This package contains parsing logic, saved searches, and dashboards for monitoring Trend Micro Deep Security through Splunk.
Please read the Installation section below for details on how to configure Deep Security to use this app.
To contribute this app, see https://github.com/deep-security/splunk.
Install this app through the Manage Apps functionality within Splunk. For additional information on installing Splunk apps, please refer to the Splunk documentation.
It is highly recommended that you follow the Splunk best practices for syslog, and that you configure rsyslog or syslog-ng to write syslog output to a file which can then be collected by a Splunk forwarder and sent to the Splunk server. You need to ensure that the Splunk forwarder sets the sourcetype to
deepsecurity when forwarding events to a Splunk receiver.
Alternatively, you can set up a UDP syslog listener directly on the Splunk server and configure it to assign the sourcetype
deepsecurity to all messages received.
Next, you'll need to configure Deep Security to send event data to your chosen collection method. Follow this guidance:
For details on event forwarding, see this topic in the Deep Security Help Center.
All syslog inputs in the Deep Security for Splunk app that were included in version 1.4 have been removed. If you are upgrading from version 1.4 and were using the individual syslog listening ports, you'll need to configure a new syslog input which assigns the sourcetype
deepsecurity. This can be a single UDP syslog port in version 1.5.1 and doesn't need to be individual ports as it was in version 1.4.
This change helps make the app compatible with both Splunk Enterprise and Splunk Cloud.
Please configure Deep Security to send event data in Common Event Format (CEF). This add-on parses the various syslog messages and extracts the appropriate fields, including the custom key/value pairs.
CEF:0|Trend Micro|Deep Security Agent|22.214.171.1245|1001111|Test Intrusion Prevention Rule|3|cn1=1 cn1Label=Host ID dvchost=hostname dmac=00:50:56:F5:7F:47 smac=00:0C:29:EB:35:DE TrendMicroDsFrameType=IP src=192.168.126.150 dst=126.96.36.199 out=1093 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=49786 dpt=80 cs2=0x00 ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=10 cn3Label=Intrusion Prevention Packet Position cs5=10 cs5Label=Intrusion Prevention Stream Position cs6=8 cs6Label=Intrusion Prevention Flags
Using the message above as an example, the add-on extracts the following custom key/value pairs:
Intrusion Prevention Packet Position=10
Intrusion Prevention Stream Position=10
Intrusion Prevention Flags=8
Version 1.8.1: April 6, 2021
- Fixed a user reported error where there was a typo in the props.conf file which would preventing the ICMP transform from operating correctly. Credit to Chris Bell for reporting the error.
- Made a small modification to the deepsecurity-cefheaders transform to account for any RFC3164 compliant systems that may have added a whitespace to the beginning of the syslog message.
- Created a field alias for dest from dest_ip as per guidance in CIM.
- Replaced deprecated dashboard elements with their updated replacements.
- Resized application icon to meet Splunk recommend sizing
- Updated host field based on dvchost
Version 1.6.0: May 14, 2018
- Added "Deep Security Application Control Dashboard"
- Fixed incorrect transformation for system events
- Fixed label/title inconsistancy between dashboards
- Fixed saved searches "All Security Events" and "High Severity Events" to exclude system events as expected
Version 1.5.2: April 4, 2016
- Fixed a typo in the transforms.conf for web reputation events. Credit to Chris Bell for reporting the error.
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.