Here's how I've partially solved this for UNIX/Linux clients. On the Indexer props.conf [syslog] ### Match events with sourcetype of syslog and invoke the SophosLogs stanza in transforms.conf ### TRANSFORMS-antivirus = SophosLogs transforms.conf [SophosLogs] ### Look in events of sourcetype syslog specified in props.conf for the string "savd [" REGEX=savd\[ ### Select _MetaData Index field ### DEST_KEY=_MetaData:Index ### Change the destination Index to antivirus from the original (unix) ### FORMAT=antivirus On the Search Head eventtypes.conf [sophos_central_events] ### Create an eventtype of sophos_central_events and match the field product_version with any value ### search=product_version=* tags.conf ### Enable malware and operations tags for eventtype sophos_central_events ### [eventtype=sophos_central_events] malware = enabled operations = enabled props.conf [syslog] ### Match events with sourcetype of syslog and invoke the SophosLogsSH stanza in transforms.conf ### REPORT-antivirus = SophosLogsSH transforms.conf [SophosLogsSH] ### Use REGEX to extract fields date, time, host, process_name, product_version ### REGEX=^(?P<date>\w+\s+\d+)\s+(?P<time>[^ ]+)\s+(?P<host>[^ ]+)\s+(?P<process_name>\w+)(?:[^ \n]* ){6}(?P<product_version>\SAV:\s\d*\.\d*\.\d*,\sEngine:\s\ d*\.\d*\.\d*,\sData:\s\d*.\d*.+) The effect of this is that we now have any events written by the savd process to /var/log/messages being routed to the antivirus Index, rather than the UNIX Index. The Malware datamodel can search the antivirus Index, correctly detects events with malware and operations tags. It then counts the number of hosts with a product_version field and populates the Enterprise Security dashboard with the version numbers. The next task is to do the same for Windows clients. Hopefully this helps someone.
... View more