# Copyright (c) 2014 Flowerfire, Inc. All Rights Reserved. trend_micro_deep_security = { plugin_version = "1.0" # Initial creation - 1.0 # 2014-10-8 - 1.0 - Lew info.1.manufacturer = "Trend Micro" info.1.device = "Deep Security" info.1.version.1 = "" # The name of the log format log.format.format_label = "Trend Micro Deep Security" log.miscellaneous.log_data_type = "firewall" log.miscellaneous.log_format_type = "network_device" # The log is in this format if any of the first ten lines match this regular expression log.format.autodetect_regular_expression = "^[0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9] [0-9][0-9]:[0-9][0-9]:[0-9][0-9]\t[^\t]*\t[^\t]*\t[A-Z][a-z]* [0-9]* [0-9:]* [^ ]* CEF:.*user=[^ ]* target=[^ ]* msg=.* TrendMicroDsTenant=.* TrendMicroDsTenantId=.* $" # This regular expression is used to parse the log fields out of the log entry #log.format.parsing_regular_expression = "^([0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9] [0-9][0-9]:[0-9][0-9]:[0-9][0-9])\t([^\t]*)\t([^\t]*)\t([A-Z][a-z]* [0-9]* [0-9:]*) ([^ ]*) CEF:(.*)user=([^ ]*) target=([^ ]*) msg=(.*) TrendMicroDsTenant=(.*) TrendMicroDsTenantId=(.*) $" # All log field parsing will be done using the parsing filters log.format.parse_only_with_filters = "true" # The format of dates and times in this log log.format.date_format = "auto" log.format.time_format = "auto" # Log fields log.fields = { date = "" time = "" local_field = "" server_name1 = "" other_date = "" server_name2 = "" CEF = "" user = "" target = "" msg = "" TrendMicroDsTenant = "" TrendMicroDsTenantId = "" event_number = "" title = "" action_by = "" description = "" tags = "" } # log.fields # if (matches_regular_expression(current_log_line(), '([0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9]) ([0-9][0-9]:[0-9][0-9]:[0-9][0-9])')) then ( # Log Parsing Filters log.parsing_filters.parse = ` if (matches_regular_expression(current_log_line(), '^([0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9]) ([0-9][0-9]:[0-9][0-9]:[0-9][0-9])\t([^\t]*)\t([^\t]*)\t([A-Z][a-z]* [0-9]* [0-9:]*) ([^ ]*) CEF:(.*)user=([^ ]*) target=(.*)msg=(.*) TrendMicroDsTenant=(.*) TrendMicroDsTenantId=(.*) $')) then ( set_collected_field('', 'date', $1); set_collected_field('', 'time', $2); set_collected_field('', 'local_field', $3); set_collected_field('', 'server_name1', $4); set_collected_field('', 'other_date', $5); set_collected_field('', 'server_name2', $6); set_collected_field('', 'CEF', $7); set_collected_field('', 'user', $8); set_collected_field('', 'target', $9); set_collected_field('', 'msg', $10); set_collected_field('', 'TrendMicroDsTenant', $11); set_collected_field('', 'TrendMicroDsTenantId', $12); accept_collected_entry('', false); ) else if (matches_regular_expression(current_log_line(), '^([0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9]) ([0-9][0-9]:[0-9][0-9]:[0-9][0-9])\t([^\t]*)\t([^\t]*)\t([A-Z][a-z]* [0-9]* [0-9:]*) ([^ ]*) CEF:(.*)user=([^ ]*) msg=(.*) TrendMicroDsTenant=(.*) TrendMicroDsTenantId=(.*) $')) then ( set_collected_field('', 'date', $1); set_collected_field('', 'time', $2); set_collected_field('', 'local_field', $3); set_collected_field('', 'server_name1', $4); set_collected_field('', 'other_date', $5); set_collected_field('', 'server_name2', $6); set_collected_field('', 'CEF', $7); set_collected_field('', 'user', $8); set_collected_field('', 'msg', $9); set_collected_field('', 'TrendMicroDsTenant', $10); set_collected_field('', 'TrendMicroDsTenantId', $11); accept_collected_entry('', false); ) else if (matches_regular_expression(current_log_line(), '^([0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9]) ([0-9][0-9]:[0-9][0-9]:[0-9][0-9])\t([^\t]*)\t([^\t]*)\t([A-Z][a-z]* [0-9]* [0-9:]*) ([^ ]*) DSM: EVENTNUMBER=([^ ]*) TITLE=(.*) TARGET=(.*) ACTIONBY=(.*) DESCRIPTION=(.*) TAGS=(.*) $')) then ( set_collected_field('', 'date', $1); set_collected_field('', 'time', $2); set_collected_field('', 'local_field', $3); set_collected_field('', 'server_name1', $4); set_collected_field('', 'other_date', $5); set_collected_field('', 'server_name2', $6); set_collected_field('', 'event_number', $7); set_collected_field('', 'title', $8); set_collected_field('', 'target', $9); set_collected_field('', 'action_by', $10); set_collected_field('', 'description', $11); set_collected_field('', 'tags', $12); accept_collected_entry('', false); ) ` # Database fields database.fields = { date_time = "" local_field = "" server_name1 = "" other_date = "" server_name2 = "" CEF = "" user = "" target = "" msg = "" TrendMicroDsTenant = "" TrendMicroDsTenantId = "" event_number = "" title = "" action_by = "" description = "" tags = "" } # database.fields # Log Filters log.filters = { mark_entry = { label = '$lang_admin.log_filters.mark_entry_label' comment = '$lang_admin.log_filters.mark_entry_comment' value = 'events = 1' } # mark_entry } # log.filters database.numerical_fields = { events = { label = "$lang_stats.field_labels.events" default = true requires_log_field = false type = "int" display_format_type = "integer" entries_field = true } # events } # database.numerical_fields create_profile_wizard_options = { # How the reports should be grouped in the report menu report_groups = { date_time_group = "" cef_group = { CEF = "" user = "" msg = "" TrendMicroDsTenant = "" TrendMicroDsTenantId = "" } dsm_group = { event_number = "" title = "" action_by = "" description = "" tags = "" } } # report_groups } # create_profile_wizard_options } # trend_micro_deep_security