SIEM Integration
MetaDefender IT Access features an SIEM (Security Information Event Management) integration that can be found under Settings > Integrations > SIEM Integration.
When enabled, MetaDefender IT Access utilizes the established S3 buckets through AWS (set up by the administrator) for log storage to collect analytical data about the associated account and to alert the administrators about any triggered events selected in the integration. By using the integration, administrators can track and monitor any patterns of activity that can become a potential threat to their infrastructure.
Setting up the integration
To set up the SIEM integration, administrators should proceed with the following steps:
- Sign into MetaDefender IT Access. Navigate to Settings > Integrations > SIEM Integration.
- Select Enable Log Storage.
- Fill in the required fields based on the associated AWS account (For more information on setting this up, please review here).
- Select the desired format for the logs (JSON or SYSLOG).
- Select the events that will trigger an email notification. To save this configuration, it is required to select at least one event.
- When completed, select Save.
Note: The sync of data between MetaDefender IT Access__' databases and the S3 bucket is scheduled for every 5 minutes.
Receiving Logs
Once the initial setup is completed in MetaDefender IT Access, administrators will be able to access their logs from their S3 bucket after a triggered event. From the S3 bucket, administrators can download logs for reviewal, auditing, or historical purposes. As mentioned above, the logs from triggered events come in two formats: JSON and SYSLOG. Administrators can select based on their preference as the contents remain the same.
JSON
{
"log_type": "exempt_all",
"device_name": "Cuong Ba",
"device_id": "cuongbavuacakhia1657786592",
"last_seen": "2022-07-15T08:55:12.279Z",
"device_group": "Default",
"details": "Device Cuong Ba was exempted by Phuong Phuong Phuong Phuong Phuong(phuongphweekly@gmail.com)24 hour(s)",
"type": "Device",
"device_username": "Wilfred Hoeger",
"timestamp": "2022-07-15T08:55:12.279Z"
}
{
"log_type": "unexempt",
"device_name": "Cuong Ba",
"device_id": "cuongbavuacakhia1657868171",
"last_seen": "2022-07-15T08:55:25.377Z",
"device_group": "Default",
"details": "Device Cuong Ba was unexempted by Phuong Phuong Phuong Phuong Phuong(phuongphweekly@gmail.com)",
"type": "Device",
"device_username": "Nicholas Roob",
"timestamp": "2022-07-15T08:55:25.377Z"
}
SYSLOG
"log_type":"config","details":"Administrator Phuong Phuong Phuong Phuong Phuong (phuongphweekly@gmail.com) changed Settings - Integrations - SIEM Integration ","admin_name":"Phuong Weekly 1","type":"Account","event":"Configuration Change","admin_email":"phuongphweekly@gmail.com","timestamp":"2022-07-15T11:19:41.629Z"
"log_type":"added","device_name":"Cuong Ba","device_id":"cuongbavuacakhia1657883993","last_seen":"2022-07-15T11:19:54.239Z","device_group":"Default","details":"OPSWAT Client (Version 7.6.586.1) Cuong Ba Installed$0","type":"Device","device_username":"Christy Stokes","timestamp":"2022-07-15T11:19:54.239Z"
Understanding Logs
Within these logs, there are key values that administrators can use when reviewing the data to further track down an affected device or account change.
Device
Key | Data Type | Description |
---|---|---|
timestamp | string | timestamp when the event occurs |
log_type | string | Log type :
|
details | string | Event details |
device_id | string | ID of a device that the event occurred on |
device_name | string | Name of device that the event occurred on |
device_username | string | Name of user who logged into a device when the event occurred |
device_group | string | A device's group name |
Account
Key | Data Type | Description |
---|---|---|
timestamp | string | timestamp when the event occurs |
event | string | Description of log type |
details | string | Event details |
admin_name | string | Name of an admin who is related to the event |
admin_email | string | Email of an admin who is related to the event |
log_type | string | Log type :
|