Skip to content

Symantec Endpoint Security C2C doc #4227

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 11 commits into from
Jun 26, 2024
Merged
Show file tree
Hide file tree
Changes from 2 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
13 changes: 13 additions & 0 deletions blog-service/2024-06-24-collection.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
---
title: Symantec Endpoint Security C2C Source (Collection)
image: https://help.sumologic.com/img/sumo-square.png
keywords:
- collection
- symantec-endpoint-security
hide_table_of_contents: true
authors:
- url: https://help.sumologic.com/release-notes-service/rss.xml
image_url: /img/release-notes/rss-orange.png
---

We're excited to announce the release of our new cloud-to-cloud source for Symantec Endpoint Security. This source collects incident and incident event data from the Symantec Endpoint Security platform using the [Incidents API](https://apidocs.securitycloud.symantec.com/#/doc?id=edr_incidents). [Learn more](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source).
1 change: 1 addition & 0 deletions cid-redirects.json
Original file line number Diff line number Diff line change
Expand Up @@ -1744,6 +1744,7 @@
"/cid/1964": "/docs/integrations/security-threat-detection/f5-big-ip-ltm",
"/cid/1965": "/docs/integrations/security-threat-detection/netskope",
"/cid/1966": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-cloud-source",
"/cid/1987": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source",
"/cid/1967": "/docs/integrations/web-servers/iis-10",
"/cid/1968": "/docs/integrations/partner-ecosystem-apps/",
"/cid/1969": "/docs/integrations/saas-cloud/opsgenie",
Expand Down
2 changes: 1 addition & 1 deletion docs/integrations/product-list.md
Original file line number Diff line number Diff line change
Expand Up @@ -572,7 +572,7 @@ Types of integrations:
| <img src={useBaseUrl('img/integrations/webhooks/stripe-logo.png')} alt="Thumbnail icon" width="50"/> | [Stripe](https://stripe.com/) | Webhook: [Stripe](/docs/integrations/webhooks/stripe/) |
| <img src={useBaseUrl('img/sumo-square.png')} alt="Thumbnail icon" width="50"/> | [Sumo Logic](https://www.sumologic.com/) | Apps: <br/>- [Enterprise Audit - Cloud SIEM](/docs/integrations/sumo-apps/cse/) <br/>- [Sumo Logic Audit App](/docs/integrations/sumo-apps/audit/) <br/>- [Sumo Logic Data Volume App](/docs/integrations/sumo-apps/data-volume/) <br/>- [Sumo Logic Enterprise Audit Apps](/docs/integrations/sumo-apps/enterprise-audit/) (multiple apps) <br/>- [Sumo Logic Enterprise Search Audit App](/docs/integrations/sumo-apps/enterprise-search-audit/) <br/>- [Sumo Logic Infrequent Data Tier App](/docs/integrations/sumo-apps/infrequent-data-tier/) <br/>- [Sumo Logic Log Analysis QuickStart App](/docs/integrations/sumo-apps/log-analysis-quickstart/) <br/>- [Sumo Logic Security Analytics App](/docs/integrations/sumo-apps/security-analytics/) <br/>Automation integrations: <br/>- [Basic Tools](/docs/platform-services/automation-service/app-central/integrations/basic-tools/) <br/>- [ESMTP](/docs/platform-services/automation-service/app-central/integrations/esmtp/) <br/>- [HTTP Tools](/docs/platform-services/automation-service/app-central/integrations/http-tools/) <br/>- [Incident Tools](/docs/platform-services/automation-service/app-central/integrations/incident-tools/) <br/>- [IMAP](/docs/platform-services/automation-service/app-central/integrations/imap/) <br/>- [Mail Tools](/docs/platform-services/automation-service/app-central/integrations/mail-tools/) <br/>- [POP3](/docs/platform-services/automation-service/app-central/integrations/pop3/) <br/>- [SMTP V3](/docs/platform-services/automation-service/app-central/integrations/smtp-v3/) <br/>- [Sumo Logic Cloud SIEM](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem/) <br/>- [Sumo Logic Cloud SIEM Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem-internal/) <br/>- [Sumo Logic Log Analytics](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics/) <br/>- [Sumo Logic Log Analytics Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics-internal/) <br/>- [Sumo Logic Notifications](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications/) <br/>- [Triage Tools](/docs/platform-services/automation-service/app-central/integrations/triage-tools/) <br/>- [ZIP Tools](/docs/platform-services/automation-service/app-central/integrations/zip-tools/) |
| <img src={useBaseUrl('img/integrations/webhooks/superwise-logo.png')} alt="Thumbnail icon" width="50"/> | [Superwise](https://superwise.ai/) | Webhook: [Superwise](/docs/integrations/webhooks/superwise/) |
| <img src={useBaseUrl('/img/send-data/symantec-logo.svg')} alt="Thumbnail icon" width="75"/> | [Symantec](https://sep.securitycloud.symantec.com/v2/landing) | App: [Symantec Web Security Service](/docs/integrations/saas-cloud/symantec-web-security-service/) <br/>Automation integrations: <br/>- [Javelin AD Protect](/docs/platform-services/automation-service/app-central/integrations/javelin-ad-protect/) <br/>- [Symantec DeepSight](/docs/platform-services/automation-service/app-central/integrations/symantec-deepsight/) <br/>- [Symantec EDR](/docs/platform-services/automation-service/app-central/integrations/symantec-edr/) <br/>- [Symantec Endpoint Protection](/docs/platform-services/automation-service/app-central/integrations/symantec-endpoint-protection/) <br/>- [Symantec Endpoint Protection Cloud](/docs/platform-services/automation-service/app-central/integrations/symantec-endpoint-protection-cloud/) <br/>- [Symantec Secure Web Gateway (Bluecoat)](/docs/platform-services/automation-service/app-central/integrations/symantec-secure-web-gateway-bluecoat/) <br/>- [Symantec WebPulse](/docs/platform-services/automation-service/app-central/integrations/symantec-webpulse/) <br/>Collectors: <br/>- [Symantec Web Security Service Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-web-security-service-source/) <br/>- [Symantec Proxy Secure Gateway - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway/) <br/>- [Symantec Proxy Secure Gateway (Blue Coat Proxy) - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway-blue-coat-proxy/) |
| <img src={useBaseUrl('/img/send-data/symantec-logo.svg')} alt="Thumbnail icon" width="75"/> | [Symantec](https://sep.securitycloud.symantec.com/v2/landing) | App: [Symantec Web Security Service](/docs/integrations/saas-cloud/symantec-web-security-service/) <br/>Automation integrations: <br/>- [Javelin AD Protect](/docs/platform-services/automation-service/app-central/integrations/javelin-ad-protect/) <br/>- [Symantec DeepSight](/docs/platform-services/automation-service/app-central/integrations/symantec-deepsight/) <br/>- [Symantec EDR](/docs/platform-services/automation-service/app-central/integrations/symantec-edr/) <br/>- [Symantec Endpoint Protection](/docs/platform-services/automation-service/app-central/integrations/symantec-endpoint-protection/) <br/>- [Symantec Endpoint Protection Cloud](/docs/platform-services/automation-service/app-central/integrations/symantec-endpoint-protection-cloud/) <br/>- [Symantec Secure Web Gateway (Bluecoat)](/docs/platform-services/automation-service/app-central/integrations/symantec-secure-web-gateway-bluecoat/) <br/>- [Symantec WebPulse](/docs/platform-services/automation-service/app-central/integrations/symantec-webpulse/) <br/>Collectors: <br/>- [Symantec Endpoint Security Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source/) <br/>- [Symantec Web Security Service Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-web-security-service-source/) <br/>- [Symantec Proxy Secure Gateway - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway/) <br/>- [Symantec Proxy Secure Gateway (Blue Coat Proxy) - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway-blue-coat-proxy/) |
| <img src={useBaseUrl('img/integrations/misc/syslog-ng-logo.png')} alt="Thumbnail icon" width="75"/> | [syslog-ng](https://www.syslog-ng.com/) | Automation integration: [Syslog-NG](/docs/platform-services/automation-service/app-central/integrations/syslog-ng/) <br/>Collector: [syslog-ng](/docs/send-data/hosted-collectors/cloud-syslog-source/syslog-ng/) |

## T
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -432,6 +432,12 @@ In this section, we'll introduce the following concepts:
<p>Learn to receive authentication logs from the Sophos Central APIs.</p>
</div>
</div>
<div className="box smallbox card">
<div className="container">
<a href="/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source"><img src={useBaseUrl('img/send-data/symantec-logo.svg')} alt="icon" width="150"/><h4>Symantec Endpoint Security</h4></a>
<p>Learn to collect incident and incident events using the Symantec Incidents API.</p>
</div>
</div>
<div className="box smallbox card">
<div className="container">
<a href="/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-web-security-service-source"><img src={useBaseUrl('img/send-data/symantec-logo.svg')} alt="icon" width="150"/><h4>Symantec Web Security Service</h4></a>
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,109 @@
---
id: symantec-endpoint-security-source
title: Symantec Endpoint Security Source
sidebar_label: Symantec Endpoint Security
tags:
- cloud-to-cloud
- symantec-endpoint-security
description: Learn how to collect incident and incident events from the Symantec Endpoint Security source.
---

import CodeBlock from '@theme/CodeBlock';
import MyComponentSource from '!!raw-loader!/files/c2c/symantec-endpoint-security/example.json';
import TerraformExample from '!!raw-loader!/files/c2c/symantec-endpoint-security/example.tf';
import useBaseUrl from '@docusaurus/useBaseUrl';

<img src={useBaseUrl('img/send-data/symantec-logo.svg')} alt="icon" width="125"/>

Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, and servers in network against malware, risks, and vulnerabilities. Symantec Endpoint Protection combines virus protection with advanced threat protection to proactively secure the client computers against known and unknown threats. This integration collects these information using the [Symantec Incidents API](https://apidocs.securitycloud.symantec.com/#/doc?id=edr_incidents) and ingests them into Sumo Logic.

## Data collected

| Polling Interval | Data Source | Description |
| :--- | :--- | :--- |
| 5 min | [Token](https://api.sep.securitycloud.symantec.com/v1/oauth2/tokens)| Used to generate a bearer token to subsequent API calls. |
| 5 min | [Incidents](https://api.sep.securitycloud.symantec.com/v1/incidents)| Used to retrieve incidents and incident events. |
| 5 min | [Incident Events](https://api.sep.securitycloud.symantec.com/v1/incidents/events)| Used to retrieve incident related events based on time range filter. |

## Setup

### Vendor configuration

The Symantec Endpoint Security source requires you to provide an authentication token. To obtain the token, follow the steps below.
1. Sign in to the [Symantec Endpoint Security](https://login.broadcom.com/) platform.
1. Go to **Integration** and select **Client Applications**.
1. Click on **Add Client Application**.
1. Enter any name for the application and press the **Add** button. The client application details screen appears.
1. Select required privileges for the client application and click **Save**.
1. Click on **More Options icon** and select **Client Secret**.
1. Copy the **OAuth Credentials** value.
1. Run the below curl command with the required headers to generate the bearer token:
```
curl -X POST https://api.sep.securitycloud.symantec.com/v1/oauth2/tokens
-H “accept: application/json”
-H “authorization: {{OAuth Credentials value}}"
-H “content-type: application/x-www-form-urlencoded”
```

### Source configuration

When you create a Symantec Endpoint Security Source, you add it to a Hosted Collector. Before creating the source, identify the Hosted Collector you want to use or create a new Hosted Collector. For instructions, see [Configure a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).

To configure a Symantec Endpoint Security Source, follow the steps below:
1. <!--Kanso [**Classic UI**](/docs/get-started/sumo-logic-ui/). Kanso--> In the main Sumo Logic menu, select **Manage Data > Collection > Collection**. <!--Kanso <br/>[**New UI**](/docs/get-started/sumo-logic-ui-new/). In the Sumo Logic top menu select **Configuration**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**. Kanso-->
1. On the Collection page, click **Add Source** next to a Hosted Collector.
1. Search for and select **Symantec Endpoint Security**.
1. Enter a **Name** for the Source. The description is optional.
1. (Optional) For **Source Category**, enter any string to tag the output collected from the Source. Category metadata is stored in a searchable field called `_sourceCategory`.
1. (Optional) **Fields**. Click the **+Add** button to define the fields you want to associate. Each field needs a name (key) and value.
* ![green check circle.png](/img/reuse/green-check-circle.png) A green circle with a check mark is shown when the field exists in the Fields table schema.
* ![orange exclamation point.png](/img/reuse/orange-exclamation-point.png) An orange triangle with an exclamation point is shown when the field doesn't exist in the Fields table schema. In this case, an option to automatically add the nonexistent fields to the Fields table schema is provided. If a field is sent to Sumo Logic that does not exist in the Fields schema, it is ignored, also known as dropped.
1. In **Client ID**, enter the Client ID you generated from the Symantec Endpoint Security platform.
2. In **Client Secret**, enter the Client Secret you generated from the Symantec Endpoint Security platform.
3. (Optional) In **Initial LookBack**, enter the first collection start time. Default is 1 day and maximum is 30 days.
4. **Include Events**. Select this checkbox if you want to collect events from incidents.
5. (Optional) The **Polling Interval** is set for 24 hours by default. You can adjust it based on your needs.
6. (Optional) **Processing Rules for Logs**. Configure any desired filters, such as allowlist, denylist, hash, or mask, as described in Create a Processing Rule.
7. When you are finished configuring the Source, click **Save**.

## JSON schema

Sources can be configured using UTF-8 encoded JSON files with the Collector Management API. See [how to use JSON to configure Sources](/docs/send-data/use-json-configure-sources) for details. 

| Parameter | Type | Value | Required | Description |
|:--|:--|:--|:--|:--|
| schemaRef | JSON Object | `{"type":"Symantec Endpoint Security"}` | Yes | Define the specific schema type. |
| sourceType | String | `"Universal"` | Yes | Type of source. |
| config | JSON Object | [Configuration object](#configuration-object) | Yes | Source type specific values. |

### Configuration Object

| Parameter | Type | Required | Default | Description | Example |
|:---|:---|:---|:---|:---|:---|
| name | String | Yes | `null` | Type a desired name of the source. The name must be unique per Collector. This value is assigned to the [metadata](/docs/search/get-started-with-search/search-basics/built-in-metadata) field `_source`. | `"mySource"` |
| description | String | No | `null` | Type a description of the source. | `"Testing source"`
| category | String | No | `null` | Type a category of the source. This value is assigned to the [metadata](/docs/search/get-started-with-search/search-basics/built-in-metadata) field `_sourceCategory`. See [best practices](/docs/send-data/best-practices) for details. | `"mySource/test"`
| fields | JSON Object | No | `null` | JSON map of key-value fields (metadata) to apply to the Collector or Source. Use the boolean field `_siemForward` to enable forwarding to SIEM.|`{"_siemForward": false, "fieldA": "valueA"}` |
| clientID | String | No | `null`| Client ID generated from the Symantec Endpoint Security platform. | |
| clientSecret | String | No | `null`| Client Secret generated from the Symantec Endpoint Security platform. | |
| incidentsIncludeEvents | String | No | false | Select the checkbox to include the incident events. | `5 minutes` |
| incidentsInitialLookback | Integer | No | 1 day | First collection start time. | |
| pollingInterval | String | No | 5 minutes | This sets how often the Source checks for data. | `5 minutes` |

### JSON example

<CodeBlock language="json">{MyComponentSource}</CodeBlock>

<a href="/files/c2c/symantec-endpoint-security/example.json" target="_blank">Download example</a>

### Terraform example

<CodeBlock language="json">{TerraformExample}</CodeBlock>

<a href="/files/c2c/symantec-endpoint-security/example.tf" target="_blank">Download example</a>

## FAQ

:::info
Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
:::
1 change: 1 addition & 0 deletions sidebars.ts
Original file line number Diff line number Diff line change
Expand Up @@ -313,6 +313,7 @@ module.exports = {
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/sentinelone-mgmt-api-source',
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/slack-source',
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/sophos-central-source',
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source',
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-web-security-service-source',
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/tenable-source',
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/trellix-mvisio-epo-source',
Expand Down
23 changes: 23 additions & 0 deletions static/files/c2c/symantec-endpoint-security/example.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
{
"api.version":"v1",
"source":{
"config":{
"name":"Symantec Endpoint Security Test",
"clientID":"********",
"incidentsIncludeEvents":true,
"incidentsInitialLookback":"1d",
"fields":{
"_siemForward":false
},
"clientSecret":"********",
"pollingInterval":"5m"
},
"schemaRef":{
"type":"Symantec Endpoint Security"
},
"state":{
"state":"Collecting"
},
"sourceType":"Universal"
}
}
21 changes: 21 additions & 0 deletions static/files/c2c/symantec-endpoint-security/example.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
resource "sumologic_cloud_to_cloud_source" "symantec-endpoint-security-source" {
collector_id = sumologic_collector.collector.id
schema_ref = {
type = "Symantec Endpoint Security"
}
config = jsonencode({
"name":"Symantec Endpoint Security Test",
"clientID":"********",
"incidentsIncludeEvents":true,
"incidentsInitialLookback":"1d",
"fields":{
"_siemForward":false
},
"clientSecret":"********",
"pollingInterval":"5m"
})
}
resource "sumologic_collector" "collector" {
name = "my-collector"
description = "Just testing this"
}
Loading