Kaspersky Unified Monitoring and Analysis Platform

Normalizers

Normalizer resources are used to convert raw events of various formats so that they conform to the KUMA event data model. This turns them into normalized events that can be processed by other KUMA resources and services.

A normalizer resource consists of the main normalizer and optional extra normalizers. Data is transmitted through a tree-like structure of normalizers depending on the defined conditions, which lets you configure complex logic for processing events.

A normalizer resource is created in several steps:

  1. Creating the main normalizer

    The main normalizer is created by using the Add event parsing button. Entry of normalizer settings is finished by clicking OK.

    The main normalizer that you created will be displayed as a dark circle. Clicking on the circle will open the normalizer options for editing. When you hover over the circle, a plus sign is displayed. Click it to add more normalizers.

  2. Creating conditions for using an extra normalizer

    Clicking on the normalizer plus sign opens the Add normalizer to normalization scheme window in which you can specify the conditions that will cause data to be forwarded to the new normalizer.

  3. Creating an extra normalizer

    When the previous step is finished, a window will open for creating an extra normalizer. Entry of normalizer settings is finished by clicking OK.

    The extra normalizer you created is displayed as a dark block that indicates the conditions under which this normalizer will be used (see step 2). The conditions can be changed by moving your mouse cursor over the extra normalizer and clicking the button showing the pencil image.

    If you hover the mouse pointer over the extra normalizer, a plus button appears, which you can use to create a new extra normalizer. To delete a normalizer, use the button with the trash icon.

    If you need to create more normalizers, repeat steps 2 and 3.

  4. Completing creation of a normalizer resource

    Normalizer resource creation is finished by clicking the Save button.

For these resources, you can enable the display of control characters in all input fields except the Description field.

If, when changing the settings of a collector resource set, you change or delete conversions in a normalizer connected to it, the edits will not be saved, and the normalizer resource itself may be corrupted. If you need to modify conversions in a normalizer that is already part of a service, the changes must be made directly to the resource under ResourcesNormalizers in the web interface.

See also:

Requirements for variables

Page top
[Topic 217942]

Normalizer settings

The normalizer window contains two tabs: Normalization scheme and Enrichment.

Normalization scheme

This tab is used to specify the main settings of the normalizer and to define the rules for converting events into KUMA format.

Available settings:

  • Name (required)—the name of the normalizer. Must contain from 1 to 128 Unicode characters. The name of the main normalizer will be used as the name of the normalizer resource.
  • Tenant (required)—name of the tenant that owns the resource.

    This setting is not available for extra normalizers.

  • Parsing method (required)—drop-down list for selecting the type of incoming events. Depending on your choice, you can use the preconfigured rules for matching event fields or set your own rules. When you select some parsing methods, additional parameter fields required for filling in may become available.

    Available parsing methods:

    • json

      This parsing method is used to process JSON data.

      When processing files with hierarchically arranged data, you can access the fields of nested objects by specifying the names of the parameters dividing them by a period. For example, the username parameter from the string "user": {"username": "system: node: example-01"} can be accessed by using the user.username query.

    • cef

      This parsing method is used to process CEF data.

      When choosing this method, you can use the preconfigured rules for converting events to the KUMA format by clicking the Apply default mapping button.

    • regexp

      This parsing method is used to create custom rules for processing JSON data.

      In the Normalization parameter block field, add a regular expression (RE2 syntax) with named capture groups. The name of a group and its value will be interpreted as the field and the value of the raw event, which can be converted into an event field in KUMA format.

      To add event handling rules:

      1. Copy an example of the data you want to process to the Event examples field. This is an optional but recommended step.
      2. In the Normalization parameter block field add a regular expression with named capture groups in RE2 syntax, for example "(?P<name>regexp)".

        You can add multiple regular expressions by using the Add regular expression button. If you need to remove the regular expression, use the cross button.

      3. Click the Copy field names to the mapping table button.

        Capture group names are displayed in the KUMA field column of the Mapping table. Now you can select the corresponding KUMA field in the column next to each capture group. Otherwise, if you named the capture groups in accordance with the CEF format, you can use the automatic CEF mapping by selecting the Use CEF syntax for normalization check box.

      Event handling rules were added.

    • syslog

      This parsing method is used to process data in syslog format.

      When choosing this method, you can use the preconfigured rules for converting events to the KUMA format by clicking the Apply default mapping button.

    • csv

      This parsing method is used to create custom rules for processing CSV data.

      When choosing this method, you must specify the separator of values in the string in the Delimiter field. Any single-byte ASCII character can be used as a delimiter.

    • kv

      This parsing method is used to process data in key-value pair format.

      If you select this method, you must provide values in the following required fields:

      • Pair delimiter—specify a character that will serve as a delimiter for key-value pairs. You can specify any one-character (1 byte) value, provided that the character does not match the value delimiter.
      • Value delimiter—specify a character that will serve as a delimiter between the key and the value. You can specify any one-character (1 byte) value, provided that the character does not match the delimiter of key-value pairs.
    • xml

      This parsing method is used to process XML data.

      When this method is selected in the parameter block XML Attributes you can specify the key attributes to be extracted from tags. If an XML structure has several attributes with different values in the same tag, you can indicate the necessary value by specifying its key in the Source column of the Mapping table.

      To add key XML attributes,

      Click the Add field button, and in the window that appears, specify the path to the required attribute.

      You can add more than one attribute. Attributes can be removed one at a time using the cross icon or all at once using the Reset button.

      If XML key attributes are not specified, then in the course of field mapping the unique path to the XML value will be represented by a sequence of tags.

    • netflow5

      This parsing method is used to process data in the NetFlow v5 format.

      When choosing this method, you can use the preconfigured rules for converting events to the KUMA format by clicking the Apply default mapping button.

      In mapping rules, the protocol type for netflow5 is not indicated in the fields of KUMA events by default. When parsing data in NetFlow format on the Enrichment normalizer tab, you should create a constant data enrichment rule that adds the netflow value to the DeviceProduct target field.

    • netflow9

      This parsing method is used to process data in the NetFlow v9 format.

      When choosing this method, you can use the preconfigured rules for converting events to the KUMA format by clicking the Apply default mapping button.

      In mapping rules, the protocol type for netflow9 is not indicated in the fields of KUMA events by default. When parsing data in NetFlow format on the Enrichment normalizer tab, you should create a constant data enrichment rule that adds the netflow value to the DeviceProduct target field.

    • sflow5

      This parsing method is used to process data in sFlow5 format.

      When choosing this method, you can use the preconfigured rules for converting events to the KUMA format by clicking the Apply default mapping button.

    • ipfix

      This parsing method is used to process IPFIX data.

      When choosing this method, you can use the preconfigured rules for converting events to the KUMA format by clicking the Apply default mapping button.

      In mapping rules, the protocol type for ipfix is not indicated in the fields of KUMA events by default. When parsing data in NetFlow format on the Enrichment normalizer tab, you should create a constant data enrichment rule that adds the netflow value to the DeviceProduct target field.

    • sql

      This parsing method is used to process SQL data.

  • Keep raw log (required)—in this drop-down list, you can indicate whether you need to store the original raw event in the newly created normalized event. Available values:
    • Never—do not save the raw event This is the default setting.
    • Only errors—save the raw event in the Raw field of the normalized event if errors occurred when parsing it. This value is convenient to use when debugging a service. In this case, every time an event has a non-empty Raw field, you know there was a problem.

      If fields containing the names *Address or *Date* do not comply with normalization rules, these fields are ignored. No normalization error will occur, and the values of the fields will not show up in the Raw field of the normalized event even if Keep raw logOnly errors was indicated.

    • Always—always save the raw event in the Raw field of the normalized event.

    This setting is not available for extra normalizers.

  • Save extra fields (required)—in this drop-down list, you can choose whether you want to save fields and their values if no mapping rules have been configured for them (see below). This data is saved as an array in the Extra event field. Normalized events can be searched and filtered based on the data stored in the Extra field.

    Filtering based on data from the Extra event field

    Conditions for filters based on data from the Extra event field:

    • Condition—If.
    • Left operand—event field.
    • In this event field, you can specify one of the following values:
      • Extra field.
      • Value from the Extra field in the following format:

        Extra.<field name>

        For example, Extra.app.

        A value of this type is specified manually.

      • Value from the array written to the Extra field in the following format:

        Extra.<field name>.<array element>

        For example, Extra.array.0.

        The values in the array are numbered starting from 0.

        A value of this type is specified manually.

    • Operator – =.
    • Right operand—constant.
    • Value—the value by which you need to filter events.

    By default, no extra fields are saved.

  • Description—up to 256 Unicode characters describing the resource.

    This setting is not available for extra normalizers.

  • Event examples—in this field, you can provide an example of data that you want to process. Event examples can also be loaded from a TSV, CSV, or TXT file by using the Load from file button.

    This setting is not available for the sFlow5 parsing method.

  • Mapping settings block—here you can configure mapping of original event fields to fields of the event in KUMA format:
    • Source—column for the names of the raw event fields that you want to convert into KUMA event fields.

      Clicking the wrench-new button next to the field names in the Source column opens the Conversion window, in which you can use the Add conversion button to create rules for modifying the original data before they are written to the KUMA event fields.

      Available conversions

      Conversions are changes that can be applied to a value before it gets written to the event field. The conversion type is selected from a drop-down list.

      Available conversions:

      • lower—is used to make all characters of the value lowercase
      • upper—is used to make all characters of the value uppercase
      • regexp – used to convert a value using the regular expression RE2. When this conversion type is selected, the field appears where regular expression should be added.
      • substring—is used to extract characters in the position range specified in the Start and End fields. These fields appear when this conversion type is selected.
      • replace—is used to replace specified character sequence with the other character sequence. When this type of conversion is selected, new fields appear:
        • Replace chars—in this field you can specify the character sequence that should be replaced.
        • With chars—in this field you can specify the characters sequence should be used instead of replaced characters.
      • trim—used to simultaneously remove the characters specified in the Chars field from the leading and end positions of the value. The field appears when this type of conversion is selected. For example, a trim conversion with the Micromon value applied to Microsoft-Windows-Sysmon results in soft-Windows-Sys.
      • append is used to add the characters specified in the Constant field to the end of the event field value. The field appears when this type of conversion is selected.
      • prepend—used to prepend the characters specified in the Constant field to the start of the event field value. The field appears when this type of conversion is selected.
      • replace with regexp—is used to replace RE2 regular expression results with the character sequence.
        • Expression—in this field you can specify the regular expression which results that should be replaced.
        • With chars—in this field you can specify the characters sequence should be used instead of replaced characters.
    • KUMA field—drop-down list for selecting the required fields of KUMA events. You can search for fields by entering their names in the field.
    • Label—in this column, you can add a unique custom label to event fields that begin with DeviceCustom*.

    New table rows can be added by using the Add row button. Rows can be deleted individually using the cross button or all at once using the Clear all button.

    If you have loaded data into the Event examples field, the table will have an Examples column containing examples of values carried over from the raw event field to the KUMA event field.

Enrichment

This tab is used to add additional data to fields of a normalized event by using enrichment rules similar to the rules in enrichment rule resources. These enrichment rules are stored in the normalizer resource where they were created. There can be more than one enrichment rule. Enrichments are created by using the Add enrichment button.

Settings available in the enrichment rule settings block:

  • Source kind (required)—drop-down list for selecting the type of enrichment. Depending on the selected type, you may see advanced settings that will also need to be completed.

    Available Enrichment rule source types:

    • constant

      This type of enrichment is used when a constant needs to be added to an event field. Settings of this type of enrichment:

      • In the Constant field, specify the value that should be added to the event field. The value should not be longer than 255 Unicode characters. If you leave this field blank, the existing event field value will be cleared.
      • In the Target field drop-down list, select the KUMA event field to which you want to write the data.

    • dictionary

      This type of enrichment is used if you need to add a value from the dictionary to the event field.

      When this type is selected in the Dictionary name drop-down list, you must select the dictionary that will provide the values. In the Key fields settings block, you must use the Add field button to select the event fields whose values will be used for dictionary entry selection.

    • event

      This type of enrichment is used when you need to write a value from another event field to the current event field. Settings of this type of enrichment:

      • In the Target field drop-down list, select the KUMA event field to which you want to write the data.
      • In the Source field drop-down list, select the event field whose value will be written to the target field.
      • Clicking the wrench-new button opens the Conversion window in which you can, using the Add conversion button, create rules for modifying the original data before writing them to the KUMA event fields.

        Available conversions

        Conversions are changes that can be applied to a value before it gets written to the event field. The conversion type is selected from a drop-down list.

        Available conversions:

        • lower—is used to make all characters of the value lowercase
        • upper—is used to make all characters of the value uppercase
        • regexp – used to convert a value using the regular expression RE2. When this conversion type is selected, the field appears where regular expression should be added.
        • substring—is used to extract characters in the position range specified in the Start and End fields. These fields appear when this conversion type is selected.
        • replace—is used to replace specified character sequence with the other character sequence. When this type of conversion is selected, new fields appear:
          • Replace chars—in this field you can specify the character sequence that should be replaced.
          • With chars—in this field you can specify the characters sequence should be used instead of replaced characters.
        • trim—used to simultaneously remove the characters specified in the Chars field from the leading and end positions of the value. The field appears when this type of conversion is selected. For example, a trim conversion with the Micromon value applied to Microsoft-Windows-Sysmon results in soft-Windows-Sys.
        • append is used to add the characters specified in the Constant field to the end of the event field value. The field appears when this type of conversion is selected.
        • prepend—used to prepend the characters specified in the Constant field to the start of the event field value. The field appears when this type of conversion is selected.
        • replace with regexp—is used to replace RE2 regular expression results with the character sequence.
          • Expression—in this field you can specify the regular expression which results that should be replaced.
          • With chars—in this field you can specify the characters sequence should be used instead of replaced characters.
    • template

      This type of enrichment is used when you need to write a value obtained by processing Go templates into the event field. Settings of this type of enrichment:

      • Put the Go template into the Template field.

        Event field names are passed in the {{.EventField}} format, where EventField is the name of the event field from which the value must be passed to the script.

        Example: Attack on {{.DestinationAddress}} from {{.SourceAddress}}.

      • In the Target field drop-down list, select the KUMA event field to which you want to write the data.
  • Target field (required)—drop-down list for selecting the KUMA event field that should receive the data.
Page top
[Topic 221932]

Condition for forwarding data to an extra normalizer

The Add normalizer to normalization scheme window is used to specify the conditions under which the data will be sent to an extra normalizer.

Available settings:

  • Fields to pass into normalizer—used to indicate event fields in case you want to send only events with specific fields to the extra normalizer.

    If you leave this field blank, the full event will be sent to the extra normalizer for processing.

  • Use normalizer for events with specific event field values—used to indicate event fields if you want the extra normalizer to receive only events in which specific values are assigned to certain fields. The value is specified in the Condition value field.

    The data processed by these conditions can be preconverted by clicking the wrench-new button. This opens the Conversion window, in which you can use the Add conversion button to create rules for modifying the original data before it is written to the KUMA event fields.

    Available conversions

    Conversions are changes that can be applied to a value before it gets written to the event field. The conversion type is selected from a drop-down list.

    Available conversions:

    • lower—is used to make all characters of the value lowercase
    • upper—is used to make all characters of the value uppercase
    • regexp – used to convert a value using the regular expression RE2. When this conversion type is selected, the field appears where regular expression should be added.
    • substring—is used to extract characters in the position range specified in the Start and End fields. These fields appear when this conversion type is selected.
    • replace—is used to replace specified character sequence with the other character sequence. When this type of conversion is selected, new fields appear:
      • Replace chars—in this field you can specify the character sequence that should be replaced.
      • With chars—in this field you can specify the characters sequence should be used instead of replaced characters.
    • trim—used to simultaneously remove the characters specified in the Chars field from the leading and end positions of the value. The field appears when this type of conversion is selected. For example, a trim conversion with the Micromon value applied to Microsoft-Windows-Sysmon results in soft-Windows-Sys.
    • append is used to add the characters specified in the Constant field to the end of the event field value. The field appears when this type of conversion is selected.
    • prepend—used to prepend the characters specified in the Constant field to the start of the event field value. The field appears when this type of conversion is selected.
    • replace with regexp—is used to replace RE2 regular expression results with the character sequence.
      • Expression—in this field you can specify the regular expression which results that should be replaced.
      • With chars—in this field you can specify the characters sequence should be used instead of replaced characters.
Page top
[Topic 221934]

Preset normalizers

To use the updated set of event normalizers for KUMA 2.0:

You can download an archive with the updated set of event normalizers for KUMA 2.0.

Download the archive with the updated set of event normalizers for KUMA 2.0

The archive contains the following files:

  • "Normalizers for KUMA 2.0" file that contains normalizers.
  • "Normalizer list for KUMA 2.0.xlsx" file that contains the list of normalizers with their types specified.

To make the updated set of normalizers available for use in KUMA, the normalizers must be imported into KUMA after downloading the archive. The import of normalizers involves replacing the original resources provided with KUMA 2.0 with the revised versions, therefore we recommend exporting your resources before proceeding with the import of revised versions.

The password for importing data is mustB3Ch@ng3d!

The normalizers listed in the table below are included in the KUMA kit.

Preset normalizers

Normalizer name

Event source

Normalizer type

Description

[OOTB] 1C EventJournal Normalizer

1C registration log.

xml

Designed for processing the event log of the 1C system.

[OOTB] 1C TechJournal Normalizer

1C technology log.

regexp

Designed for processing the technology event log.

[OOTB] Ahnlab UTM

System logs, operation logs, connections, IPS

regexp

Designed for processing events from the Ahnlab system.

[OOTB] Apache Access file(Common or Combined Log Format)

Apache access.log in Common or Combined Log format).

regexp

Designed for processing events in the Access log of the Apache web server. The normalizer supports the processing of events in Common or Combined Log formats.

[OOTB] Apache Access Syslog (Common or Combined Log Format)

Apache access.log in Common or Combined Log format), with Syslog header.

syslog

Designed for processing Apache web server events in Common or Combined formats received via the Syslog protocol.

[OOTB] Bastion SKDPU-GW

IT Bastion SKDPU system.

syslog

Designed for processing events of the SKDPU NT Access gateway system received via Syslog.

[OOTB] Bifit Mitigator Syslog

AntiDDoS events of the Bifit Mitigator solution

syslog

Designed for processing events from the DDOS Mitigator protection system received via Syslog.

[OOTB] BIND Syslog

BIND server DNS logs, with Syslog header.

syslog

Designed for processing events of the BIND DNS server received via Syslog.

[OOTB] BlueCoat Proxy v0.2

BlueCoat proxy server event log

regexp

Designed to process BlueCoat proxy server events.

[OOTB] Checkpoint Syslog CEF by CheckPoint

Checkpoint, normalization based on the vendor's CEF event representation diagram.

syslog

Designed for processing events received from the Checkpoint event source via the Syslog protocol in the CEF format.

[OOTB] Cisco ASA Extended v 0.1

Cisco ASA base extended set of events.

syslog

Designed for processing events of Cisco ASA devices.

[OOTB] Cisco Basic

Cisco ASA base set of events.

syslog

Designed for processing events of network devices with IOS firmware.

This normalizer will be removed from the OOTB set after the next release. If you are using this normalizer, you must migrate to the [OOTB] Cisco ASA Extended IOS Basic Syslog normalizer.

[OOTB] Cisco WSA AccessFile

Cisco WSA proxy server, access.log file.

regexp

Designed for processing the event log of the Cisco WSA proxy server, the access.log file.

[OOTB] Citrix NetScaler

Citrix NetScaler events

regexp

Designed for processing events from the Citrix NetScaler load balancer.

[OOTB] CyberTrace

Kaspersky CyberTrace events.

regexp

Designed for processing Kaspersky CyberTrace events.

[OOTB] DNS Windows

Windows server DNS logs.

regexp

Designed for processing Microsoft DNS server events.

[OOTB] Dovecot Syslog

dovecot server POP3/IMAP logs.

syslog

Designed for processing events of the Dovecot mail server received via Syslog.

[OOTB] Eltex MES Switches

Eltex MES switch events

regexp

Designed for processing events from Eltex network devices.

[OOTB] Exchange CSV

Exchange server MTA logs.

csv

Designed for processing the event log of the Microsoft Exchange system.

[OOTB] FortiGate KV

FortiGate logs in Key-Value format.

regexp

Designed for processing events from FortiGate firewalls.

[OOTB] Fortimail

Fortimail mail system logs.

regexp

Designed for processing events of the FortiMail email protection system.

[OOTB] FreeIPA

Free IPA Directory Service logs.

json

Designed for processing events from the FreeIPA system.

[OOTB] Huawei Eudemon

Logs of Huawei Eudemon firewalls.

regexp

Designed for processing events from Huawei Eudemon firewalls.

[OOTB] Huawei USG Basic

Logs of the main USG modules.

syslog

Designed for processing events received from Huawei USG security gateways via Syslog.

[OOTB] Ideco UTM syslog

Ideco UTM events

syslog

Designed for processing events received via Syslog from Ideco UTM 14.7 and later versions. The normalizer supports events from the following modules: Intrusion prevention, Firewall, Application control, Content filter. The normalizer also supports the following event types: connection via VPN, authentication through the web interface.

[OOTB] IIS Log File Format

Microsoft IIS logs.

regexp

The normalizer processes events using a regular expression in the format described at https://learn.microsoft.com/en-us/windows/win32/http/iis-logging.

[OOTB] InfoWatch Traffic Monitor SQL

DLP system Traffic Monitor by InfoWatch.

sql

Designed for processing events received by the connector from the database of the InfoWatch Traffic Monitor system.

[OOTB] IPFIX

IPFIX-format Netflow events.

ipfix

Designed for processing events in the IP Flow Information Export (IPFIX) format.

[OOTB] Juniper - JUNOS

Juniper network equipment logs.

regexp

Designed for processing audit events received from Juniper network devices.

[OOTB] KATA

Kaspersky Anti Targeted Attack.

cef

Designed for processing alerts or events from the Kaspersky Anti Targeted Attack activity log.

[OOTB] KEDR telemetry

EDR telemetry tagged by KATA

json

Designed for processing Kaspersky EDR telemetry tagged by KATA (kafka, EnrichedEventTopic).

[OOTB] Kerio Control

Kerio Control events

syslog

Designed for processing events of Kerio Control firewalls.

[OOTB] KICS4Net v2.x

Kaspersky Industrial Cyber Security v 2.x.

cef

Designed for processing events of Kaspersky Industrial CyberSecurity for Networks version 2.

[OOTB] KICS4Net v3.x

Kaspersky Industrial Cyber Security v 3.x.

syslog

Designed for processing events of Kaspersky Industrial CyberSecurity for Networks version 3.

[OOTB] KLMS syslog CEF

Kaspersky Linux Mail Server mail traffic analysis and filtering systems.

syslog

Designed for processing events of Kaspersky Linux Mail Server mail traffic analysis and filtering systems.

[OOTB] Kolchuga-K syslog

Events of IVK Kolchuga-K version LKNV.466217.002

syslog

Designed for processing events of the IVK Kolchuga-K system, version LKNV.466217.002.

[OOTB] KSC

Kaspersky Security Center.

cef

Designed for processing Kaspersky Security Center events received via Syslog.

[OOTB] KSC from SQL

Kaspersky Security Center, queries to the MS SQL database.

sql

Designed for processing events received by the connector from the database of the Kaspersky Security Center system.

[OOTB] KSMG

Kaspersky Security Mail Gateway.

syslog

Designed for processing events of Kaspersky Security Mail Gateway.

[OOTB] KUMA forwarding

KUMA

json

Designed for processing events forwarded from KUMA.

[OOTB] KWTS (KV)

KWTS logs if sent in Key-Value format.

syslog

Designed for processing events in Kaspersky Web Traffic Security for Key-Value format.

[OOTB] KWTS syslog CEF

KWTS events.

syslog

Designed for processing events of the Kaspersky Web Traffic Security (KWTS) 6.1 web traffic analysis and filtering system received via Syslog in CEF format.

[OOTB] Linux audit and iptables Syslog

Linux events.

syslog

Designed for processing events of the operating system.

This normalizer will be removed from the OOTB set after the next release. If you are using this normalizer, you must migrate to the [OOTB] Linux audit and iptables Syslog v1 normalizer.

[OOTB] Linux audit and iptables Syslog v1

Linux events.

syslog

Designed for processing events of the operating system.

This normalizer will be removed from the OOTB set after the next release. If you are using this normalizer, you must migrate to the [OOTB] Linux audit and iptables Syslog v1 normalizer.

[OOTB] Linux audit.log file

Linux events.

regexp

Designed for processing security logs of Linux operating systems received via Syslog.

[OOTB] MariaDB Audit plugin syslog

MariaDB Audit Plugin events.

syslog

Designed for processing events of the MariaDB Audit Plugin for MariaDB, MySQL 5.7, received via Syslog.

[OOTB] MS DHCP file

Windows server DHCP logs.

regexp

Designed for processing Microsoft DHCP server events.

[OOTB] Minerva EDR

Minerva EDR events

regexp

Designed for processing events from the Minerva EDR system.

[OOTB] NetFlow v5

Netflow v5 events.

netflow5

Designed for processing events from Netflow version 5.

[OOTB] NetFlow v9

Netflow v9 events.

netflow9

Designed for processing events from Netflow version 9.

[OOTB] Nginx regexp

Nginx log.

regexp

Designed for processing Nginx web server log events.

[OOTB] Oracle Audit Trail

Oracle database table

sql

Designed for processing database audit events received by the connector directly from an Oracle database.

[OOTB] OrionSoft zVirt Syslog

Events of the OrionSoft zVirt virtualization system

regexp

Designed for processing events of the OrionSoft zVirt virtualization system.

[OOTB] PA-NGFW (Syslog-CSV)

Palo Alto logs in CSV format.

syslog

Designed for processing events from Palo Alto Networks firewalls received via Syslog.

[OOTB] PTC Winchill Fracas

Winchill Fracas events

regexp

Designed for processing events of the Windchill FRACAS failure registration system.

[OOTB] PTsecurity ISIM

Positive Technologies ISIM events

regexp

Designed for processing events from the PT Industrial Security Incident Manager system.

[OOTB] pfSense Syslog

pfSence events.

syslog

Designed for processing events from Palo Alto Networks firewalls received via Syslog.

[OOTB] pfSense w/o hostname

Custom pfSence event normalizer (invalid Syslog header format).

syslog

Designed for processing events from the pfSense firewall with an incorrect Syslog header format.

[OOTB] PostgreSQL pgAudit syslog

Events of the pgAudit audit plugin

syslog

Designed for processing events of the pgAudit audit plugin for PostgreSQL received via Syslog.

[OOTB] PTsecurity NAD

Network Anomaly Detection by Positive Technologies.

syslog

Designed for processing events from PT Network Attack Discovery (NAD).

[OOTB] PTsecurity Sandbox

Positive Technologies Sandbox events

regexp

Designed for processing events of the PT Sandbox system.

[OOTB] PTsecurity WAF

Web Application Firewall by Positive Technologies.

syslog

Designed for processing events from the PTsecurity (Web Application Firewall) system.

[OOTB] Radware DefensePro AntiDDoS

Radware DefensePro AntiDDoS events

syslog

Designed for processing events from the DDOS Mitigator protection system received via Syslog.

[OOTB] S-Terra

S-Terra Gate events.

syslog

Designed for processing events from S-Terra VPN Gate devices.

[OOTB] SNMP. Windows {XP/2003}

Windows XP logs

json

Designed for processing events received from workstations and servers running Microsoft Windows XP, Microsoft Windows 2003 operating systems using the SNMP protocol.

[OOTB] SecretNet SQL

Secret Net 7.

sql

Designed for processing events received by the connector from the database of the SecretNet system.

[OOTB] SonicWall TZ Firewall

Events of TZ series firewalls

syslog

Designed for processing events received via Syslog from the SonicWall TZ firewall.

[OOTB] Sophos XG

Sophos XG firewall events

regexp

Designed for processing events from the Sophos XG firewall.

[OOTB] Squid access Syslog

Squid proxy server access.log logs.

syslog

Designed for processing events of the Squid proxy server received via the Syslog protocol.

[OOTB] Squid access.log file

Squid proxy server access.log logs.

regexp

Designed for processing Squid log events from the Squid proxy server.

[OOTB] Syslog header

Events in Syslog format from arbitrary sources. The syslog header is parsed.

syslog

Designed for processing events received via Syslog. The normalizer parses the header of the Syslog event, the message field of the event is not parsed. If necessary, you can parse the message field using other normalizers.

[OOTB] Syslog-CEF

Events in CEF format from arbitrary sources, with Syslog header.

syslog

Designed for parsing events from arbitrary sources in the CEF format with a Syslog header. Supports reading files from the following sources: InfoTeCS IDS, IT-Bastion—SKDPU NT Monitoring and Analytics, UserGate, SearchInform KIB, Forcepoint Email Security 8.5, ViPNet TIAS.

 

[OOTB] Unbound Syslog

Logs of the Unbound DNS server.

syslog

Designed for processing events from the Unbound DNS server.

[OOTB] ViPNet Coordinator Syslog

ViPNet Coordinator logs

syslog

Designed for processing events from the ViPNet Coordinator system.

[OOTB] VMware Horizon - Syslog

VMware Horizon logs. Receipt via Syslog.

syslog

Designed for processing events received from the VMware Horizon system via Syslog.

[OOTB] Windows Basic

Basic set of Windows Security events.

xml

Designed for processing event logs of Microsoft Windows operating systems, basic set of events.

[OOTB] Windows Extended v.0.3

Extended set of Windows events.

xml

Designed for processing event logs of Microsoft Windows operating systems, extended set of events. Supports events from terminal servers. The parsing method is XML file processing. This normalizer will be removed from the OOTB set after the next release. If you are using this normalizer, you must migrate to the [OOTB] Windows Extended v 1.0 normalizer.

[OOTB] Windows Extended v 1.0

Optimized with fewer extra normalizers. More complete data in group management events.

xml

The normalizer is designed for processing events of the Microsoft Windows operating system.

[OOTB][regexp] Continent IPS/IDS & TLS

Continent intrusion detection system, TSL.

regexp

Designed for processing events of Continent IPS/IDS devices in a file.

[OOTB] Broadcom Symantec Endpoint Protection

Symantec Endpoint Protection events

regexp

Designed for processing events from the Symantec Endpoint Protection system.

[OOTB] Confident Dallas Lock

Confident Dallas Lock events

regexp

Designed for processing events from the Dallas Lock information protection system.

[OOTB] WatchGuard Firebox

Firebox firewall events

syslog

Designed for processing WatchGuard Firebox events received via Syslog.

Page top
[Topic 222424]