Skip to content

Symantec Endpoint Protection

Symantec Endpoint Protection

About

Symantec protects all your traditional and mobile endpoint devices with innovative technologies for attack surface reduction, attack prevention, breach prevention, and detection and response. All this protection is powered by our Global Intelligence Network, one of the largest in the world. Symantec’s single-agent solution delivers flexible management/deployment options, including fully cloud-based, on-premises, and hybrid.

Product Details

Vendor URL: Symantec Endpoint Protection

Product Type: EDR

Product Tier: Tier I

Integration Method: Syslog

Integration URL: Symantec Endpoint Protection - Cyderes Documentation

Log Guide: Sample Logs by Log Type

Parser Details

Log Format: Syslog

Expected Normalization Rate: 90-100%

Data Label: SEP

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
Actual Action security_result.action
Application target.application
Application hash target.file.sha256
Application name target.application
Category set security_result.category_details
CIDS Signature string security_result.summary
Command target.process.command_line_history
Computer name principal.hostname
Confidence security_result.confidence_details
Device ID target.resource.parent
deviceclass target.resource.type
deviceguid target.resource.id
devicename target.resource.name
direction network.direction
Domain Name principal.administrative_domain
Download site src.url
Downloaded by principal.application
Event Description metadata.description
Event Description security_result.summary
File path target.file.full_path
File size (bytes) target.file.size
fileName target.file.full_path
First Seen security_result.priority_details
Group Name target.group.group_display_name
ID target.resource.id
Intrusion URL network.http.referral_url
IP Address principal.ip
Local Host IP principal.ip
Local Host MAC principal.mac
Local Port principal.port
Location target.location.country_or_region
MD-5 target.file.md5
Occurrences security_result.detection_fields
Prevalence security_result.severity_details
proto network.ip_protocol
Remote Host IP target.ip
Remote Host MAC target.mac
Remote Host Name target.hostname
Remote Port target.port
Risk name security_result.threat_nam
Rule metadata.description
Rule ID security_result.summary
Scan Complete target.resource.name
Scan Type target.resource.type
Server Name observer.hostname
SHA-256 target.file.sha256
SID target.process.pid
Site observer.administrative_domain
size target.file.size
SymantecServer principal.hostname
User Name principal.user.userid
User1 principal.user.userid

Product Event Types

Event UDM Event Classification Security Category alerting enabled
client will block traffic NETWORK_CONNECTION
downloaded GUP list STATUS_UPDATE
High Risk Domains NETWORK_CONNECTION
Host Integrity STATUS_UPDATE
IPS SCAN_FILE,NETWORK_CONNECTION
LiveUpdate Manager STATUS_UPDATE
Memory Exploit Mitigation STATUS_UPDATE,SCAN_HOST
Smc STATUS_HEARTBEAT
SONAR STATUS_UPDATE,SCAN_FILE
SubmissionsMan SCAN_FILE
to Internet NETWORK_CONNECTION
traffic and log NETWORK_CONNECTION
USB FILE_UNCATEGORIZED
virus_found,system_infected SCAN_HOST SOFTWARE_MALICIOUS TRUE
Web,attack NETWORK_CONNECTION SOFTWARE_MALICIOUS TRUE

Log Sample

<54>Jun 21 08:27:42 sysloghost SymantecServer: server,Category: 2,SONAR,"Event Description: [SONAR detection Submission] File submitted to Symantec. File : 'c:\program files (x86)\microsoft office\root\office16\excel.exe',  Size (bytes): 5427.",Event time: 2021-06-21 08:22:26,Group Name: My Company\Test Groups (For testing new Policies)\Testing Desktop Support

Sample Parsing

metadata.event_timestamp = "2021-061T13:41:34.012956Z"
metadata.event_type = "SCAN_FILE"
metadata.vendor_name = "Symantec"
metadata.product_name = "Endpoint Protection"
metadata.description = "SONAR detection Submission"
metadata.ingested_timestamp = "2021-06-21T13:41:34.012956Z"
principal.hostname = "hostname"
principal.asset_id = "assetid"
target.file.size = "5427"
target.file.full_path = "c:\program files (x86)\microsoft office\root\office16\excel.exe"
observer.hostname = "sysloghost"

Parser Alerting

Alerting criteria is listed in the Product Event Types table above.

Rules

Coming Soon