<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: McAfee Host Intrusion Prevention event logs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/McAfee-Host-Intrusion-Prevention-event-logs/m-p/122411#M25350</link>
    <description>&lt;P&gt;You could probably make an index-time transform to pull out the correct source host name from the events to replace the hostname of the ePO server.&lt;/P&gt;

&lt;P&gt;props.conf &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[your_epo_sourcetype]
TRANSFORMS-set_host
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[set_host]
REGEX = your regex here
DEST_KEY = MetaData:Host
FORMAT = host::$1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;read more here: &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.1/Data/Advancedsourcetypeoverrides"&gt;http://docs.splunk.com/Documentation/Splunk/6.0.1/Data/Advancedsourcetypeoverrides&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jan 2014 01:20:56 GMT</pubDate>
    <dc:creator>kristian_kolb</dc:creator>
    <dc:date>2014-01-23T01:20:56Z</dc:date>
    <item>
      <title>McAfee Host Intrusion Prevention event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/McAfee-Host-Intrusion-Prevention-event-logs/m-p/122410#M25349</link>
      <description>&lt;P&gt;From what I've been able to find, McAfee Host Intrusion Prevention does not write to its event.log file in a human readable format.  How can I get that read in by Splunk in a useful format?&lt;/P&gt;

&lt;P&gt;A previous answer I found (&lt;A href="http://answers.splunk.com/answers/95340/mcafee-epo-integration-with-splunk"&gt;http://answers.splunk.com/answers/95340/mcafee-epo-integration-with-splunk&lt;/A&gt;) talked about configuring ePolicy Orchestrator to create a text log file, but wouldn't that cause the source of all the events to be listed as the ePolicy server as opposed to the computer the event actually occurred on?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2014 22:45:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/McAfee-Host-Intrusion-Prevention-event-logs/m-p/122410#M25349</guid>
      <dc:creator>APNelson</dc:creator>
      <dc:date>2014-01-22T22:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: McAfee Host Intrusion Prevention event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/McAfee-Host-Intrusion-Prevention-event-logs/m-p/122411#M25350</link>
      <description>&lt;P&gt;You could probably make an index-time transform to pull out the correct source host name from the events to replace the hostname of the ePO server.&lt;/P&gt;

&lt;P&gt;props.conf &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[your_epo_sourcetype]
TRANSFORMS-set_host
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[set_host]
REGEX = your regex here
DEST_KEY = MetaData:Host
FORMAT = host::$1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;read more here: &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.0.1/Data/Advancedsourcetypeoverrides"&gt;http://docs.splunk.com/Documentation/Splunk/6.0.1/Data/Advancedsourcetypeoverrides&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2014 01:20:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/McAfee-Host-Intrusion-Prevention-event-logs/m-p/122411#M25350</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2014-01-23T01:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: McAfee Host Intrusion Prevention event logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/McAfee-Host-Intrusion-Prevention-event-logs/m-p/122412#M25351</link>
      <description>&lt;P&gt;After discovering the event.log was binary-- but the file would seemingly load up fine in notepad, or notepad++.. I discovered the file was actually in a different character set called UCS-2 LE, which according to (&lt;A href="http://docs.splunk.com/Documentation/Splunk/4.1/Admin/Configurecharactersetencoding" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/4.1/Admin/Configurecharactersetencoding&lt;/A&gt;) maps to the utf-16le characterset- that I had to specify that in the props.conf on the forwarder.&lt;/P&gt;

&lt;P&gt;[monitor://C:\ProgramData\McAfee\Host Intrusion Prevention\Event.log]&lt;BR /&gt;
index=&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
sourcetype = hipsfw&lt;BR /&gt;
followTail = 1&lt;/P&gt;

&lt;P&gt;in props.conf (still on forwarder)&lt;/P&gt;

&lt;P&gt;[hipsfw]&lt;BR /&gt;
NO_BINARY_CHECK = true&lt;BR /&gt;
CHARSET = utf-16le&lt;/P&gt;

&lt;P&gt;This should get everyone going. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:47:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/McAfee-Host-Intrusion-Prevention-event-logs/m-p/122412#M25351</guid>
      <dc:creator>daniel_goolsby_</dc:creator>
      <dc:date>2020-09-29T07:47:25Z</dc:date>
    </item>
  </channel>
</rss>

