Skip to content

Vendor - Cylance

Product - Protect

Ref Link
Splunk Add-on CyberArk https://splunkbase.splunk.com/app/3709/

Sourcetypes

sourcetype notes
syslog_protect Catchall
syslog_threat_classification None
syslog_audit_log None
syslog_exploit None
syslog_app_control None
syslog_threat None
syslog_device None
syslog_device_control None
syslog_script_control None
syslog_optics None

Index Configuration

key sourcetype index notes
cylance_protect syslog_protect epintel none
cylance_protect_auditlog syslog_audit_log epintel none
cylance_protect_threatclassification syslog_threat_classification epintel none
cylance_protect_exploitattempt syslog_exploit epintel none
cylance_protect_appcontrol syslog_app_control epintel none
cylance_protect_threat syslog_threat epintel none
cylance_protect_device syslog_device epintel none
cylance_protect_devicecontrol syslog_device_control epintel none
cylance_protect_scriptcontrol syslog_protect epintel none
cylance_protect_scriptcontrol syslog_script_control epintel none
cylance_protect_optics syslog_optics epintel none

Filter type

MSG Parse: This filter parses message content

Options

Variable default description
SC4S_LISTEN_CYLANCE_PROTECT_TCP_PORT empty string Enable a TCP port for this specific vendor product using a comma-separated list of port numbers

Verification

An active site will generate frequent events use the following search to check for new events

Verify timestamp, and host values match as expected

index=<asconfigured> (sourcetype=cef sourcetype="syslog_*")