<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Indexing Kaspersky Logs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24853#M3991</link>
    <description>&lt;P&gt;События хранятся тоже в базе. Лучше использовать базу данных для получения данных&lt;/P&gt;</description>
    <pubDate>Tue, 06 Nov 2012 13:22:28 GMT</pubDate>
    <dc:creator>klychnikov</dc:creator>
    <dc:date>2012-11-06T13:22:28Z</dc:date>
    <item>
      <title>Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24850#M3988</link>
      <description>&lt;P&gt;Need help to monitor event logs from Kaspersky Security Centre in #Splunk. Merely pointing forwarder to collect Windows Logs on the Kaspersky Server doesn't help.&lt;/P&gt;

&lt;P&gt;Please suggest.&lt;/P&gt;

&lt;P&gt;Cheers, Mitesh Vohra.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Nov 2012 09:27:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24850#M3988</guid>
      <dc:creator>miteshvohra</dc:creator>
      <dc:date>2012-11-06T09:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24851#M3989</link>
      <description>&lt;P&gt;Kaspersky stores data in ms sql. From there, you can take data.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Nov 2012 12:55:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24851#M3989</guid>
      <dc:creator>klychnikov</dc:creator>
      <dc:date>2012-11-06T12:55:57Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24852#M3990</link>
      <description>&lt;P&gt;Kaspersky uses MS-SQL / MySQL to store config, Kaspersky products checked into the console and endpoints enrolled as part of teh deployment.&lt;/P&gt;

&lt;P&gt;I am looking at ways to monitor logs generated by Kaspersky's Management Console which is stored in Windows Event Log format but is shown separately in the Event Viewer.&lt;/P&gt;

&lt;P&gt;klychnikov: Thanks for your time.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Nov 2012 13:02:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24852#M3990</guid>
      <dc:creator>miteshvohra</dc:creator>
      <dc:date>2012-11-06T13:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24853#M3991</link>
      <description>&lt;P&gt;События хранятся тоже в базе. Лучше использовать базу данных для получения данных&lt;/P&gt;</description>
      <pubDate>Tue, 06 Nov 2012 13:22:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24853#M3991</guid>
      <dc:creator>klychnikov</dc:creator>
      <dc:date>2012-11-06T13:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24854#M3992</link>
      <description>&lt;P&gt;Events are stored also in the database. Better to use a database to retrieve the data&lt;/P&gt;</description>
      <pubDate>Tue, 06 Nov 2012 13:23:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24854#M3992</guid>
      <dc:creator>klychnikov</dc:creator>
      <dc:date>2012-11-06T13:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24855#M3993</link>
      <description>&lt;P&gt;Will check and update the post. Thanks for the pointer.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Nov 2012 03:47:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24855#M3993</guid>
      <dc:creator>miteshvohra</dc:creator>
      <dc:date>2012-11-07T03:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24856#M3994</link>
      <description>&lt;P&gt;No. Database does not have any Kaspersky's own service-related, connectivity and other events.&lt;/P&gt;

&lt;P&gt;"Kaspersky Event Log" is a separate stream of events under "Application and Service Logs" in Windows Event Viewer.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Nov 2012 05:00:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24856#M3994</guid>
      <dc:creator>miteshvohra</dc:creator>
      <dc:date>2012-11-07T05:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24857#M3995</link>
      <description>&lt;P&gt;I figured it out. The solution is to add a section and stanza in the inputs.conf file on UF-end.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLogs: Kaspersky Event Logs]
disabled = 0
start_from = oldest
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Then, restart the SplunkForwarder Service.&lt;/P&gt;

&lt;P&gt;Cheers. Mitesh.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Nov 2012 01:57:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24857#M3995</guid>
      <dc:creator>miteshvohra</dc:creator>
      <dc:date>2012-11-10T01:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24858#M3996</link>
      <description>&lt;P&gt;hello !! i need help,&lt;/P&gt;

&lt;P&gt;i created an index which contains a csv based kaspersky log file. I want Enterprise Security to understand this file, and use it for correlation.&lt;BR /&gt;
 I don't know how to do it . &lt;BR /&gt;
Could you help me ??&lt;/P&gt;

&lt;P&gt;thx..  &lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2014 10:26:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24858#M3996</guid>
      <dc:creator>jeandez</dc:creator>
      <dc:date>2014-03-18T10:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24859#M3997</link>
      <description>&lt;P&gt;I also need to know that &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Dec 2014 19:15:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24859#M3997</guid>
      <dc:creator>btiggemann</dc:creator>
      <dc:date>2014-12-19T19:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24860#M3998</link>
      <description>&lt;P&gt;Accept the answer above with one exception....   It is not plural and I specified a specific index on my stanza&lt;/P&gt;

&lt;P&gt;[WinEventLog://Kaspersky Event Log]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
start_from = oldest&lt;BR /&gt;
current_only = 0&lt;BR /&gt;
checkpointInterval = 5&lt;BR /&gt;
index = kaspersky&lt;BR /&gt;
renderXml = false&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:29:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24860#M3998</guid>
      <dc:creator>dolejh76</dc:creator>
      <dc:date>2020-09-28T18:29:57Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24861#M3999</link>
      <description>&lt;P&gt;Did you find how to put it in entreprise security without creating a new add-on ?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 14:33:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24861#M3999</guid>
      <dc:creator>MinaMina</dc:creator>
      <dc:date>2015-04-30T14:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24862#M4000</link>
      <description>&lt;P&gt;Hello All;&lt;/P&gt;

&lt;P&gt;In reading this thread, I am not clear as to the best way to index kaspersky data, ms-sql (presumably using DBConnect), or through Universal Forwarder, using the inputs.conf provided by dolejh76.&lt;/P&gt;

&lt;P&gt;In searching SplunkBase for "kaspersky", I am redirected to the VirusTotal app, which lacks any documentation.&lt;/P&gt;

&lt;P&gt;Also, has anyone written any queries to put together reporting, and/or alerts?&lt;/P&gt;

&lt;P&gt;Thank you,&lt;/P&gt;

&lt;P&gt;-mi&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 15:11:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24862#M4000</guid>
      <dc:creator>nychawk</dc:creator>
      <dc:date>2015-08-20T15:11:56Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24863#M4001</link>
      <description>&lt;P&gt;Its been a while since I looked at this but if I remember right you have to make sure that Kaspersky is logging its events to the windows event log.  From there you just grab that data and push it to its own index..  As for pulling directly from the database - no we did not do that.&lt;/P&gt;

&lt;P&gt;Thanks&lt;BR /&gt;
John&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 16:41:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24863#M4001</guid>
      <dc:creator>dolejh76</dc:creator>
      <dc:date>2015-08-20T16:41:57Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24864#M4002</link>
      <description>&lt;P&gt;I just looked at our Kaspersky index - unfortunately it looks like it is just events ON the actual Kaspersky server.  We are not at this point getting any alerts from kas events on other computers.  On my list to do - just a low priority since we currently get alerts directly from Kaspersky.  I would however like to pull this into Splunk.&lt;/P&gt;

&lt;P&gt;Thanks&lt;BR /&gt;
John&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 16:45:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24864#M4002</guid>
      <dc:creator>dolejh76</dc:creator>
      <dc:date>2015-08-20T16:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24865#M4003</link>
      <description>&lt;P&gt;Thanks John;&lt;/P&gt;

&lt;P&gt;Do you have any information at all on the DB, tables, fields, etc?  &lt;/P&gt;

&lt;P&gt;Unless there is a working option for logging Kaspersky files, I'd like to try this approach; I would be surprised to believe I am the first.&lt;/P&gt;

&lt;P&gt;Please share your findings, I will do the same.&lt;/P&gt;

&lt;P&gt;Regards,&lt;/P&gt;

&lt;P&gt;-mike&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 16:51:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24865#M4003</guid>
      <dc:creator>nychawk</dc:creator>
      <dc:date>2015-08-20T16:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24866#M4004</link>
      <description>&lt;P&gt;So the best solution is to use DB Connect ?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2016 14:35:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24866#M4004</guid>
      <dc:creator>vince2010091</dc:creator>
      <dc:date>2016-01-20T14:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24867#M4005</link>
      <description>&lt;P&gt;The new version of Kaspersky Security Center 10.3.x can send the fresh (as well as historical data available in backend DB) to Splunk in CEF format. Just provide the IP address and port number of Splunk Indexer.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Run the Console.&lt;/LI&gt;
&lt;LI&gt;Expand the node Reports and notifications → Events.&lt;/LI&gt;
&lt;LI&gt;Select Properties in the context menu.&lt;/LI&gt;
&lt;LI&gt;On the Exporting events tab, select the check box Automatically export events to SIEM system database. &lt;/LI&gt;
&lt;LI&gt;Select Splunk from the drop-down list and specify the address of your SIEM server. &lt;/LI&gt;
&lt;LI&gt;Click OK.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Hope this helps.&lt;/P&gt;

&lt;P&gt;Regards, Mitesh.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Oct 2016 05:23:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24867#M4005</guid>
      <dc:creator>miteshvohra</dc:creator>
      <dc:date>2016-10-01T05:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24868#M4006</link>
      <description>&lt;P&gt;And what must be configured on Splunk's side for it to accept Kaspersky events???&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 10:17:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24868#M4006</guid>
      <dc:creator>rimvydukas</dc:creator>
      <dc:date>2017-03-31T10:17:56Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Kaspersky Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24869#M4007</link>
      <description>&lt;P&gt;Well the documentation does not mention any particular setting on Splunk side. The local support folks do not have sufficient knowledge of any of the 4 options (Syslog, ArcSight, Qradar &amp;amp; Splunk) present in the latest Kaspersky Security Console.&lt;/P&gt;

&lt;P&gt;I have setup KSC and Splunk on AWS to try this out. Running out of trial license since I am not able to give full time to the setup.&lt;/P&gt;

&lt;P&gt;Will rebuild another instance if the problem statement is still open and anyone is interested in the solution.&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 12:55:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Indexing-Kaspersky-Logs/m-p/24869#M4007</guid>
      <dc:creator>miteshp250283</dc:creator>
      <dc:date>2017-05-19T12:55:17Z</dc:date>
    </item>
  </channel>
</rss>

