Hi All,
For the past few months I have been testing the DLP Feature of the Cisco Ironport to help block any sensitive data (i.e. credit card numbers) from being sent.
I have been indexing these logs in Splunk and want to make an alert to send to system administrators if a server tries to send an email with a credit card number. (Obviously an alert to the sender will not work in this case as the sender is a server. )
However, there does not appear to be a log line that will indicate a DLP Policy Violation between a sender and receiver. They are separated in multiple log lines like so:
2011 Oct 28 16:13:51 ironport_server mail [info] splunk_maillogs:nopid Info: MID 6509657 quarantined to "Policy" (DLP violation)
2011 Oct 28 16:13:51 ironport_server mail [info] splunk_maillogs:nopid Info: MID 6509657 DLP violation
2011 Oct 28 16:13:38 ironport_server mail [info] splunk_maillogs:nopid Info: MID 6509657 ready 53 bytes from brian@server
2011 Oct 28 16:13:38 ironport_server mail [info] splunk_maillogs:nopid Info: MID 6509657 ICID 6237668 RID 0 To: brian@testsite
I guess the only key here to bind these two types of log messages together is with the message ID.
However, this would need to be a 2 part query:
Find any log with a DLP Policy Violation.
Find all logs pertaining to the MID value specified in the Violation Log.
Any idea on how to make a 2 part query and make an alert out of it?
Or is there a better way to do this?
Let me know what you think.
Any help is appreciated.
Thanks.
Brian
... View more