# Copyright (c) 2010 Flowerfire, Inc. All Rights Reserved. symantec_mail_security = { plugin_version = "1.1" info.1.manfacturer = "Symantec" info.1.device = "Mail Security" info.1.version.1 = "5" # 2008-06-05 - 1.1 - GMF - Added support for v5 # The name of the log format log.format.format_label = "Symantec Mail Security Log Format" log.miscellaneous.log_data_type = "generic" log.miscellaneous.log_format_type = "mail_server" # The log is in this format if any of the first ten lines match this regular expression log.format.autodetect_expression = ` # old format matches_regular_expression(volatile.log_data_line, '^[0-9][0-9][0-9][0-9][0-9][0-9][0-9][0-9],[0-9]*,1=[0-9]+,101=Antivirus') or # v5 format # 2008-05-27T10:31:38+09:00 (NOTICE:180.312): [27219] Message From To: Source: returned Disposition: . Query against the sender's Group Policy: returned Filtering Policy Name: Desc: with Destination: <>. matches_regular_expression(volatile.log_data_line, '^[0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9]T[0-9][0-9]:[0-9][0-9]:[0-9][0-9][+-][0-9][0-9]:[0-9][0-9] [(]NOTICE:') ` # The format of dates and times in this log # log.format.date_format = "yyyymmdd" # log.format.time_format = "hhmmss" # All log field parsing will be done using the parsing filters log.format.parse_only_with_filters = "true" # Log fields log.fields = { date = { label = "$lang_stats.field_labels.date" type = "date" index = 0 subindex = 0 hierarchy_dividers = "" left_to_right = false leading_divider = "false" } # date time = { label = "$lang_stats.field_labels.time" type = "time" index = 0 subindex = 0 hierarchy_dividers = "" left_to_right = false leading_divider = "false" } # time source_ip = { label = "$lang_stats.field_labels.source_ip" type = "host" index = 0 subindex = 0 hierarchy_dividers = "." left_to_right = false leading_divider = "false" } # source_ip recipient = { label = "$lang_stats.field_labels.recipient" type = "flat" } # recipient sender = { label = "$lang_stats.field_labels.sender" type = "flat" } # recipient server_ip = { label = "$lang_stats.field_labels.server_ip" type = "flat" } # server_ip subject = { label = "$lang_stats.field_labels.subject" type = "flat" } # subject returned_disposition = "" policy_query = "" filtering_policy_name = "" description = "" destination = "" } # log.fields # # Log Parsing Filters log.parsing_filters.parse = ` # old format if (matches_regular_expression(current_log_line(), '^([0-9]*),([0-9]*),(.*)$')) then ( set_collected_field('', 'date', normalize_date($1, 'yyyymmdd')); set_collected_field('', 'time', normalize_time($2, 'hhmmss')); volatile.namevaluelist = $3; collect_listed_fields('', volatile.namevaluelist, ',', '=', '21=recipient|1=f1|11=source_ip|22=subject|20=sender|12=server_ip'); accept_collected_entry('', false); ); # v5 format # 2008-05-27T10:31:38+09:00 (NOTICE:180.312): [27219] Message From To: Source: returned Disposition: . Query against the sender's Group Policy: returned Filtering Policy Name: Desc: with Destination: <>. else if (matches_regular_expression(current_log_line(), "^([0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9])T([0-9][0-9]:[0-9][0-9]:[0-9][0-9])[+-][0-9][0-9]:[0-9][0-9] [(][A-Z]+:[0-9]+[.][0-9]+[)]: [[][0-9]+[]] Message From <([^>]+)> To: <([^>]+)> Source: <([^>]+)> returned Disposition: <([^>]+)>. Query against the sender's Group Policy: <([^>]+)> returned Filtering Policy Name: <([^>]+)> Desc: <([^>]+)> with Destination: <(.*)>.$")) then ( set_collected_field('', 'date', $1); set_collected_field('', 'time', $2); set_collected_field('', 'sender', $3); set_collected_field('', 'recipient', $4); set_collected_field('', 'returned_disposition', $5); set_collected_field('', 'policy_query', $6); set_collected_field('', 'filtering_policy_name', $7); set_collected_field('', 'description', $8); set_collected_field('', 'destination', $9); accept_collected_entry('', false); ); ` # Log Filters log.filters = { mark_entry = { label = '$lang_admin.log_filters.mark_entry_label' comment = '$lang_admin.log_filters.mark_entry_comment' value = 'messages = 1;' } # mark_entry } # log.filters # Database fields database.fields = { date_time = { label = "$lang_stats.field_labels.date_time" log_field = "date_time" type = "string" suppress_top = 0 suppress_bottom = 3 display_format_type = "date_time" } # date_time day_of_week = { label = "$lang_stats.field_labels.day_of_week" log_field = "day_of_week" type = "string" suppress_top = 0 suppress_bottom = 2 display_format_type = "day_of_week" } # day_of_week hour_of_day = { label = "$lang_stats.field_labels.hour_of_day" log_field = "hour_of_day" type = "string" suppress_top = 0 suppress_bottom = 2 display_format_type = "hour_of_day" } # hour_of_day source_ip = { label = "$lang_stats.field_labels.source_ip" log_field = "source_ip" type = "string" suppress_top = 0 suppress_bottom = 2 } # source_ip location = { label = "$lang_stats.field_labels.location" log_field = "location" type = "string" suppress_top = 0 suppress_bottom = 3 } # location recipient = { label = "$lang_stats.field_labels.recipient" log_field = "recipient" type = "string" suppress_top = 0 suppress_bottom = 2 } # recipient sender = { label = "$lang_stats.field_labels.sender" log_field = "sender" type = "string" suppress_top = 0 suppress_bottom = 2 } # sender subject = { label = "$lang_stats.field_labels.subject" log_field = "subject" type = "string" suppress_top = 0 suppress_bottom = 2 } # subject server_ip = { label = "$lang_stats.field_labels.server_ip" log_field = "server_ip" type = "string" suppress_top = 0 suppress_bottom = 2 } # server_ip returned_disposition = "" policy_query = "" filtering_policy_name = "" description = "" destination = "" } # database.fields # Log Filters log.filters = { mark_entry = { label = '$lang_admin.log_filters.mark_entry_label' comment = '$lang_admin.log_filters.mark_entry_comment' value = 'messages = 1;' } # mark_entry } # log.filters database.numerical_fields = { messages = { label = "$lang_stats.field_labels.messages" default = true requires_log_field = false type = "int" display_format_type = "integer" entries_field = true } # messages } # database.numerical_fields create_profile_wizard_options = { date_time_tracking = true host_tracking = true # How the reports should be grouped in the report menu report_groups = { date_time_group = "" source_ip = true location = true recipient = true sender = true subject = true server_ip = true } # report_groups } # create_profile_wizard_options not_supported = { bandwidth = true } # not_supported } # symantec_mail_security