Vendor - Forcepoint
Product - Email Security
| Ref | Link | 
| Splunk Add-on | none | 
| Product Manual | none | 
Sourcetypes
| sourcetype | notes | 
| forcepoint:email:kv | None | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| forcepoint_email | forcepoint:email:kv | email | none | 
|  |  |  |  | 
Filter type
MSG Parse: This filter parses message content
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- Refer to the admin manual for specific details of configuration to send Reliable syslog using RFC 3195 format, a typical logging configuration will include the following features.
Options
| Variable | default | description | 
| SC4S_LISTEN_FORCEPOINT_EMAIL_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_FORCEPOINT_EMAIL_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_FORCEPOINT_EMAIL | no | Enable archive to disk for this specific source | 
| SC4S_DEST_FORCEPOINT_EMAIL_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
An active proxy will generate frequent events, in addition WebProtect has the ability to test logging functionality using a built in command
index=<asconfigured> sourcetype=forcepoint:email:kv
Product - Webprotect (Websense)
| Ref | Link | 
| Splunk Add-on | https://splunkbase.splunk.com/app/2966/ | 
| Product Manual | http://www.websense.com/content/support/library/web/v85/siem/siem.pdf | 
Sourcetypes
| sourcetype | notes | 
| websense:cg:kv | None | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| forcepoint_webprotect | websense:cg:kv | netproxy | none | 
Filter type
MSG Parse: This filter parses message content
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- Refer to the admin manual for specific details of configuration to send Reliable syslog using RFC 3195 format, a typical logging configuration will include the following features.
Options
| Variable | default | description | 
| SC4S_LISTEN_FORCEPOINT_WEBPROTECT_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_FORCEPOINT_WEBPROTECT_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_FORCEPOINT_WEBPROTECT | no | Enable archive to disk for this specific source | 
| SC4S_DEST_FORCEPOINT_WEBPROTECT_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
An active proxy will generate frequent events, in addition WebProtect has the ability to test logging functionality using a built in command
index=<asconfigured> sourcetype=websense:cg:kv