Splunk Dev

How to Receive Kaspersky Security Center Logs via Syslog with TLS?

refahiati
Explorer

Hi everyone,

I am trying to configure Kaspersky Security Center to forward logs to Splunk using Syslog over TLS. However, I need some guidance on the following points:

 

  • How can I configure Kaspersky Security Center to send logs via Syslog over TLS?

  • What are the steps to generate the necessary certificates for this setup?

  • Which certificate formats or file extensions does Kaspersky Security Center accept for TLS encryption?

  • Are there any specific configurations required on the Splunk side to properly receive and parse these logs over TLS?

I would appreciate any insights, best practices, or documentation references that could help.

Thank you in advance!

 

Labels (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Most of those questions are not about Splunk but about the other end - the Kaspersky solution. You should consult their support/community/docs.

The only question related to Splunk is the last one and the general answer is - don't do it directly on Splunk component. Use an external syslog daemon - syslog-ng, rsyslog, SC4S and either send to HEC input on Splunk or write to files and read those files with UF.

Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...