<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to integrated CloudGuard AppSec logs into various SIEM services in WAF</title>
    <link>https://community.checkpoint.com/t5/WAF/How-to-integrated-CloudGuard-AppSec-logs-into-various-SIEM/m-p/158312#M75</link>
    <description>&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;This post was originally written by&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/47794"&gt;@netzer&lt;/a&gt;&amp;nbsp;from CloudGuard AppSec Team and published on Medium.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;--&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;&lt;A class="au kc" href="https://appsec-doc.inext.checkpoint.com/" target="_blank" rel="noopener ugc nofollow"&gt;CloudGuard AppSec&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a fully automated Web Application &amp;amp; API Security solution. It is powered by a patented machine learning engine that continuously analyzes users’ HTTP/S requests as they visit the website or API. The analysis includes the application structure and how users interact with the content to identify patterns and automatically stop and block malicious requests and bad actors.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Upon detection of events, triggers are set off, where the most common trigger is sending logs about those events.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;While by default logs are sent to the Check Point cloud and can be seen through the Web Management interface for Cloud Guard AppSec,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="au kc" href="https://appsec-doc.inext.checkpoint.com/how-to/setup-log-triggers" target="_blank" rel="noopener ugc nofollow"&gt;a security administrator can configure&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to send those events, on top of, or instead of&lt;STRONG class="jf ih"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;this, to a Syslog/Syslog CEF server.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;In this blog, I wanted to show how I used this capability to send the events to common SIEM services.&lt;/P&gt;
&lt;H1 id="d63b" class="kd ke ig bm kf kg kh ki kj kk kl km kn ko kp kq kr ks kt ku kv kw kx ky kz la gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;How to Integrate CloudGuard AppSec logs into Sumo Logi?&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H2 id="df71" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Prerequisites&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Read the steps below before running them. Specifically, look at Step 6. In this step, you will be required to install a collector and there are several questions in this step regarding the collector’s location.&lt;/P&gt;
&lt;H2 id="0e6a" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 1: Run the collection setup wizard&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;When browsing to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;Manage Data-&amp;gt;Collection&lt;/STRONG&gt;, it is possible to run the “Setup Wizard”&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn lu"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_0-1664365876866.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17919iB5BF0F475DED65FD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_0-1664365876866.png" alt="yuvalmamka_0-1664365876866.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="32b3" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 2: Select “Integrate with Sumo Logic”&lt;/STRONG&gt;&lt;/H2&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_1-1664365876880.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17921iCFC8054E00061AB9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_1-1664365876880.png" alt="yuvalmamka_1-1664365876880.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="b0bf" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 3: Select “Your Custom App”&lt;/STRONG&gt;&lt;/H2&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="fm fn mh"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_2-1664365876649.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17920i14ACDBE14E0344C1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_2-1664365876649.png" alt="yuvalmamka_2-1664365876649.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="75ee" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 4: Select “Syslog”&lt;/STRONG&gt;&lt;/H2&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mi"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_3-1664365876643.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17922i995BE543D5FFC95C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_3-1664365876643.png" alt="yuvalmamka_3-1664365876643.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="ac2e" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 5: Select a new collector and the operating system&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;In my example I used Linux:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mj"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_4-1664365876858.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17923i0078B62C7721E806/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_4-1664365876858.png" alt="yuvalmamka_4-1664365876858.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="e2ec" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 6: Set up the collector&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;This step is the only complex step as there are many possible architectures you can use.&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI id="d33d" class="mk ml ig jf b jg jh jk jl jo mm js mn jw mo ka mp mq mr ms gh" data-selectable-paragraph=""&gt;You might have your Syslog server from which you want to collect, or you might want to use the collector to be the “server” for the AppSec logs.&lt;/LI&gt;
&lt;LI id="dc8b" class="mk ml ig jf b jg mt jk mu jo mv js mw jw mx ka mp mq mr ms gh" data-selectable-paragraph=""&gt;If you do not have a Syslog server already and just want to use the collector, then the location of the collector’s deployment is entirely up to you. But you will need to design the network connection to it so all relevant CloudGuard Appsec Gateways/Agents will have connectivity to it, in the relevant IP protocol and port which will soon be configured.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;I did a very simple thing in this example — I used the installation command provided by Sumo Logic at this stage to install the collector on the very same machine as the agent (meaning, I’m going to configure the trigger to send the logs to 127.0.0.1).&lt;/P&gt;
&lt;H2 id="be49" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 7: Configure protocol/port and additional settings&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;For protocol select UDP. For all other settings use the settings according to your needs:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn my"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_5-1664365876885.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17924i4C97267651F9DFA4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_5-1664365876885.png" alt="yuvalmamka_5-1664365876885.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;This is the last step on Sumo Logic’s side, after which the actual setup takes ~15 minutes.&lt;/P&gt;
&lt;H2 id="a51f" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 8: Configure the Log Trigger to send Syslog traffic to the collector’s location and port&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;As explained in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="au kc" href="https://appsec-doc.inext.checkpoint.com/how-to/setup-log-triggers" target="_blank" rel="noopener ugc nofollow"&gt;CloudGuard AppSec documentation for Log Trigger setup&lt;/A&gt;, edit your log trigger object or create a new one.&lt;BR /&gt;Then make sure to configure, in the “Log To” section, Syslog service settings, on top of or instead of the default “Cloud” option.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;In my example, I installed the collector on the very same machine as the agent, so my logs are sent to the local host address:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mz"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_6-1664365876787.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17925iD78764EB0426E847/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_6-1664365876787.png" alt="yuvalmamka_6-1664365876787.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Make sure the threat prevention settings&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;on each of the relevant assets&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are using the Log triggered you created/modified. Edit each relevant asset via&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;Cloud-&amp;gt;Assets&lt;/STRONG&gt;, go to the Threat Prevention tab and scroll down to the Log Trigger configuration:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn na"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_7-1664365876654.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17926iDD0C26FE37B08559/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_7-1664365876654.png" alt="yuvalmamka_7-1664365876654.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Enforce policy and at this point, logs should start being visible in Sumo Logic as well.&lt;BR /&gt;In my example I sent example attacks through my agent:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nb"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_8-1664365876944.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17927i9B2394B689BA4D6C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_8-1664365876944.png" alt="yuvalmamka_8-1664365876944.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H1 id="c5e6" class="kd ke ig bm kf kg kh ki kj kk kl km kn ko kp kq kr ks kt ku kv kw kx ky kz la gh" data-selectable-paragraph=""&gt;&lt;STRONG&gt;How to Integrate CloudGuard AppSec logs into&amp;nbsp;Splunk?&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H2 id="1bf2" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Prerequisites&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Read the steps below before running them. As with Sumo Logic, in this example, I opted to simply install a “universal forwarder” as they are called in Splunk, on the same machine as the agent itself, but you can opt for a different architecture.&lt;BR /&gt;A Splunk server or an account in the Splunk cloud is also needed.&lt;/P&gt;
&lt;H2 id="bec8" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 1: Install a universal downloader&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Follow the instructions for downloading a universal forwarder in your Splunk server. The images below are from a Splunk cloud trial license.&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nc"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_9-1664365876706.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17929iECF4C16EB80F9688/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_9-1664365876706.png" alt="yuvalmamka_9-1664365876706.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_10-1664365876882.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17930i17549E1AB56FD960/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_10-1664365876882.png" alt="yuvalmamka_10-1664365876882.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="1c9a" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 2: According to documentation download and install the account credentials&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;This involves downloading a file using the “Download Universal Forwarder Credentials” button seen above, moving the file to a local /tmp folder, running an installation command according to the documentation, and restarting the forwarder.&lt;/P&gt;
&lt;H2 id="2ba4" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 3: Configure inputs&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;This step can be performed in several ways, from UI to the command line.&lt;BR /&gt;I simply configured a local $SPLUNK_HOME/etc/system/local/inputs.conf file with the following section (I chose a random UDP listening port, but you may use a different one):&lt;BR /&gt;&lt;EM class="kb"&gt;[udp://5140]&lt;BR /&gt;disabled = false&lt;BR /&gt;connection_host=ip&lt;BR /&gt;sourcetype = syslog&lt;BR /&gt;index = appsec&lt;/EM&gt;&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;After doing this, the Splunk forwarder needs to be restarted.&lt;/P&gt;
&lt;H2 id="1e01" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 4: Configure the Log Trigger to send Syslog traffic to the collector’s location and port&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Just like the Sumo Logic example, and as explained in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="au kc" href="https://appsec-doc.inext.checkpoint.com/how-to/setup-log-triggers" target="_blank" rel="noopener ugc nofollow"&gt;CloudGuard AppSec documentation for Log Trigger setup&lt;/A&gt;, edit your log trigger object or create a new one.&lt;BR /&gt;Then make sure to configure, in the “Log To” section, Syslog service settings, on top of or instead of the default “Cloud” option.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;In my example, I installed the collector on the very same machine as the agent, so my logs are sent to the local host address and my chosen port:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nd"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_11-1664365876791.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17928i17A1C74CC667AAAB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_11-1664365876791.png" alt="yuvalmamka_11-1664365876791.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Make sure the threat prevention settings&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;on each of the relevant assets&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are using the Log triggered you created/modified. Edit each relevant asset via&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;Cloud-&amp;gt;Assets&lt;/STRONG&gt;, go to the Threat Prevention tab and scroll down to the Log Trigger configuration:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn na"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_12-1664365876657.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17931iB51812A60702B095/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_12-1664365876657.png" alt="yuvalmamka_12-1664365876657.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Enforce policy and at this point, logs should start being visible in the Splunk server/Splunk cloud account as well.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;As with the Sumo Logic example, we’ll see the same attack logs I used there:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nc"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_13-1664365876636.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17932iFE348A97B617F11F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_13-1664365876636.png" alt="yuvalmamka_13-1664365876636.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_14-1664365876940.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17933iE85018AA99D05D31/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_14-1664365876940.png" alt="yuvalmamka_14-1664365876940.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H1 id="dc22" class="kd ke ig bm kf kg kh ki kj kk kl km kn ko kp kq kr ks kt ku kv kw kx ky kz la gh" data-selectable-paragraph=""&gt;&lt;STRONG&gt;How to Integrate CloudGuard AppSec logs into&amp;nbsp;Microsoft Sentinel?&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H2 id="efd8" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Prerequisites&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Read the steps below before running them.&lt;BR /&gt;You also need a Microsoft Sentinel workspace in your Azure account.&lt;/P&gt;
&lt;H2 id="43cf" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 1: In your Microsoft Sentinel Workspace, locate the CEF connector under Configuration-&amp;gt;Data connectors&lt;/STRONG&gt;&lt;/H2&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn ne"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_15-1664365876904.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17935iEF4972923DF3DAA6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_15-1664365876904.png" alt="yuvalmamka_15-1664365876904.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="4df1" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 2: Select “CEF” and open the connector’s page&lt;/STRONG&gt;&lt;/H2&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_16-1664365876883.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17934iFCDA683E2A565946/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_16-1664365876883.png" alt="yuvalmamka_16-1664365876883.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="7367" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 3: Follow instructions and select a location for the collector’s agent&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Similarly to step 6 in the “Sumo Logic” guide, this step is the only complex step as there are many possible architectures you can use.&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI id="7c4c" class="mk ml ig jf b jg jh jk jl jo mm js mn jw mo ka mp mq mr ms gh" data-selectable-paragraph=""&gt;You might have your own CEF server from which you want to collect, or you might want to use the collector to be the “server” for the AppSec logs.&lt;/LI&gt;
&lt;LI id="c90e" class="mk ml ig jf b jg mt jk mu jo mv js mw jw mx ka mp mq mr ms gh" data-selectable-paragraph=""&gt;If you do not have a CEF server already and just want to use the collector, then the location of the collector’s deployment is entirely up to you. But you will need to design the network connection to it so all relevant CloudGuard Appsec Gateways/Agents will have connectivity to it, in the relevant IP protocol and port which will soon be configured.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;I did a very simple thing in this example, similarly to Sumo Logic — I used the instructions to install the collector on the very same machine as the agent (meaning, I’m going to configure the trigger to send the logs to 127.0.0.1).&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;&lt;STRONG class="jf ih"&gt;Important note&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;— The instructions below clearly state that the collector requires TCP traffic. However, it does listen to UDP/514 as well, and while the AppSec agent will support TCP options in the future — Using UDP was enough to make this work even now.&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_17-1664365876906.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17936i132FA77E696C9582/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_17-1664365876906.png" alt="yuvalmamka_17-1664365876906.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;I simply ran the command on the Ubuntu machine I had that contained my existing reverse proxy and embedded agent.&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_18-1664365876920.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17939i4BC33E37833D5417/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_18-1664365876920.png" alt="yuvalmamka_18-1664365876920.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Notes:&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI id="5553" class="mk ml ig jf b jg jh jk jl jo mm js mn jw mo ka mp mq mr ms gh" data-selectable-paragraph=""&gt;When running the connectivity validation command, it also sends a test log.&lt;/LI&gt;
&lt;LI id="4cd1" class="mk ml ig jf b jg mt jk mu jo mv js mw jw mx ka mp mq mr ms gh" data-selectable-paragraph=""&gt;This is the last step on Microsoft Sentinel’s side, after which the actual setup takes ~20 minutes, only after which, the status will be changed to “Connected” and you will see logs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 id="824c" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 4: Configure the Log Trigger to send CEF traffic to the collector’s location and port&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;As explained in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="au kc" href="https://appsec-doc.inext.checkpoint.com/how-to/setup-log-triggers" target="_blank" rel="noopener ugc nofollow"&gt;CloudGuard AppSec documentation for Log Trigger setup&lt;/A&gt;, edit your log trigger object or create a new one.&lt;BR /&gt;Then make sure to configure, in the “Log To” section, CEF service settings, on top of or instead of the default “Cloud” option.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;In my example, I installed the collector on the very same machine as the agent, so my logs are sent to the local host address:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nf"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_19-1664365876659.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17938i664A669C96D4B293/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_19-1664365876659.png" alt="yuvalmamka_19-1664365876659.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Make sure the threat prevention settings&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;on each of the relevant assets&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are using the Log triggered you created/modified. Edit each relevant asset via&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;Cloud-&amp;gt;Assets&lt;/STRONG&gt;, go to the Threat Prevention tab and scroll down to the Log Trigger configuration:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="fm fn ng"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_20-1664365876862.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17937i69E8839A5427E80B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_20-1664365876862.png" alt="yuvalmamka_20-1664365876862.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Enforce policy and at this point, logs should start being visible in Microsoft Sentinel as well.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;As with the previous Sumo Logic and Splunk examples, we’ll see the same attack logs I used there:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nh"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_21-1664365876900.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17940i6165A89495159C68/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_21-1664365876900.png" alt="yuvalmamka_21-1664365876900.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_22-1664365876930.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17941i16ABA7C56DAF236D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_22-1664365876930.png" alt="yuvalmamka_22-1664365876930.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H1 id="d83d" data-selectable-paragraph=""&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;CloudGuard AppSec allows forwarding logs to both CEF and Syslog Servers. SIEM services accept Syslog/CEF traffic as inputs, therefore allowing rather easy integration of CloudGuard AppSec to any existing SIEM services you might have.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;This blog has shown simple examples of I managed to easily integrate my CloudGuard AppSec product to a variety of SIEM services and touches on the different options that can be taken for these integrations.&lt;/P&gt;</description>
    <pubDate>Wed, 28 Sep 2022 11:55:39 GMT</pubDate>
    <dc:creator>yuvalmamka</dc:creator>
    <dc:date>2022-09-28T11:55:39Z</dc:date>
    <item>
      <title>How to integrated CloudGuard AppSec logs into various SIEM services</title>
      <link>https://community.checkpoint.com/t5/WAF/How-to-integrated-CloudGuard-AppSec-logs-into-various-SIEM/m-p/158312#M75</link>
      <description>&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;This post was originally written by&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/47794"&gt;@netzer&lt;/a&gt;&amp;nbsp;from CloudGuard AppSec Team and published on Medium.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;--&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;&lt;A class="au kc" href="https://appsec-doc.inext.checkpoint.com/" target="_blank" rel="noopener ugc nofollow"&gt;CloudGuard AppSec&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a fully automated Web Application &amp;amp; API Security solution. It is powered by a patented machine learning engine that continuously analyzes users’ HTTP/S requests as they visit the website or API. The analysis includes the application structure and how users interact with the content to identify patterns and automatically stop and block malicious requests and bad actors.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Upon detection of events, triggers are set off, where the most common trigger is sending logs about those events.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;While by default logs are sent to the Check Point cloud and can be seen through the Web Management interface for Cloud Guard AppSec,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="au kc" href="https://appsec-doc.inext.checkpoint.com/how-to/setup-log-triggers" target="_blank" rel="noopener ugc nofollow"&gt;a security administrator can configure&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to send those events, on top of, or instead of&lt;STRONG class="jf ih"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;this, to a Syslog/Syslog CEF server.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;In this blog, I wanted to show how I used this capability to send the events to common SIEM services.&lt;/P&gt;
&lt;H1 id="d63b" class="kd ke ig bm kf kg kh ki kj kk kl km kn ko kp kq kr ks kt ku kv kw kx ky kz la gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;How to Integrate CloudGuard AppSec logs into Sumo Logi?&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H2 id="df71" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Prerequisites&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Read the steps below before running them. Specifically, look at Step 6. In this step, you will be required to install a collector and there are several questions in this step regarding the collector’s location.&lt;/P&gt;
&lt;H2 id="0e6a" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 1: Run the collection setup wizard&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;When browsing to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;Manage Data-&amp;gt;Collection&lt;/STRONG&gt;, it is possible to run the “Setup Wizard”&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn lu"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_0-1664365876866.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17919iB5BF0F475DED65FD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_0-1664365876866.png" alt="yuvalmamka_0-1664365876866.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="32b3" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 2: Select “Integrate with Sumo Logic”&lt;/STRONG&gt;&lt;/H2&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_1-1664365876880.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17921iCFC8054E00061AB9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_1-1664365876880.png" alt="yuvalmamka_1-1664365876880.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="b0bf" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 3: Select “Your Custom App”&lt;/STRONG&gt;&lt;/H2&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="fm fn mh"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_2-1664365876649.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17920i14ACDBE14E0344C1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_2-1664365876649.png" alt="yuvalmamka_2-1664365876649.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="75ee" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 4: Select “Syslog”&lt;/STRONG&gt;&lt;/H2&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mi"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_3-1664365876643.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17922i995BE543D5FFC95C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_3-1664365876643.png" alt="yuvalmamka_3-1664365876643.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="ac2e" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 5: Select a new collector and the operating system&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;In my example I used Linux:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mj"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_4-1664365876858.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17923i0078B62C7721E806/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_4-1664365876858.png" alt="yuvalmamka_4-1664365876858.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="e2ec" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 6: Set up the collector&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;This step is the only complex step as there are many possible architectures you can use.&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI id="d33d" class="mk ml ig jf b jg jh jk jl jo mm js mn jw mo ka mp mq mr ms gh" data-selectable-paragraph=""&gt;You might have your Syslog server from which you want to collect, or you might want to use the collector to be the “server” for the AppSec logs.&lt;/LI&gt;
&lt;LI id="dc8b" class="mk ml ig jf b jg mt jk mu jo mv js mw jw mx ka mp mq mr ms gh" data-selectable-paragraph=""&gt;If you do not have a Syslog server already and just want to use the collector, then the location of the collector’s deployment is entirely up to you. But you will need to design the network connection to it so all relevant CloudGuard Appsec Gateways/Agents will have connectivity to it, in the relevant IP protocol and port which will soon be configured.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;I did a very simple thing in this example — I used the installation command provided by Sumo Logic at this stage to install the collector on the very same machine as the agent (meaning, I’m going to configure the trigger to send the logs to 127.0.0.1).&lt;/P&gt;
&lt;H2 id="be49" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 7: Configure protocol/port and additional settings&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;For protocol select UDP. For all other settings use the settings according to your needs:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn my"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_5-1664365876885.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17924i4C97267651F9DFA4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_5-1664365876885.png" alt="yuvalmamka_5-1664365876885.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;This is the last step on Sumo Logic’s side, after which the actual setup takes ~15 minutes.&lt;/P&gt;
&lt;H2 id="a51f" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 8: Configure the Log Trigger to send Syslog traffic to the collector’s location and port&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;As explained in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="au kc" href="https://appsec-doc.inext.checkpoint.com/how-to/setup-log-triggers" target="_blank" rel="noopener ugc nofollow"&gt;CloudGuard AppSec documentation for Log Trigger setup&lt;/A&gt;, edit your log trigger object or create a new one.&lt;BR /&gt;Then make sure to configure, in the “Log To” section, Syslog service settings, on top of or instead of the default “Cloud” option.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;In my example, I installed the collector on the very same machine as the agent, so my logs are sent to the local host address:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mz"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_6-1664365876787.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17925iD78764EB0426E847/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_6-1664365876787.png" alt="yuvalmamka_6-1664365876787.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Make sure the threat prevention settings&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;on each of the relevant assets&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are using the Log triggered you created/modified. Edit each relevant asset via&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;Cloud-&amp;gt;Assets&lt;/STRONG&gt;, go to the Threat Prevention tab and scroll down to the Log Trigger configuration:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn na"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_7-1664365876654.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17926iDD0C26FE37B08559/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_7-1664365876654.png" alt="yuvalmamka_7-1664365876654.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Enforce policy and at this point, logs should start being visible in Sumo Logic as well.&lt;BR /&gt;In my example I sent example attacks through my agent:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nb"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_8-1664365876944.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17927i9B2394B689BA4D6C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_8-1664365876944.png" alt="yuvalmamka_8-1664365876944.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H1 id="c5e6" class="kd ke ig bm kf kg kh ki kj kk kl km kn ko kp kq kr ks kt ku kv kw kx ky kz la gh" data-selectable-paragraph=""&gt;&lt;STRONG&gt;How to Integrate CloudGuard AppSec logs into&amp;nbsp;Splunk?&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H2 id="1bf2" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Prerequisites&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Read the steps below before running them. As with Sumo Logic, in this example, I opted to simply install a “universal forwarder” as they are called in Splunk, on the same machine as the agent itself, but you can opt for a different architecture.&lt;BR /&gt;A Splunk server or an account in the Splunk cloud is also needed.&lt;/P&gt;
&lt;H2 id="bec8" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 1: Install a universal downloader&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Follow the instructions for downloading a universal forwarder in your Splunk server. The images below are from a Splunk cloud trial license.&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nc"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_9-1664365876706.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17929iECF4C16EB80F9688/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_9-1664365876706.png" alt="yuvalmamka_9-1664365876706.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_10-1664365876882.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17930i17549E1AB56FD960/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_10-1664365876882.png" alt="yuvalmamka_10-1664365876882.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="1c9a" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 2: According to documentation download and install the account credentials&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;This involves downloading a file using the “Download Universal Forwarder Credentials” button seen above, moving the file to a local /tmp folder, running an installation command according to the documentation, and restarting the forwarder.&lt;/P&gt;
&lt;H2 id="2ba4" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 3: Configure inputs&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;This step can be performed in several ways, from UI to the command line.&lt;BR /&gt;I simply configured a local $SPLUNK_HOME/etc/system/local/inputs.conf file with the following section (I chose a random UDP listening port, but you may use a different one):&lt;BR /&gt;&lt;EM class="kb"&gt;[udp://5140]&lt;BR /&gt;disabled = false&lt;BR /&gt;connection_host=ip&lt;BR /&gt;sourcetype = syslog&lt;BR /&gt;index = appsec&lt;/EM&gt;&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;After doing this, the Splunk forwarder needs to be restarted.&lt;/P&gt;
&lt;H2 id="1e01" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 4: Configure the Log Trigger to send Syslog traffic to the collector’s location and port&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Just like the Sumo Logic example, and as explained in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="au kc" href="https://appsec-doc.inext.checkpoint.com/how-to/setup-log-triggers" target="_blank" rel="noopener ugc nofollow"&gt;CloudGuard AppSec documentation for Log Trigger setup&lt;/A&gt;, edit your log trigger object or create a new one.&lt;BR /&gt;Then make sure to configure, in the “Log To” section, Syslog service settings, on top of or instead of the default “Cloud” option.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;In my example, I installed the collector on the very same machine as the agent, so my logs are sent to the local host address and my chosen port:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nd"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_11-1664365876791.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17928i17A1C74CC667AAAB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_11-1664365876791.png" alt="yuvalmamka_11-1664365876791.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Make sure the threat prevention settings&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;on each of the relevant assets&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are using the Log triggered you created/modified. Edit each relevant asset via&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;Cloud-&amp;gt;Assets&lt;/STRONG&gt;, go to the Threat Prevention tab and scroll down to the Log Trigger configuration:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn na"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_12-1664365876657.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17931iB51812A60702B095/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_12-1664365876657.png" alt="yuvalmamka_12-1664365876657.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Enforce policy and at this point, logs should start being visible in the Splunk server/Splunk cloud account as well.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;As with the Sumo Logic example, we’ll see the same attack logs I used there:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nc"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_13-1664365876636.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17932iFE348A97B617F11F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_13-1664365876636.png" alt="yuvalmamka_13-1664365876636.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_14-1664365876940.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17933iE85018AA99D05D31/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_14-1664365876940.png" alt="yuvalmamka_14-1664365876940.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H1 id="dc22" class="kd ke ig bm kf kg kh ki kj kk kl km kn ko kp kq kr ks kt ku kv kw kx ky kz la gh" data-selectable-paragraph=""&gt;&lt;STRONG&gt;How to Integrate CloudGuard AppSec logs into&amp;nbsp;Microsoft Sentinel?&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H2 id="efd8" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Prerequisites&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Read the steps below before running them.&lt;BR /&gt;You also need a Microsoft Sentinel workspace in your Azure account.&lt;/P&gt;
&lt;H2 id="43cf" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 1: In your Microsoft Sentinel Workspace, locate the CEF connector under Configuration-&amp;gt;Data connectors&lt;/STRONG&gt;&lt;/H2&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn ne"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_15-1664365876904.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17935iEF4972923DF3DAA6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_15-1664365876904.png" alt="yuvalmamka_15-1664365876904.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="4df1" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 2: Select “CEF” and open the connector’s page&lt;/STRONG&gt;&lt;/H2&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_16-1664365876883.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17934iFCDA683E2A565946/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_16-1664365876883.png" alt="yuvalmamka_16-1664365876883.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H2 id="7367" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 3: Follow instructions and select a location for the collector’s agent&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;Similarly to step 6 in the “Sumo Logic” guide, this step is the only complex step as there are many possible architectures you can use.&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI id="7c4c" class="mk ml ig jf b jg jh jk jl jo mm js mn jw mo ka mp mq mr ms gh" data-selectable-paragraph=""&gt;You might have your own CEF server from which you want to collect, or you might want to use the collector to be the “server” for the AppSec logs.&lt;/LI&gt;
&lt;LI id="c90e" class="mk ml ig jf b jg mt jk mu jo mv js mw jw mx ka mp mq mr ms gh" data-selectable-paragraph=""&gt;If you do not have a CEF server already and just want to use the collector, then the location of the collector’s deployment is entirely up to you. But you will need to design the network connection to it so all relevant CloudGuard Appsec Gateways/Agents will have connectivity to it, in the relevant IP protocol and port which will soon be configured.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;I did a very simple thing in this example, similarly to Sumo Logic — I used the instructions to install the collector on the very same machine as the agent (meaning, I’m going to configure the trigger to send the logs to 127.0.0.1).&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;&lt;STRONG class="jf ih"&gt;Important note&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;— The instructions below clearly state that the collector requires TCP traffic. However, it does listen to UDP/514 as well, and while the AppSec agent will support TCP options in the future — Using UDP was enough to make this work even now.&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_17-1664365876906.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17936i132FA77E696C9582/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_17-1664365876906.png" alt="yuvalmamka_17-1664365876906.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;I simply ran the command on the Ubuntu machine I had that contained my existing reverse proxy and embedded agent.&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_18-1664365876920.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17939i4BC33E37833D5417/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_18-1664365876920.png" alt="yuvalmamka_18-1664365876920.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Notes:&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI id="5553" class="mk ml ig jf b jg jh jk jl jo mm js mn jw mo ka mp mq mr ms gh" data-selectable-paragraph=""&gt;When running the connectivity validation command, it also sends a test log.&lt;/LI&gt;
&lt;LI id="4cd1" class="mk ml ig jf b jg mt jk mu jo mv js mw jw mx ka mp mq mr ms gh" data-selectable-paragraph=""&gt;This is the last step on Microsoft Sentinel’s side, after which the actual setup takes ~20 minutes, only after which, the status will be changed to “Connected” and you will see logs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 id="824c" class="lb ke ig bm kf lc ld le kj lf lg lh kn jo li lj kr js lk ll kv jw lm ln kz lo gh" data-selectable-paragraph=""&gt;&lt;STRONG class="ba"&gt;Step 4: Configure the Log Trigger to send CEF traffic to the collector’s location and port&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;As explained in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="au kc" href="https://appsec-doc.inext.checkpoint.com/how-to/setup-log-triggers" target="_blank" rel="noopener ugc nofollow"&gt;CloudGuard AppSec documentation for Log Trigger setup&lt;/A&gt;, edit your log trigger object or create a new one.&lt;BR /&gt;Then make sure to configure, in the “Log To” section, CEF service settings, on top of or instead of the default “Cloud” option.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;In my example, I installed the collector on the very same machine as the agent, so my logs are sent to the local host address:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nf"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_19-1664365876659.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17938i664A669C96D4B293/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_19-1664365876659.png" alt="yuvalmamka_19-1664365876659.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Make sure the threat prevention settings&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;on each of the relevant assets&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are using the Log triggered you created/modified. Edit each relevant asset via&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="jf ih"&gt;Cloud-&amp;gt;Assets&lt;/STRONG&gt;, go to the Threat Prevention tab and scroll down to the Log Trigger configuration:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="fm fn ng"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_20-1664365876862.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17937i69E8839A5427E80B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_20-1664365876862.png" alt="yuvalmamka_20-1664365876862.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;Enforce policy and at this point, logs should start being visible in Microsoft Sentinel as well.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;As with the previous Sumo Logic and Splunk examples, we’ll see the same attack logs I used there:&lt;/P&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn nh"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_21-1664365876900.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17940i6165A89495159C68/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_21-1664365876900.png" alt="yuvalmamka_21-1664365876900.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;FIGURE class="lv lw lx ly fy lz fm fn paragraph-image"&gt;
&lt;DIV class="ma mb do mc ce md" tabindex="0" role="button"&gt;
&lt;DIV class="fm fn mg"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_22-1664365876930.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17941i16ABA7C56DAF236D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="yuvalmamka_22-1664365876930.png" alt="yuvalmamka_22-1664365876930.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/FIGURE&gt;
&lt;H1 id="d83d" data-selectable-paragraph=""&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg lp ji jj jk lq jm jn jo lr jq jr js ls ju jv jw lt jy jz ka hz gh" data-selectable-paragraph=""&gt;CloudGuard AppSec allows forwarding logs to both CEF and Syslog Servers. SIEM services accept Syslog/CEF traffic as inputs, therefore allowing rather easy integration of CloudGuard AppSec to any existing SIEM services you might have.&lt;/P&gt;
&lt;P class="pw-post-body-paragraph jd je ig jf b jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka hz gh" data-selectable-paragraph=""&gt;This blog has shown simple examples of I managed to easily integrate my CloudGuard AppSec product to a variety of SIEM services and touches on the different options that can be taken for these integrations.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2022 11:55:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/How-to-integrated-CloudGuard-AppSec-logs-into-various-SIEM/m-p/158312#M75</guid>
      <dc:creator>yuvalmamka</dc:creator>
      <dc:date>2022-09-28T11:55:39Z</dc:date>
    </item>
  </channel>
</rss>

