Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Trend Micro Deep Security for Splunk
SHA256 checksum (trend-micro-deep-security-for-splunk_160.tgz) d8d30783afd90e5ef0b135563717484d439ba057caba17aee43158ef47d8bd95 SHA256 checksum (trend-micro-deep-security-for-splunk_152.tgz) c7c89c4a292e9f8de0ed59bda0e6b4a550eaf5049f6f580ecd8caebc744c8eb9 SHA256 checksum (trend-micro-deep-security-for-splunk_151.tgz) 35422b76f27e0da0c418659faa510c1e73100580d8cf77c4d25b8d90252d521d SHA256 checksum (trend-micro-deep-security-for-splunk_15.tgz) 30dcdf345b14cbcd08e2a3b867e9d49b7f2595ff2e396b1a4086d8ba17b3d596 SHA256 checksum (trend-micro-deep-security-for-splunk_14.tgz) 1f96cb2282e8d87c4d66a35da653aa91d68e2ebd0a9df42d5f7aa6ea56bdc407
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Trend Micro Deep Security for Splunk

Overview
Details
This package contains parsing logic, saved searches, and dashboards for monitoring Trend Micro Deep Security via Splunk.

Trend Micro Deep Security for Splunk

Overview

This package contains parsing logic, saved searches, and dashboards for monitoring Trend Micro Deep Security through Splunk.

Please read the Installation section below for details on how to configure Deep Security to use this app.

To contribute this app, see https://github.com/deep-security/splunk.

Installation

Install this app through the Manage Apps functionality within Splunk. For additional information on installing Splunk apps, please refer to the Splunk documentation.

It is highly recommended that you follow the Splunk best practices for syslog, and that you configure rsyslog or syslog-ng to write syslog output to a file which can then be collected by a Splunk forwarder and sent to the Splunk server. You need to ensure that the Splunk forwarder sets the sourcetype to deepsecurity when forwarding events to a Splunk receiver.

Alternatively, you can set up a UDP syslog listener directly on the Splunk server and configure it to assign the sourcetype deepsecurity to all messages received.

Next, you'll need to configure Deep Security to send event data to your chosen collection method. Follow this guidance:

  • To configure system events, log in to Deep Security Manager and go to Administration > System Settings > Event Forwarding.
  • To configure security events, log in to Deep Security Manager, and go to Policies. Double-click one of your security policies and then go to Settings > Event Forwarding.

For details on event forwarding, see this topic in the Deep Security Help Center.

Upgrade from Version 1.4

All syslog inputs in the Deep Security for Splunk app that were included in version 1.4 have been removed. If you are upgrading from version 1.4 and were using the individual syslog listening ports, you'll need to configure a new syslog input which assigns the sourcetype deepsecurity. This can be a single UDP syslog port in version 1.5.1 and doesn't need to be individual ports as it was in version 1.4.

This change helps make the app compatible with both Splunk Enterprise and Splunk Cloud.

Usage

You can configure Deep Security to send event data in Common Event Format (CEF). This add-on parses the various syslog messages and extracts the appropriate fields, including the custom key/value pairs.

Example:

CEF:0|Trend Micro|Deep Security Agent|8.0.0.995|1001111|Test Intrusion Prevention Rule|3|cn1=1 cn1Label=Host ID dvchost=hostname dmac=00:50:56:F5:7F:47 smac=00:0C:29:EB:35:DE TrendMicroDsFrameType=IP src=192.168.126.150 dst=72.14.204.105 out=1093 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=49786 dpt=80 cs2=0x00 ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=10 cn3Label=Intrusion Prevention Packet Position cs5=10 cs5Label=Intrusion Prevention Stream Position cs6=8 cs6Label=Intrusion Prevention Flags

Using the message above as an example, the add-on extracts the following custom key/value pairs:

  • Host_ID=1
  • Fragmentation Bits=DF
  • Intrusion Prevention Packet Position=10
  • Intrusion Prevention Stream Position=10
  • Intrusion Prevention Flags=8

Release Notes

Version 1.6.0
May 14, 2018

Version 1.6.0: May 14, 2018
- Added "Deep Security Application Control Dashboard"
- Fixed incorrect transformation for system events
- Fixed label/title inconsistancy between dashboards
- Fixed saved searches "All Security Events" and "High Severity Events" to exclude system events as expected

Version 1.5.2
April 4, 2016

Version 1.5.2: April 4, 2016
- Fixed a typo in the transforms.conf for web reputation events. Credit to Chris Bell for reporting the error.

Version 1.5.1
March 29, 2016

Version 1.5.1: March 28, 2016
- Fixed an issue with "Intrusion Prevention Rule Updated" events not having their sourcetype modified.
- Fixed an issue where in some cases a space is included immediately after "CEF:" in the syslog output from Deep Security.
- Removed all inputs from the application itself to make it compatible with Splunk Cloud and to follow Splunk best practices of monitoring files.

Version 1.5
March 27, 2016

Version 1.5.0: March 27, 2016
- Added a single UDP input to handle all Deep Security messages (UDP:1514). The sourcetype will be dynamically changed according to the event content.
- Added "Firewall Events by Location" to the "Deep Security Firewall Dashboard" to map the source IP for Firewall events.
- Added "Intrusion Prevention Events by Location" to the "Deep Security Intrusion Prevention Dashboard" to map the source IP for IPS events.

Version 1.4
Jan. 2, 2015

Version 1.4.0: January 2, 2014

This is the initial release of the Trend Micro Deep Security for Splunk App.

472
Installs
2,783
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2018 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.