Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

What, When, and How to Use Log Inspection for Deep Security

    • Updated:
    • 14 Mar 2020
    • Product/Version:
    • Deep Security 10.0
    • Deep Security 10.1
    • Deep Security 10.2
    • Deep Security 9.6
    • Deep Security as a Service 2.0
    • Platform:
    • N/A N/A

This article will help you understand the following aspects of Deep Security Log Inspection:

  • Definition of Log Inspection
  • Usage of Log Inspection
  • Configuring the Log Inspection
This article was originally entitled as Log Inspection- The Most Misunderstood Control, which was first published at the Trend Micro Amazon Web Services site. It was written by technical security expert Dilan Nathoo.

What is Log Inspection?

The Deep Security Log Inspection module provides the ability to collect and analyze operating systems and application logs for security events. Log Inspection rules optimize the identification of important security events buried in multiple log entries. These events can be forwarded to a SIEM system or centralized logging server for correlation, reporting, and archiving. The Deep Security Agent will also forward the event information to the Deep Security Manager.

When to use Log Inspection?

Below are some of the use cases where organizations can utilize the Log Inspection capability within Deep Security platform:

  • Auditable reporting for compliance. A complete audit trail of security events can be generated to assist with meeting compliance requirements such as PCI 10.6 and/or addressing four (4) of the SANS Top 20 Critical Security Controls (e.g. Control 6: Maintenance, Monitoring, & Analysis of Audit Logs and Control 16: Account Monitoring & Control)
  • Suspicious-behaviour detection. The module provides visibility into suspicious behaviour that might occur on your servers.
  • Collecting events across your environment. The Deep Security Log Inspection module is able to collect and correlate events across Microsoft Windows, Linux, and Solaris platforms, application events from web servers, mail servers, SSHD, Samba, Microsoft FTP, and as well as custom application log events.
  • Correlate different events. Collect and correlate diverse warnings, errors, and informational events, including system messages such as disk full, communication errors, services events, shutdown, and system updates, application events such as account login/logout/failures/lockout, application errors, and communication errors, and administrative actions such as administrative login/logout/failure/lockout, policy changes, and account changes.

How to use the Log Inspection Control?

Log Inspection content is delivered in the form of rules included in a Security Update. These rules provide a high level means of selecting the applications and logs to be analyzed.

  1. Make sure the Log Inspection module is turned on within your security policy and click Save.

    Enable Log Inspection

  2. Under the General tab, click the Scan for Recommendations button to start the recommendation scan.

    Scan recommendation

    The recommendation engine is a framework that exists within Deep Security Manager, which allows the system to suggest and automatically assign security configuration (in our case Log Inspection Rules). The goal is to make configuration of computers easier and only assign the relevant security required to protect the computer at that point in time. As the virtual machines change, the security policy changes with it. The recommendation scans process can be automated. For more information check out this article: The What, Why and How of Recommendation Scans.
  3. Once the recommendation scan is completed and assigned, double-click the rules to examine each suggested rules.

    Check the rules

  4. Select the Configuration tab and make any desired changes if needed, then click OK. Custom log inspection rules can also be created if required. Save and apply the policy to the relevant instances or computers.

    Configure the settings

  5. If required, you can forward these events to a central SIEM solution either from the two levels below:
    • From the policy level, go to Settings > SIEM. Select the Forward Events to radio button.
    • From the system level, go to System Settings > Event Forwarding. Under SIEM section, tick the Forward System Events checkbox.

In conclusion, logs are security gold but finding actionable insights in mountains of data can be challenging. Log inspection makes data mining easier by providing continuous monitoring of OS and app logs. We filter out the noise and reduce false positives so that you can focus on real issues.

Solution Id:
Did this article help you?

Thank you for your feedback!

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.