Vendor - Forcepoint
Product - Email Security
Ref |
Link |
Splunk Add-on |
none |
Product Manual |
none |
Sourcetypes
sourcetype |
notes |
forcepoint:email:kv |
None |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
forcepoint_email |
forcepoint:email:kv |
email |
none |
|
|
|
|
Filter type
MSG Parse: This filter parses message content
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- Refer to the admin manual for specific details of configuration to send Reliable syslog using RFC 3195 format, a typical logging configuration will include the following features.
Options
Variable |
default |
description |
SC4S_LISTEN_FORCEPOINT_EMAIL_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_FORCEPOINT_EMAIL_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_FORCEPOINT_EMAIL |
no |
Enable archive to disk for this specific source |
SC4S_DEST_FORCEPOINT_EMAIL_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
An active proxy will generate frequent events, in addition WebProtect has the ability to test logging functionality using a built in command
index=<asconfigured> sourcetype=forcepoint:email:kv
Product - Webprotect (Websense)
Ref |
Link |
Splunk Add-on |
https://splunkbase.splunk.com/app/2966/ |
Product Manual |
http://www.websense.com/content/support/library/web/v85/siem/siem.pdf |
Sourcetypes
sourcetype |
notes |
websense:cg:kv |
None |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
forcepoint_webprotect |
websense:cg:kv |
netproxy |
none |
Filter type
MSG Parse: This filter parses message content
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- Refer to the admin manual for specific details of configuration to send Reliable syslog using RFC 3195 format, a typical logging configuration will include the following features.
Options
Variable |
default |
description |
SC4S_LISTEN_FORCEPOINT_WEBPROTECT_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_FORCEPOINT_WEBPROTECT_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_FORCEPOINT_WEBPROTECT |
no |
Enable archive to disk for this specific source |
SC4S_DEST_FORCEPOINT_WEBPROTECT_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
An active proxy will generate frequent events, in addition WebProtect has the ability to test logging functionality using a built in command
index=<asconfigured> sourcetype=websense:cg:kv