Adding Trend Micro Deep Security Device via Syslog

Trend Micro Deep Security as a Service delivers hosted security capabilities for cloud environments, including proactive intrusion detection and prevention (IDS/IPS), firewall, anti-malware, web reputation, log inspection, and integrity monitoring. You will need perform some configurations on Trendmicro so that you can see the logs from Trendmicro device over the Logsign Unified SecOps Platform.

Deep Security Configuration

1 . Security Module Event Forwarding

1-1. Log in to Trenmicro and Go to Policies > Details > Settings >SIEM

16.png

1-2. Fill the required information and configure. You can let other fields which is not indicated as default. After that click "SAVE"

17.png

2. System Event Notification Forwarding

18.png

After these processes, you'll add the source to view logs from the Trendmicro Deep Security device from the Logsign Unified SecOps Platform.

Open the Logsign Unified SecOps Platform WEB interface and click on the "+ Device" button under the Data Collection tab, which is then clicked on the Settings tab in the menu bar on the top of the page. In the Source Type Selection page, choose Syslog as the method. After that, Trendmicro is selected as Vendor information, and then Deep Security is specified in the Product Selection section. There is some information about the source that you want to add on the page:

Ekran_Resmi_2022-05-16_11.56.51.png

Host: IP address information of the Deep Security product that you want to retrieve the logs.

Encoding: utf_8, which is accepted as the general standard in Information Technologies, is set as default. Agree in the same way.

Offset: To explain it in terms of definition, let's say "time difference." If the "system" time you want to log in is forward or backward from the real-time difference, you can edit it accordingly. The symbol "+" moves forward, and "-" moves backward. Time information is specified in minutes.

Data Policy: As a definition, you can filter in or out of incoming data. In the Data Policy section, you can specify the kind of logs (word, event movement type, etc.) that you want to receive or not from the source. The default setting here is the Default Policy, which has the default rule is "collect all logs."

Max Line Length to Process: Each log is generated as a single line. So, the Logsign Unified SecOps Platform takes these logs and analyzes them. In some cases, the number of characters in a single line of a single log file can be more significant than two thousand forty-eight (2048). In such cases, you can change this part.

Check Health: If you tick this box, that will inform you about the service and operability of the Logsign Unified SecOps Platform. The Health Check Period tab will come up when the box is ticked. This part is the time interval information to be checked. 

Device Name: You must enter a descriptive name according to the configuration you are making (For ex., Trendmicro-DeepSec). It can provide convenience for people who analyze logs. You can think of the Description field as a resource-specific area.

Tag: Slightly different from the Description section, it can be used for a broader purpose. For example, you can query by tag; and make tag-based definitions while creating a report if you use multiple Deep Security and define each tag as DeepSec1 or DeepSec2. If you want to query about an event, you will get a shorter result when you search according to DeepSec1 name. 

After filling the Tag section, click on the Save button to add the Trend Micro Deep Security device to which you've configured the source.

 

 

Was this article helpful?
0 out of 0 found this helpful

Articles in this section

See more
Become a Certified Logsign User/Administrator
Sign-up for Logsign Academy and take the courses to learn about Logsign USO Platform in detail. Enjoy the courses, and get your badges and certificates. In these courses, you'll learn how to use Logsign in your work and add value to your career.
Visit Our Blog
Our Logsign USO Platform illustrate our expertise. So do the blog. Through our blog posts, deepen your knowledge on various SecOps topics or get updated about important news & modern approaches for cybersecurity. Get into the habit of reading valuable information provided by Logsign. Be a step ahead.