Trend Micro Deep Security
The Trend Micro Deep Security App works with system and security events to monitor event history such as anti-malware, IPS, web reputation, firewall, integrity and log inspection events. The App analyzes security events from both on-premises and cloud-based Trend Micro Deep Security products.
Log Types
There are two types of Deep Security events:
- System Events
- Security Events
For complete details on configuring your Deep Security system for use with Sumo Logic, see the White Paper, “Deep Security Integration with Sumo Logic”.
Collect on-premises logs for the Trend Micro Deep Security App
This section provides instructions for configuring on-prem log collection for the Trend Micro Deep Security App, as well as examples of relevant log and query samples.
Configure Collector and Sources
To collect logs for Deep Security, do the following:
- Configure a Installed Collector.
- Configure a Syslog Source.
When you configure the Syslog Sources, for Protocol, select UDP.
Configure Deep Security System Event Log Forwarding
For complete details on configuring your Deep Security system for use with Sumo Logic, see the White Paper, “Deep Security Integration with Sumo Logic”.
To forward Deep Security system events to Sumo Logic, do the following:
- In Deep Security, go to Administration > System Settings > SIEM.
- Configure SIEM:
- Forward System Events to a remote computer (via Syslog). Activate this check box.
- Hostname or IP address to which events should be sent. This is the hostname or IP address of the Sumo Logic Installed Collector.
- UDP port to which events should be sent. Enter 514.
- Syslog Facility. Select Local 0.
- Syslog Format. Select Common Event Format.
- Save your changes.
Configure the Policy
Now you must add the Syslog Source to your Policy configuration. Set the integration details at the Top (root/base) policy as follows:
- Go to Settings > SIEM.
- For Anti-Malware Event Forwarding, select Forward Events To: and Relay via the Manager.
- Hostname or IP address to which events should be sent. This is the hostname or IP address of the Sumo Logic Installed Collector.
- UPD port to which events should be sent. Enter 514.
- Syslog Facility. Select Local 1.
- Syslog Format. Select Common Event Format.
- For Web Reputation Event Forwarding, select Forward Events To: and Relay via the Manager. 5. Hostname or IP address to which events should be sent. This is the hostname or IP address of the Sumo Logic Installed Collector. 6. UPD port to which events should be sent. Enter 514. 7. Syslog Facility. Select Local 1. 8. Syslog Format. Select Common Event Format.
- Click Save.
Sample Log Message
<142>Oct 2 16:41:16 CEF:0|Trend Micro|Deep Security Agent|9.6.3177|21|Unsolicited UDP|5|cn1=34 cn1Label=Host ID dvchost=workstation_tsiley TrendMicroDsTenant=Primary TrendMicroDsTenantId=0 act=Deny dmac=B0:B9:B9:F8:E7:8F smac=39:D2:AE:D6:1F:05 TrendMicroDsFrameType=IP src=130.202.140.130 dst=10.0.102.94 in=291 cs3= cs3Label=Fragmentation Bits proto=UDP spt=445 dpt=42 cnt=1
Query Sample
_sourceCategory=Trendmicro dst
| parse "CEF:0|*|*|*|*|*|*|*" as Device_Vendor,Device_Product,Device_Version,Signature_ID, Name, Severity, Extension
| where (signature_id >= 100 AND signature_id <= 199) OR signature_id = 20 OR signature_id = 21
| count Name
| top 5 Name by _count
Collect cloud-based logs for the Trend Micro Deep Security App
This section has instructions for collecting logs for the Trend Micro Deep Security using a Sumo Cloud Syslog source on a hosted collector.
Step 1: Create a Cloud Syslog source on a hosted collector
- Select an existing hosted collector, or create a new one.
- Add a Cloud Syslog source to the hosted collector.
- Give the source a name
- Enter a Source Category.
- Deselect the Enable Timestamp Parsing.
- Click Save.
- The Cloud Syslog Source Token will be generated. You'll supply this information as input to the Log Source Identifier, Server Name, and Server Port within Deep Security.
Supply this information as input to the Log Source Identifier: Server Name, and Server Port within Deep Security.
For Log Source Identifier field, use this format: Deep Security Manager [token from Cloud Syslog source]
Note the spaces with Deep Security Manager
.
Step 2: Configure Sumo as a syslog server in Trend Micro Deep Security.
- In the Deep Security Manager console, select Policies > Common Objects.
- Expand the Other node in the left pane.
- Select Syslog Configurations.
- Select the New button to create a new configuration.
- Log Source Identifier. Enter a three word label, for example “Deep Security Manager” or “My Log Source”, followed by value that was shown in the Token field on the Cloud Syslog Source Token page (when you configured the Cloud Syslog Source above), surrounded by square brackets like this:
Deep Security Manager [token from Cloud Syslog source]
. It's important that you use this format.Deep Security Manager
followed by thetoken
(for the Cloud Syslog Source) in square brackets like this:Deep Security Manager [token from Cloud Syslog source]
- Log Source Identifier. Enter a three word label, for example “Deep Security Manager” or “My Log Source”, followed by value that was shown in the Token field on the Cloud Syslog Source Token page (when you configured the Cloud Syslog Source above), surrounded by square brackets like this:
- Server Name. Enter the value that was shown in the Host field on the Cloud Syslog Source Token page when you configured the Cloud Syslog Source above.
- Server Port. Enter the value that was shown in the Port field on the Cloud Syslog Source Token page when you configured the Cloud Syslog Source above.
- Transport. Leave "TLS" selected.
- Click OK.
Step 3: Forward system and security events to Sumo Logic
- In the Deep Security Manager console, select Policies.
- Double-click the policy you want to use for forwarding events.
- Go to Settings > Event Forwarding.
- Under Event Forwarding Frequency (from the Agent/Appliance), specify how often events are to be sent to Sumo Logic.
- Under Event Forwarding Configuration (from the Agent/Appliance), specify the syslog configuration to use for each protection module, choosing from the following options:
- Inherited (configuration name): The behavior is inherited from a parent policy or computer.
- None: Events are not forwarded.
- _Syslog (configuration name): Events are forwarded to the specified syslog configuration. To see details about the configuration or edit it, click Edit. The configuration must have Agents should forward logs set to "Via the Deep Security Manager".
- New: Enables you to define a new configuration (for details, see Define a syslog configuration.) The configuration must have Agents should forward logs set to "Via the Deep Security Manager".
- Click Save.
Verify configuration
Send System Events to confirm communication with Sumo Logic. There may be a 5-10 minute delay.
Installing the Trend Micro Deep Security App
This section provides instructions on how to install the Trend Micro Deep Security App, and examples of each of the dashboards. The App reconfigured searches and dashboards that provide easy-to-access visual insights into your data.
To install the app:
Locate and install the app you need from the App Catalog. If you want to see a preview of the dashboards included with the app before installing, click Preview Dashboards.
- From the App Catalog, search for and select the app.
- Select the version of the service you're using and click Add to Library. Version selection is applicable only to a few apps currently. For more information, see Installing the Apps from the Library.
- To install the app, complete the following fields.
- App Name. You can retain the existing name, or enter a name of your choice for the app.
- Data Source. Select either of these options for the data source.
- Choose Source Category, and select a source category from the list.
- Choose Enter a Custom Data Filter, and enter a custom source category beginning with an underscore. Example: (
_sourceCategory=MyCategory
).
- Advanced. Select the Location in Library (the default is the Personal folder in the library), or click New Folder to add a new folder.
- Click Add to Library.
Once an app is installed, it will appear in your Personal folder, or other folder that you specified. From here, you can share it with your organization.
Panels will start to fill automatically. It's important to note that each panel slowly fills with data matching the time range query and received since the panel was created. Results won't immediately be available, but with a bit of time, you'll see full graphs and maps.
Viewing Trend Micro Dashboards
Deep Security - Overview
Anti-Malware Event History. Displays the number and types of anti-malware events in a stacked column chart on a timeline for the last 24 hours.
IPS Event History. Shows the number and types of IPS events in a stacked column chart on a timeline for the last 24 hours.
Web Reputation Event History. Provides details on the number and types of web reputation events in a stacked column chart on a timeline for the last 24 hours.
Firewall Event History. Displays the number and types of firewall events in a stacked column chart on a timeline for the last 24 hours.
Integrity Monitoring Event History. Shows the number and types of integrity monitoring events in a stacked column chart on a timeline for the last 24 hours.
Log Inspection Events History. Provides details on the number and types of log inspection events in a stacked column chart on a timeline for the last 24 hours.
Deep Security - Anti-Malware
Anti-Malware Event History. Displays the number and type of anti-malware events in a column chart on a timeline for the last 24 hours.
Top 5 Detected Malware. Shows the top 5 types of malware detected in a pie chart for the last 24 hours.
Top 5 Infected Computers. Lists the top 5 infected computers in a table chart by device host name and count for the last 24 hours.
Deep Security - Firewall
Firewall Events History. Displays the number and type of firewall events in a column chart on a timeline for the last 24 hours.
Reconnaissance Scan History. Shows the number and type of reconnaissance scan events in a column chart on a timeline for the last 24 hours.
Top 5 Reasons for Prevented Packets. Lists the top 5 reasons why packets were prevented in a table chart by device host name and count for the last 24 hours.
Top 5 Computers for Prevented Firewall Events. Displays the top 5 computers that had prevented firewall events in a table chart by device host name and count for the last 24 hours.
Top 5 Source IDs for Prevented Firewall Events. Shows the top 5 computers that had prevented firewall events in a table chart by source IP address and count for the last 24 hours.
Top 5 Destination Ports for Prevented Firewall Events. Provides details on the top 5 destination ports that had prevented firewall events in a table chart by destination port and count for the last 24 hours.
Top 5 Scans Detected. Displays the top 5 scans detected in a table chart by name and count for the last 24 hours.
Top 5 Computers for Reconnaissance Scans. Shows the top 5 computers for reconnaissance scans in a table chart by target entry and count for the last 24 hours.
Deep Security - Integrity Monitoring
Integrity Monitoring Event History. Displays the number and type of integrity monitoring events in a column chart on a timeline for the last 24 hours.
Top 5 Computers for Integrity Monitoring Events. Shows the top 5 computers that had integrity monitoring events in a table chart by device host name and count for the last 24 hours.
Top 5 Reasons for Integrity Monitoring Events. Lists the top 5 reasons for integrity monitoring events in a table chart by name and count for the last 24 hours.
Top 5 Keys for Integrity Monitoring Events. Displays the top 5 keys for integrity monitoring events in a table chart for the last 24 hours.
Deep Security - Intrusion Prevention
IPS Event History. Displays the number and type of intrusion prevention events in a column chart on a timeline for the last 24 hours.
Top 5 Source IPs for Detected IPS Events. Lists the top 5 Source IPs for detected intrusion prevention events in a table chart by source IP and count for the last 24 hours.
Top Hosts for Prevented IPS Events. Shows the top 5 hosts for prevented intrusion events in a table chart by device host name and count for the last 24 hours.
Top 5 Reasons for Detected IPS Events. Displays the top 5 reasons for detected intrusion prevention events in a table chart by name and count for the last 24 hours.
Deep Security - Log Inspection
Log Inspection Events History. Displays the number and type of log inspection events in a column chart on a timeline for the last 24 hours.
Top 5 Computers for Log Inspection Events. Lists the top 5 computers for log inspection events in a table chart by device host name and count for the last 24 hours.
Top 5 Reasons for Log Inspection Events. Shows the top 5 reasons for log inspection events in a table chart by device host name and count for the last 24 hours.
Top 5 Descriptions for Log Inspection Events. Displays the top 5 descriptions for log inspection events in a table chart by device host name and count for the last 24 hours.
Deep Security - Web Reputation
Web Reputation Event History. Displays the number and type of web reputation events in a column chart on a timeline for the last 24 hours.
Top 5 Computers for Web Reputation Events. Shows the top 5 computers that have had web reputation events by device host name and count for the last 24 hours.
Top 5 URLs for Web Reputation Events. Lists the top 5 URLs that have had web reputation events by URL and count for the last 24 hours.
Filters
The Sumo Logic App for Trend Micro - Deep Security provides the following filters:
- file
- severity
- signature_id