Create a Remote Log Source - SecureSphere
Topics Discussed
You can use this document to add a remote log collector to a SecureSphere remote device (log source).
Pre-Deployment Considerations
Before you begin, review the following requirements:
Log Relay
For remote log collection, you must have a Log Relay server on your account.
To learn how to add Log Relay to your account, see Obtain Log Relay for Remote Log Collection.
Assumptions
The SecureSphere device is running at version v9.5 to v13 for Syslog in LEEF format
Your device is already configured and running the policies that are needed
You already have a log relay box set up and configured correctly
The security policies for any AWS security groups or firewalls allow traffic on port 10154 to reach the log relay
Update your Imperva SecureSphere Device
Log into your Imperva SecureSphere management console.
Navigate to Policies -> Action Sets
Click the Create New button to define a new action set
In the Action Name field, type a name for your alert action (ex: Log Firewall Alerts to Armor)
Select the appropriate event type from the Apply to Event Type dropdown menu - Options include Security Violations - All, Security Violations - Web Application Level, Security Violations - File Application Level, and System Events.
Click Create.
Configure the forwarding action
Click into your newly created action set
Under Available Action Interfaces, use the upward-pointing green arrow next to Server System Log > Log to System Log (syslog) to add the action interface to the Selected Interfaces section
Expand the Action Interface just added to Selected Actions. In the Syslog Host field, enter the IP address of your Log Relay server and specify port 10154 using standard IP:PORT format (ex. 1.1.1.1:10154)
In the Syslog log level list, select INFO
In the Message field, paste the following, depending on the event type you are forwarding, and placing the appropriate date and time format your SecureSphere is configured for in devTimeFormat where listed :
In the Facility field, type syslog
Select the Run on Every Event check box
Click Save
Associate your policies to the new alert action:
From the navigation menu, click Policies -> Security
Select the policy that you want to use for the alert action
Click the Policy tab.
From the Followed Action list, select your new action (ex: Send Firewall Logs to Armor) and configure the parameters.
Ensure that your policy is configured as enabled and is applied to the appropriate server groups.
Click save.
Verify Connection in AMP
In the Armor Management Portal (AMP), in the left-side navigation, click Security.
Click Log & Data Management, and then select Search.
In the Source column, review the source name to locate the newly created SecureSphere remote log source.
In the search field, you can also enter "securesphere" to locate SecureSphere messages.