------
@@ -17,7 +17,7 @@ Updates
1717

1818
* General
1919
* Fix example code in the documentation for Facets
20-
* CB Response
20+
* EDR (CB Response)
2121
* Add missing fields for SensorGroup class and fix example script to properly create SensorGroup
2222
* Fix example script sensor_group_operations.py to list groups without ipaddresses
2323
* Fix alert.save()
@@ -38,7 +38,7 @@ Updates
3838
* CB Threathunter
3939
* Fix typo in process query
4040
* Bump lxml from 4.4.1 to 4.6.2 for Threat Intelligence example
41-
* CB Response
41+
* EDR (CB Response)
4242
* Add Sensor Builds
4343
* Alert.set_ignored() and AlertQuery.set_ignored():
4444
* Added a docstring to specify what happens with this method
@@ -65,7 +65,7 @@ Updates
6565
* Documentation updates to indicate changed product names
6666
* Carbon Black Cloud
6767
* Process Search v2 rows defaults to 10k to match UI behavior
68-
* CB Response
68+
* EDR (CB Response)
6969
* Add support for fetching alert by ID
7070

7171

@@ -358,7 +358,7 @@ CB Response:
358358
You can also use the special segment "0" to retrieve process events across all segments.
359359
* Fix ``cmdline_filters`` in the ``IngressFilter`` model object.
360360

361-
CB Protection:
361+
App Control (CB Protection):
362362

363363
* Tamper Protection can now be set and cleared in the ``Computer`` model object.
364364

@@ -378,7 +378,7 @@ Security fix:
378378
Bug fixes:
379379

380380
* Add rule filename parameter to CB Defense ``policy_operations.py`` script's ``add-rule`` command.
381-
* Add support for ``tamperProtectionActive`` attribute to CB Protection's ``Computer`` object.
381+
* Add support for ``tamperProtectionActive`` attribute to App Control's (CB Protection) ``Computer`` object.
382382
* Work around CB Response issue- the ``/api/v1/sensor`` route incorrectly returns an HTTP 500 if no sensors match the
383383
provided query. CbAPI now catches this exception and will instead return an empty set back to the caller.
384384

@@ -401,7 +401,7 @@ Security changes:
401401

402402
* Add the ability to "pin" a specific server certificate to a credential profile.
403403

404-
* You can now force TLS certificate verification on self-signed, on-premise installations of CB Response or Protection
404+
* You can now force TLS certificate verification on self-signed, on-premise installations of EDR (CB Response) or App Control (Protection)
405405
through the ``ssl_cert_file`` option in the credential profile.
406406
* To "pin" a server certificate, save the PEM-formatted server certificate to a file, and put the full path to that
407407
PEM file in the ``ssl_cert_file`` option of that server's credential profile.

docs/concepts.rst

+13-13
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ There are a few critical concepts that will make understanding and using the cba
55
explained below, and also covered in a slide deck presented at the Carbon Black regional User Exchanges in 2016.
66
You can see the slide deck `here <https://speakerdeck.com/cbdevnet/carbon-black-python-api-summer-2016>`_.
77

8-
At a high level, the cbapi tries to represent data in CB Response or CB Protection as Python objects. If you've worked
8+
At a high level, the cbapi tries to represent data in EDR (CB Response) or App Control (CB Protection) as Python objects. If you've worked
99
with SQL Object-relational Mapping (ORM) frameworks before, then this structure may seem familiar -- cbapi was
1010
designed to operate much like an ORM such as SQLAlchemy or Ruby's ActiveRecord. If you haven't worked with one of these
1111
libraries, don't worry! The concepts will become clear after a little practice.
@@ -14,9 +14,9 @@ Model Objects
1414
-------------
1515

1616
Everything in cbapi is represented in terms of "Model Objects". A Model Object in cbapi represents a single instance
17-
of a specific type of data in CB Response or Protection. For example, a process document from CB Response (as seen
17+
of a specific type of data in EEDR (CB Response) or App Control (CB Protection). For example, a process document from EDR (as seen
1818
on an Analyze Process page in the Web UI) is represented as a :py:mod:`cbapi.response.models.Process` Model Object.
19-
Similarly, a file instance in CB Protection is represented as a :py:mod:`cbapi.protection.models.FileInstance`
19+
Similarly, a file instance in App Control (CB Protection) is represented as a :py:mod:`cbapi.protection.models.FileInstance`
2020
Model Object.
2121

2222
Once you have an instance of a Model Object, you can access all of the data contained within as Python properties.
@@ -27,7 +27,7 @@ in the ``cmdline`` property), you would write the code::
2727

2828
This would automatically retrieve the ``cmdline`` attribute of the process and print it out to your screen.
2929

30-
The data in CB Response and Protection may change rapidly, and so a comprehensive list of valid properties is difficult
30+
The data in EDR (CB Response) or App Control (CB Protection) may change rapidly, and so a comprehensive list of valid properties is difficult
3131
to keep up-to-date. Therefore, if you are curious what properties are available on a specific Model Object, you can
3232
print that Model Object to the screen. It will dump all of the available properties and their current values. For
3333
example::
@@ -56,7 +56,7 @@ method to retrieve the property, and return a default value if the property does
5656

5757
In summary, Model Objects contain all the data associated with a specific type of API call. In this example, the
5858
:py:mod:`cbapi.response.models.Binary` Model Object reflects all the data available via the
59-
``/api/v1/binary`` API route on a CB Response server.
59+
``/api/v1/binary`` API route on an EDR (CB Response) server.
6060

6161
Joining Model Objects
6262
---------------------
@@ -90,13 +90,13 @@ Queries
9090

9191
Now that we've covered how to get data out of a specific Model Object, we now need to learn how to obtain Model
9292
Objects in the first place! To do this, we have to create and execute a Query. cbapi Queries use the same query
93-
syntax accepted by CB Response or Protection's APIs, and add a few little helpful features along the way.
93+
syntax accepted by EDR (CB Response) or App Control (CB Protection) APIs, and add a few little helpful features along the way.
9494

9595
To create a query in cbapi, use the ``.select()`` method on the CbResponseAPI or CbProtectionAPI object. Pass the
9696
Model Object type as a parameter to the ``.select()`` call and optionally add filtering criteria with ``.where()``
9797
clauses.
9898

99-
Let's start with a simple query for CB Response::
99+
Let's start with a simple query for EDR (CB Response)::
100100

101101
>>> from cbapi.response import *
102102
>>> cb = CbResponseAPI()
@@ -152,15 +152,15 @@ will throw a :py:mod:`MoreThanOneResultError` exception if there are zero or mor
152152
second method is ``.first()``, which will return the first result from the result set, or None if there are no results.
153153

154154
Every time you access a Query object, it will perform a REST API query to the Carbon Black server. For large result
155-
sets, the results are retrieved in batches- by default, 100 results per API request on CB Response and 1,000 results
156-
per API request on CB Protection. The search queries themselves are not cached, but the resulting Model Objects are.
155+
sets, the results are retrieved in batches- by default, 100 results per API request on EDR (CB Response) and 1,000 results
156+
per API request on App Control (CB Protection). The search queries themselves are not cached, but the resulting Model Objects are.
157157

158158
Retrieving Objects by ID
159159
------------------------
160160

161161
Every Model Object (and in fact any object addressable via the REST API) has a unique ID associated with it. If you
162162
already have a unique ID for a given Model Object, for example, a Process GUID for CB Response, or a Computer ID
163-
for CB Protection, you can ask cbapi to give you the associated Model Object for that ID by passing that ID to the
163+
for App Control (CB Protection), you can ask cbapi to give you the associated Model Object for that ID by passing that ID to the
164164
``.select()`` call. For example::
165165

166166
>>> binary = cb.select(Binary, "CA4FAFFA957C71C006B59E29DFE3EB8B")
@@ -178,8 +178,8 @@ object and if it does not exist, cbapi will throw a :py:mod:`ObjectNotFoundError
178178
Creating New Objects
179179
--------------------
180180

181-
The CB Response and Protection REST APIs provide the ability to insert new data under certain circumstances. For
182-
example, the CB Response REST API allows you to insert a new banned hash into its database. Model Objects that
181+
The EDR (CB Response) and App Control (CB Protection) REST APIs provide the ability to insert new data under certain circumstances. For
182+
example, the EDR REST API allows you to insert a new banned hash into its database. Model Objects that
183183
represent these data types can be "created" in cbapi by using the ``create()`` method::
184184

185185
>>> bh = cb.create(BannedHash)
@@ -199,7 +199,7 @@ exception with a list of the properties that are required and not currently set.
199199

200200
Once the ``.save()`` method is called, the appropriate REST API call is made to create the object. The Model Object
201201
is then updated to the current state returned by the API, which may include additional data properties initialized
202-
by CB Response or Protection.
202+
by EDR (CB Response) or App Control (CB Protection).
203203

204204
Modifying Existing Objects
205205
--------------------------

docs/getting-started.rst

+4-4
Original file line numberDiff line numberDiff line change
@@ -10,18 +10,18 @@ on the Developer Network website.
1010
API Authentication
1111
------------------
1212

13-
CB Response and CB Protection use a per-user API secret token to authenticate requests via the API. The API token
13+
EDR (CB Response) and App Control (CB Protection) use a per-user API secret token to authenticate requests via the API. The API token
1414
confers the same permissions and authorization as the user it is associated with, so protect the API token with the
1515
same care as a password.
1616

1717
To learn how to obtain the API token for a user, see the Developer Network website: there you will find instructions
18-
for obtaining an API token for `CB Response <https://developer.carbonblack.com/reference/enterprise-response/authentication/>`_
19-
and `CB Protection <https://developer.carbonblack.com/reference/enterprise-protection/authentication/>`_.
18+
for obtaining an API token for `EDR (CB Response) <https://developer.carbonblack.com/reference/enterprise-response/authentication/>`_
19+
and `App Control (CB Protection) <https://developer.carbonblack.com/reference/enterprise-protection/authentication/>`_.
2020

2121
Once you have the API token, cbapi helps keep your credentials secret by enforcing the use of a credential file. To
2222
encourage sharing of scripts across the community while at the same time protecting the security of our customers,
2323
cbapi strongly discourages embedding credentials in individual scripts. Instead, you can place credentials for several
24-
CB Response or CB Protection servers inside the API credential file and select which "profile" you would like to use
24+
EDR (CB Response) or App Control (CB Protection) servers inside the API credential file and select which "profile" you would like to use
2525
at runtime.
2626

2727
To create the initial credential file, a simple-to-use script is provided. Just run the ``cbapi-response``,

0 commit comments

Comments
 (0)