Views:

When unable to forward Deep Security events to a forward deep security events to a Syslog or SIEM server, the following steps may be taken:

  1. Allow event forwarding network traffic
    All routers, firewalls, and security groups must allow inbound traffic from Deep Security Manager (and, for direct forwarding of security events, inbound traffic from agents) to your Syslog server. See also Port numbers, URLs, and IP addresses.
  2. Request a client certificate
    If you want to forward events securely (over TLS), and if your Syslog server requires client authentication, then you must generate a client (not server) certificate signing request (CSR). Deep Security Manager will use this certificate to identify and authenticate itself when it connects as a client to the Syslog server. For details on how to request a client certificate, contact your certificate authority (CA).

    Some Syslog servers do not accept self-signed server certificates (such as Deep Security Manager's default). A CA-signed, client certificate is required.
    Use either a CA that the Syslog server trusts, or an intermediate CA whose certificate was signed, directly or indirectly, by a trusted root CA. (This is also called a "trust chain" or "signing chain".)

    Once you receive the signed certificate from your CA, to upload it to Deep Security Manager, continue with Define a Syslog configuration
  3. Define a Syslog configuration
Syslog configurations define the destination and settings that can be used when forwarding system or security events.

If you configured SIEM or Syslog settings before January 26th, 2017, they have been converted to Syslog configurations. Identical configurations were merged.
  1. Go to Policies > Common Objects > Other > Syslog Configurations.
  2. Click New > New Configuration.
  3. On the General tab, configure:
    • Name: Unique name that identifies the configuration.
    • Description: Optional description of the configuration.
    • Log Source Identifier: Optional identifier to use instead of Deep Security Manager's hostname. If Deep Security Manager is multi-node, each server node has a different hostname. Log source IDs can therefore be different. If you need the IDs to be the same regardless of hostname (for example, for filtering purposes), you can configure their shared log source ID here.
This setting does not apply to events sent directly by Deep Security Agent, which always uses its hostname as the log source ID.
  • Server Name: Hostname or IP address of the receiving Syslog or SIEM server.
  • Server Port: Listening port number on the SIEM or Syslog server. For UDP, the IANA standard port number is 514. For TLS, it's usually port 6514. See also Port numbers, URLs, and IP addresses.
  • Transport: Whether the transport protocol is secure (TLS) or not (UDP).
With UDP, Syslog messages are limited to 64 KB. If the message is longer, data may be truncated.
With TLS, the manager and Syslog server must trust each other's certificates. The connection from the manager to the Syslog server is encrypted with TLS 1.2, 1.1, or 1.0.
Note: TLS requires that you set Agents should forward logs to Via the Deep Security Manager (indirectly). Agents do not support forwarding with TLS.
Note: LEEF format requires that you set Agents should forward logs to Via the Deep Security Manager (indirectly).
Note: Basic Syslog format is not supported by Deep Security Anti-Malware, Web Reputation, Integrity Monitoring, and Application Control.
  • Include time zone in events: Whether to add the full date (including year and time zone) to the event.
    Example (selected): 2018-09-14T01:02:17.123+04:00.
    Example (deselected): Sep 14 01:02:17.
Note: Full dates require that you set Agents should forward logs to Via the Deep Security Manager (indirectly).
  • Facility: Type of process that events will be associated with. Syslog servers may prioritize or filter based upon a log message's facility field. See also What are Syslog Facilities and Levels?
  • Agents should forward logs: Whether to send events Directly to the Syslog server or Via the Deep Security Manager (indirectly).

    When forwarding logs directly to the Syslog server, agents use clear text UDP. Logs contain sensitive information about your security system. If logs will travel over an untrusted network such as the Internet, consider adding a VPN tunnel or similar to prevent reconnaissance and tampering.
Note: If you forward logs via the manager, they do not include Firewall and Intrusion Prevention packet data unless you configure Deep Security Manager to include it. For instructions, see Sending packet data to syslog via Deep Security Manager (DSM).
 
4. If the Syslog or SIEM server requires TLS clients to do client authentication (also called bilateral or mutual authentication; see Request a client certificate ), then on the Credentials tab, configure:
  • Private Key: Paste the private key of Deep Security Manager's client certificate.
  • Certificate: Paste the client certificate that Deep Security Manager will use to identify itself in TLS connections to the Syslog server. Use PEM, also known as Base64-encoded format.
  • Certificate Chain: If an intermediate CA signed the client certificate, but the Syslog server doesn't know and trust that CA, then paste CA certificates which prove a relationship to a trusted root CA. Press Enter between each CA certificate.
5. Click Apply.
6. If you selected the TLS transport mechanism, verify that both Deep Security Manager and the Syslog server can connect and trust each other's certificates.
  • Click Test Connection.
Deep Security Manager tries to resolve the hostname and connect. If that fails, an error message appears.

If the Syslog or SIEM server certificate is not yet trusted by Deep Security Manager, the connection fails and an Accept Server Certificate? message should appear. The message shows the contents of the Syslog server's certificate.
  • Verify that the Syslog server's certificate is correct, and then and click OK to accept it.
The certificate is added to the manager's list of trusted certificates on Administration > System Settings > Security. Deep Security Manager can accept self-signed certificates.
  • Click Test Connection again.
Now the TLS connection should succeed.
7. Continue by selecting which events to forward. See Forward system events  and/or Forward security events.
 
4. Forward system events

Deep Security Manager generates system events (such as administrator logins or upgrading agent software).

  1. Go to Administration > System Settings > Event Forwarding.
  2. From Forward System Events to a remote computer (via Syslog) using configuration, either select an existing configuration or select New. For details, see Define a Syslog configuration .
  3. Click Save.
Note: If Deep Security Manager is multi-node, system events are only sent from one node to avoid duplicates.
 
5. Forward Security Events
Deep Security Agent protection features generate security events (such as detecting malware or triggering an IPS rule). You can forward events either:
  • Directly
  • Indirectly, via Deep Security Manager

Some event forwarding options  require forwarding agent events indirectly, via Deep Security Manager.

Like other policy settings, you can override event forwarding settings for specific policies or computers. See Policies, inheritance, and overrides

  1. Go to Policies.
  2. Double-click the policy used by the computers.
  3. Select Settings and then the Event Forwarding tab.
  4. From Period between sending of events, select how often to forward events.
  5. From Anti-Malware Syslog Configuration and other protection modules' drop-down menus, either select which Syslog configuration to use, click Edit to change it, select None to disable it, or click New. For details, see Define a Syslog configuration.
  6. Click Save.

By following the above steps, events should be successfully forwarded to the syslog server without any issues.