Security

Getting Mcafee HIPS Firewall Logs to Splunk

theouhuios
Motivator

Hello

Has anyone figured out a way to send Mcafee's HIPS firewall logs which are written to event.log file on the agent to be indexed to Splunk? It writes in binary so splunk can't just read the file. Any ideas on how to do it? It looks like the ePO doesn't get the firewall event logs back to itself so I can't get them to write it as a text file for splunk to read it. And it doesn't get them to its database too so can't use DB Connect to pull them in.

Any ideas?

Tags (1)
0 Karma

daniel_goolsby_
Explorer

After discovering the event.log was binary-- but the file would seemingly load up fine in notepad, or notepad++.. I discovered the file was actually in a different character set called UCS-2 LE, which according to (http://docs.splunk.com/Documentation/Splunk/4.1/Admin/Configurecharactersetencoding) maps to the utf-16le characterset- that I had to specify that in the props.conf on the forwarder.

[monitor://C:\ProgramData\McAfee\Host Intrusion Prevention\Event.log]
index=
disabled = 0
sourcetype = hipsfw
followTail = 1

in props.conf (still on forwarder)

[hipsfw]
NO_BINARY_CHECK = true
CHARSET = utf-16le

This should get everyone going.

hortonew
Builder

This worked for me. Just need to do field extraction now.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...