All Apps and Add-ons

Having trouble establishing connection with Splunk server for McAfee ePO integration.

New Member

I'm the ePO administrator at my company and we are trying to integrate McAfee with Splunk.
McAfee told me that on the ePO side I just need to set the Splunk server as a Registered Server (as I've set on this image below), but I'm not able to establish a connection with Splunk and forward Syslogs.
What can I do to establish a connection with Splunk and send syslogs?
Do we need to install the McAfee add-on and/or install DB Connect?

alt text

0 Karma


hi all, i still failed to decrypt the epo logs. this is my config.

connection_host = ip
host = DCHQ-SIMSL-01
source =
sourcetype = mcafee:epo:syslog
index = mcafee





any ideas? huhh

0 Karma

New Member


We've tried to do this method but without success.

We're trying to use DB Connect to directly connect to ePO DB.

On DB connect screen, we have put server address, port number, but I have one doubt about put our instance/db.

Can I put on DB field PR02DS\EPODB (instance\Database) ?

Or do I need to put this on server address like "\pr02ds" ?

Thanks in advance.

0 Karma


try this configuration :

sourcetype = mcafee:epo

password =
requireClientCert = false
rootCA = /opt/splunk/certs/root-ca.pem
serverCert = /opt/splunk/certs/cert.pem

check this link for a configuration example:

New Member


Thanks for the tip.

I'll try this with our team and let you know if that worked.

Thank you

0 Karma


Adding my 2c to this thread since I've found it be so very useful:

1. The ePO to splunk TLS connection requires only a splunk-side cert. I've used a self-signed cert by doing the following:

1.a.  sudo openssl req -x509 -days 3650 -nodes -newkey rsa:2048 -keyout splunk-epo-remote.key -out splunk-epo-remote.crt

1.b. cat  splunk-epo-remote.crt  splunk-epo-remote.key >  splunk-epo-remote.pem

2. the [SSL] stanza in input.conf is:

serverCert=/opt/splunk/certs/ splunk-epo-remote.pem



I've also updated the ciperSuite based on this link to add the AES256-GCM-SHA384 cipher



0 Karma


Hello @raphaalmeida ,

there are two types of data you can get from ePO - mcafee:epo using DB Connect and mcafee:ids using syslog:

ePO outputs TLS encrypted syslog, you need to set up TLS on the syslog side, here are a few examples:

What kind of receiver (rsyslog or syslog-ng, Windows or Linux) do you have?

New Member

Hello @PavelP

Thanks for your response.

I'm trying to forward syslogs directly to Splunk server.

Is this possible? Or do I need to setup a middle server to receive those syslogs and after send it to Splunk?

Thanks for your help.

0 Karma


@raphaalmeida I am planning to forward logs from McAfee ePO to Splunk Syslog-ng server. but while testing the connection i see like Syslog connection failed.

Please let us know how you configured the log forwarding.

0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

WATCH NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, ...

Enter the Splunk Community Dashboard Challenge for Your Chance to Win!

The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ...

.conf24 | Session Scheduler is Live!!

.conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ...