Add-on for Sophos Central CEF app icon

Add-on for Sophos Central CEF

Parses CEF-formatted Sophos Central syslog events with sub-sourcetype routing, MITRE ATT&CK field extractions, and CIM v5 tagging for Malware, Intrusion Detection, Incident Management, Network Traffic, and Web data models.

Built by
splunk product badge
screenshot
screenshot
screenshot

Latest Version 1.0.0
May 8, 2026
Compatibility
Splunk Enterprise, Splunk Cloud
Platform Version: 10.3, 10.2, 10.1, 10.0, 9.4, 9.3, 9.2, 9.1, 9.0, 8.2, 8.1, 8.0
CIM Version: 5.x
Rating

5

(9)

Log in to rate this app
Support
Add-on for Sophos Central CEF support icon
Developer Supported addon
Add-on for Sophos Central CEF is a technical add-on that parses Sophos Central security events delivered via CEF-formatted syslog to a Splunk Heavy Forwarder. The add-on provides comprehensive field extractions, automatic sub-sourcetype routing, and CIM v5 data model tagging for integration with Splunk Enterprise Security. It processes threat detections from Sophos Intercept X, investigation and case management events, firewall gateway logs, web control violations, device telemetry, update activity, and behavioral analysis events. The add-on performs index-time sub-sourcetype routing based on the CEF deviceEventClassId field, splitting incoming sophos:cef:central events into nine distinct sourcetypes: threat, investigation, firewall, webcontrol, device, update, corebehavioral, and coreclean. Field extractions include MITRE ATT&CK technique mappings extracted from Sophos threat intelligence, enabling correlation of detections with adversary tactics. CIM v5 compliance covers the Malware, Intrusion Detection, Incident Management, Network Traffic, and Web data models, providing normalized field mappings for use in Enterprise Security correlation searches, notable events, and threat intelligence workflows.

Categories

Security, Fraud & Compliance, Endpoint

Created By

Jai Sood

Type

addon

Downloads

11

Resources

Log in to report this app listing