Vendor - Cylance
Product - Protect
| Ref | Link | 
| Splunk Add-on CyberArk | https://splunkbase.splunk.com/app/3709/ | 
Sourcetypes
| sourcetype | notes | 
| syslog_protect | Catchall | 
| syslog_threat_classification | None | 
| syslog_audit_log | None | 
| syslog_exploit | None | 
| syslog_app_control | None | 
| syslog_threat | None | 
| syslog_device | None | 
| syslog_device_control | None | 
| syslog_script_control | None | 
| syslog_optics | None | 
Index Configuration
| key | sourcetype | index | notes | 
| cylance_protect | syslog_protect | epintel | none | 
| cylance_protect_auditlog | syslog_audit_log | epintel | none | 
| cylance_protect_threatclassification | syslog_threat_classification | epintel | none | 
| cylance_protect_exploitattempt | syslog_exploit | epintel | none | 
| cylance_protect_appcontrol | syslog_app_control | epintel | none | 
| cylance_protect_threat | syslog_threat | epintel | none | 
| cylance_protect_device | syslog_device | epintel | none | 
| cylance_protect_devicecontrol | syslog_device_control | epintel | none | 
| cylance_protect_scriptcontrol | syslog_protect | epintel | none | 
| cylance_protect_scriptcontrol | syslog_script_control | epintel | none | 
| cylance_protect_optics | syslog_optics | epintel | none | 
Filter type
MSG Parse: This filter parses message content
Options
| Variable | default | description | 
| SC4S_LISTEN_CYLANCE_PROTECT_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
Verification
An active site will generate frequent events use the following search to check for new events
Verify timestamp, and host values match as expected    
index=<asconfigured> (sourcetype=cef sourcetype="syslog_*")