Table of Contents | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|
Assumptions
The user has a Log Relay device online
The user is not blocking traffic on port TCP and UDP port
14015
between the Cylance and the Log Relay
Setup
Upon activation of your account, you will receive an email with your login information for the Console.
Click the link in the email and go to the login page.
Login to the Console as an Administrator.
Select Settings > Application.
Record the displayed token. Download the installer by clicking either Windows or Linux or Mac OS X and then selecting the installation format.
Use the token when prompted during installation.
Info |
---|
Note: CylancePROTECT Agent 1400 or higher must be installed on the endpoint before installing CylanceOPTICS for Windows. For more info on CylanceOPTICS click here |
Procedure
CYLANCEPROTECT SYSLOG SETTINGS
Click on Settings, then Application submenu.
When the page loads, scroll down to the INTEGRATIONS section of the page.
The following sections will provide details and descriptions for each sub heading in this section
Info |
---|
EVENT TYPES Syslog events have standard fields like timestamp, severity level, facility and a Cylance-specific payload (message). Examples provided in this section only contain the Cylance-specific message |
Expand | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||
This option is only visible to Tenant's that have the Application Control feature enabled. Application Control events represent actions occurring when the device is in AppControl mode. Checking this option will send a message to the Syslog server whenever an attempt is made to modify or copy an executable file, or when an attempt to made to execute a file from an external device or network location. Example Message for Deny PE File Change
Example Message for Deny Execution from External Drive
|
Expand | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
When this option is checked, the audit log of user actions performed in the CylancePROTECT Web console will be sent to the Syslog server. Audit Log events will always appear in the Audit Log screen even when this option is unchecked. Example Message for Audit Log being forwarded to Syslog
|
Expand | ||
---|---|---|
| ||
When this option is checked, these device events will be logged to the Syslog server:
| ||
theme | Midnight | firstline | 1
CylancePROTECT: Event Type: Device, Event Name: Registration, Device Name: WIN-55NATVQHBUU CylancePROTECT: Event Type: Device, Event Name: SystemSecurity, Device Name: WIN-55NATVQHBUU, Agent Version: 1.1.1270.58, IP Address: (10.3.0.154), MAC Address: (005056881877), Logged On Users: (WIN55NATVQHBUU\Administrator), OS: Microsoft Windows Server 2008 R2 Standard Service Pack 1 x64 6.1.7601
When a device is removed.
Example Message for Device Removed Event
Code Block
CylancePROTECT: Event Type: Device, Event Name: Device Removed, Device Names: (test-xp-test), User: (test@test.com)
When a device's policy, zone, name, or logging level has changed.
Example Message for Device Updated Event
Code Block
CylancePROTECT: Event Type: Device, Event Name: Device Updated, Device Message: Renamed: 'WIN-55NATVQHBUU' to 'WIN-2008R2-IRV1'; Policy Changed: 'Default' to 'IRVPolicy1'; Zones Added: 'IRV1', User: test (test@test.com)
Expand | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
When this option is checked, any Memory EXPLOIT ATTEMPTS that might be considered an attack from any of the Tenant's devices will be logged to the Syslog server.
Example Message of Memory Protection Event
|
Expand | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
When this option is checked, any newly found threats, or changes observed for an existing threat will be logged to the Syslog server. Changes include a threat being removed, quarantined, waived, or executed. There are 5 types of Threat Events:
Example Message of Threat Event
|
Expand | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Each day, Cylance will classify hundreds of threats as either Malware or PUPs (Potentially Unwanted Programs). When that happens, you can subscribe to be notified of those events by checking this option. Example Message for Threat Classification
|
...
Info |
---|
FACILITY Specifies what type of application is logging the message. The default is Internal (aka Syslog). This is used to categorize the messages when they are received by the Syslog server. Click on Test Connection to test the IP/DOMAIN, PORT, AND PROTOCOL settings. If you entered valid values, after a couple of moments, you should see a success confirmation popup: |
Field Reference
...
Rules
...
Rule | Definition |
---|---|
ScriptControl Alert | Detects Script Control alerts from Cylance endpoints |
Threat Quarantined | Alerts if a threat is quarantined by Cylance |
Threat Found | Alerts if Cylance detects a threat |
ScriptControl Blocked | Detects if Script Control blocks an action |
Threat Cleared | Alerts if Cylance clears a threat |
Threat Changed | Alerts if Cylance detects that a threat has changed |
Optics Process Event | Alerts if Cylance optics detects a process event |
Optics File Event | Alerts if Cylance optics detects a file event |
Optics Registry Event | Alerts if Cylance optics detects a registry event |
...