I know 'Trend Micro Deep Security for Splunk' app by default creates 6 listeners each listening at unique UDP ports. And, this is to classify/separate events based on the source.
Is there a way we can only use one UDP port to listen to events. So, can we use one sourcetype 'deepsecurity' instead of multiple sub sourcetypes like: deepsecurity-antimalware, deepsecurity-web_reputation etc?
Yes you can. I do it using a syslog server between Splunk and TMDS.
We send syslog from TMDS in cef format to a syslog server and ingest the data into Splunk as sourcetype = deepsecurity:cef
So theoretically you could send the CEF data directly to Splunk and listen on one port with sourcetype=deepsecurity:cef
Yes you can. I do it using a syslog server between Splunk and TMDS.
We send syslog from TMDS in cef format to a syslog server and ingest the data into Splunk as sourcetype = deepsecurity:cef
So theoretically you could send the CEF data directly to Splunk and listen on one port with sourcetype=deepsecurity:cef
Does the trendmicro app for Splunk work with sourcetype = deepsecurity:cef
Not 100%. Maybe it's just sourcetype=deepsecurity
Check out what's in the TA in props.conf
Same here
This sounds very feasible. Thanks for your answer.