Security

Getting Mcafee HIPS Firewall Logs to Splunk

theouhuios
Motivator

Hello

Has anyone figured out a way to send Mcafee's HIPS firewall logs which are written to event.log file on the agent to be indexed to Splunk? It writes in binary so splunk can't just read the file. Any ideas on how to do it? It looks like the ePO doesn't get the firewall event logs back to itself so I can't get them to write it as a text file for splunk to read it. And it doesn't get them to its database too so can't use DB Connect to pull them in.

Any ideas?

Tags (1)
0 Karma

daniel_goolsby_
Explorer

After discovering the event.log was binary-- but the file would seemingly load up fine in notepad, or notepad++.. I discovered the file was actually in a different character set called UCS-2 LE, which according to (http://docs.splunk.com/Documentation/Splunk/4.1/Admin/Configurecharactersetencoding) maps to the utf-16le characterset- that I had to specify that in the props.conf on the forwarder.

[monitor://C:\ProgramData\McAfee\Host Intrusion Prevention\Event.log]
index=
disabled = 0
sourcetype = hipsfw
followTail = 1

in props.conf (still on forwarder)

[hipsfw]
NO_BINARY_CHECK = true
CHARSET = utf-16le

This should get everyone going.

hortonew
Builder

This worked for me. Just need to do field extraction now.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Now On Demand Whether you're managing complex deployments or looking to future-proof your data ...

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...