Cylance PROTECT¶
About¶
BlackBerry® Protect is an artificial intelligence (AI) based endpoint protection platform (EPP) that prevents breaches and provides added controls for safeguarding against sophisticated cyberthreats—no human intervention, Internet connections, signature files, heuristics or sandboxes required.
Product Details¶
Vendor URL: Cylance PROTECT
Product Type: AV
Product Tier: Tier II
Integration Method: Syslog
Integration URL: Cylance PROTECT - Cyderes Documentation
Log Guide: Sample Logs by Log Type
Parser Details¶
Log Format: Syslog
Expected Normalization Rate: near 100%
Data Label: CYLANCE_PROTECT
UDM Fields (list of all UDM fields leveraged in the Parser):
Log File Field | UDM Field |
---|---|
Agent Version | principal.asset.attribute.labels |
Destination IP | target.ip |
Destination Port | target.port |
Device Id | principal.asset_id |
Device Name | principal.hostname |
Device Name | principal.hostname |
Device Names | principal.hostname |
EventName | metadata.description |
EventType | metadata.product_event_type |
EventType | security_result.summary |
External Device Name | target.resource.name |
External Device Product ID | target.resource.id |
External Device Type | target.resource.type |
File Name | target.process.file.full_path |
Insitgating Process Name | principal.process.file.full_path |
Instigating Process ImageFileSha256 | principal.process.file.sha256 |
Instigating Process Owner | principal.user.userid |
Interpreter | target.process.parent_pid |
Interpreter Version | about.labels |
IP Address | principal.ip |
Kernel Version | principal.platform_patch_level |
MD5 | target.process.file.md5 |
OS | principal.platform_version |
Path | target.process.file.full_path |
Policy Name | security_result.rule_name |
Process ID | target.process.parent_pid |
Process Name | target.process.file.full_path |
Product | metadata.vendor_name |
Resolved Address | event.idm.read_only_target.ip |
ServerAddress | intermediary.hostname |
ServerAddress | target.hostname |
Severity | security_result.severity |
SHA256 | target.process.file.sha256 |
Source IP | principal.ip |
Target Process ImageFileSha256 | target.process.file.sha256 |
Target Process Name | target.process.file.full_path |
Target Process Owner | target.user.userid |
Target Registry KeyPath | target.registry.registry_key |
Target Registry ValueName | target.registry.registry_value_name |
Threat Classification | security_result.summary |
User | principal.user.userid |
User Name | principal.user.userid |
Violation Type | security_result.summary |
Zone Name | intermediary.administrative_domain |
Zone Names | intermediary.administrative_domain |
Product Event Types¶
Event | UDM Event Classification | Security Category | alerting enabled |
---|---|---|---|
AuditLog | GENERIC_EVENT | ||
Device | STATUS_HEARTBEAT | ||
DeviceControl | STATUS_UNCATEGORIZED | ||
ExploitAttempt | PROCESS_LAUNCH | POLICY_VIOLATION | |
LoginSuccess | USER_UNCATEGORIZED | ||
OpticsCaeDnsEvent | GENERIC_EVENT | ||
OpticsCaeNetworkEvent | GENERIC_EVENT | ||
OpticsCaeProcessEvent | GENERIC_EVENT | ||
OpticsCaeRegistryEvent | GENERIC_EVENT | ||
ScriptControl | PROCESS_LAUNCH | POLICY_VIOLATION | |
Threat | PROCESS_LAUNCH | POLICY_VIOLATION | |
threat_found | PROCESS_LAUNCH | POLICY_VIOLATION | TRUE |
threat_quarantined | PROCESS_LAUNCH | POLICY_VIOLATION | TRUE |
Log Sample¶
399 <41>1 2021-07-30T13:01:22.432000Z sysloghost CylancePROTECT - - - Event Type: Device, Event Name: SystemSecurity, Device Name: hostname1, Agent Version: 2.1.1574.39, IP Address: (10.10.10.10), MAC Address: (ffffffffffff), Logged On Users: (devices\user1), OS: Microsoft Windows 10 Enterprise 2016 LTSB x64 10.0.14393, Kernel Version: 10.0.14393, Zone Names: (SERVERS)
Sample Parsing¶
metadata.event_timestamp = "2021-07-30T13:01:22.432Z"
metadata.event_type = "STATUS_HEARTBEAT"
metadata.vendor_name = "Cylance"
metadata.product_name = "PROTECT"
metadata.product_event_type = "Device"
metadata.description = "SystemSecurity"
metadata.ingested_timestamp = "2021-07-30T13:03:21.038042Z"
principal.hostname = "hostname1"
principal.platform_version = "Microsoft Windows 10 Enterprise 2016 LTSB x64 10.0.14393"
principal.platform_patch_level = "10.0.14393"
principal.asset.attribute.labels.key = "Agent Version"
principal.asset.attribute.labels.value = "2.1.1574.39"
intermediary.administrative_domain = "(SERVERS)"
Parser Alerting¶
Alerting criteria is listed in the Product Event Types table above.
Rules¶
Coming Soon