Technologies supported in CEF syslog format
This article contains a complete list of technologies currently supported by Devo in CEF Syslog format.
About CEF Syslog format
While we recommend sending data to Devo in Syslog format whenever possible, we have provided support for the ingestion of events received in common event format (CEF) via Syslog for some technologies. A prime example is when Arcsight is used as a log management solution and events are going to be forwarded from Arcsight directly to Devo in CEF Syslog format.
This format is comprised of a Syslog prefix containing the date/time stamp and the host, and a header that always starts with CEF - and is followed by a series of identifying fields - all of which are required. The last component is the extension and while it's technically optional, it's generally where the real event payload resides. The extension contains data in key-value pairs. Here's a model of the format and a sample CEF Syslog packet.
How does it work
You'll notice that the event contains no specific Devo tag. This is because Devo uses a different process to ingest these events. When a CEF Syslog event is sent to the platform, Devo recognizes CEF as the tag, then it proceeds to read the device vendor and device product values from the event's header. The event is then saved to a table with the name cef0.device_vendor.device_product
.
So, are we saying that you can send any data to Devo in CEF Syslog format? Yes and no. Yes, because Devo will ingest the events and save them in a file determined by the date and key event fields. However, if Devo is not yet equipped with a parser for that specific event type, a table name will not subsequently appear in the Finder and you won't be able to access the data. So, yes Devo will ingest the data but a parser file is necessary in order to be able to access the data table and parse the events for display.
Contact us
If you have data you must send to Devo in CEF Syslog format, and the source technology does not appear in the list below, contact Devo professional services so they can create a parser for the data.
HTTP Ingestions
Note that it is not possible to ingest data to CEF tables using the HTTP ingestion method.
List of technologies
The following list of more than 100 technologies that Devo supports in CEF Syslog is ordered alphabetically by vendor name. Each technology is listed along with its corresponding table name that will appear in the Devo data search Finder.
Browse the technologies by vendor name or use CTRL + F to search this page.
Technology | Data table name |
---|---|
Akamai |
|
Amazon Web Services |
|
AnubisNetworks Cyberfeed |
|
Akamai Logger |
|
AWN CyberSOC |
|
AWS VPC Flow Log |
|
Barracuda Web Application Firewall |
|
Barracuda Networks |
|
Blue Coat Systems |
|
Carbon Black Protection |
|
Check Point |
|
Check Point Application Control |
|
Check Point dshield agent log |
|
Check Point Firewall |
|
Check Point Log Exporter |
|
Check Point Security Compliance |
|
Check Point Security Gateway |
|
Check Point Security Management Appliances |
|
Check Point SmartDashboard |
|
Check Point SmartDefense |
|
Check Point SmartView |
|
Check Point VPN Solutions |
|
Cisco ASA |
|
Cisco Email Security |
|
Cisco FWSM |
|
Cisco Intrusion Detection System |
|
Cisco Meraki Access Point |
|
Cisco NX-OS Software |
|
Cisco routers |
|
Cisco Secure Access Control System |
|
Cisco/Sourcefire FireSIGHT System Event Streamer (eStreamer) |
|
Crowdstrike Falcon Host |
|
CyberArk Enterprise Password Vault |
|
Cybereason |
|
F5 ASM |
|
F5 BIG-IP Application Services |
|
Fireeye Email Security |
|
Forcepoint Data Loss Prevention |
|
Forcepoint Firewall |
|
Forcepoint Web Security |
|
Forescout CounterACT |
|
Fortinet FortiGate |
|
Fortinet FortiNAC |
|
IBM AS/400 |
|
IBM Guardium |
|
IBM Security |
|
Imperva Attack Analytics |
|
Imperva SecureSphere MX Management Server |
|
Infoblox Network Identity Operating System |
|
Ipswitch Secure File Transfer Software |
|
Juniper Junos OS |
|
Juniper NetScreen Security |
|
Juniper Network & Security Manager |
|
Juniper ScreenOS Firewall |
|
Juniper SSL VPN |
|
Kaspersky |
|
Lumension Endpoint Management and Security |
|
Malwarebytes |
|
McAfee ePolicy Orchestrator (McAfee ePO) |
|
McAfee Host Intrusion Prevention |
|
McAfee Next Generation Firewall |
|
McAfee Secure Internet Gateway |
|
Micro Focus ArcSight |
|
Microsoft Cloud App Security |
|
Microsoft DNS trace log |
|
Microsoft Defender ATP (now Microsoft Defender for Endpoint). |
|
Microsoft Exchange Server |
|
Microsoft Forefront Protection |
|
Microsoft Forefront Threat Management Gateway |
|
Microsoft IIS |
|
Microsoft Network Policy Server |
|
Microsoft SQL Server |
|
Microsoft System Center Configuration Manager |
|
Microsoft system events |
|
Microsoft Windows |
|
Nagios Network Monitoring |
|
Palo Alto Networks PAN-OS |
|
Powertech SIEM Agent |
|
Preempt Behavioral Firewall |
|
Proofpoint Messaging Security Gateway |
|
Qualys |
|
RSA Identity Management and Governance |
|
SAP - Security Audit Log |
|
Snort Intrusion Detection (Open source) |
|
SonicWall |
|
Sophos Anti-Virus |
|
Sophos XG firewall |
|
Stonesoft Firewall |
|
Symantec |
|
Symantec Data Loss Prevention |
|
Symantec Email Security |
|
Symantec Endpoint Protection Mobile |
|
Symantec ProxySG |
|
Trend Micro Control Manager |
|
Trend Micro Deep Discovery Analyzer |
|
Trend Micro TippingPoint Unity One IPS |
|
Trend Micro XDR |
|
Tripwire Enterprise |
|
Unix Sendmail |
|
VMware ESX |
|
Watchguards XTM 11.x.x. |
|
Websense (now part of Forcepoint) |
|
Zscaler |
|
Sending data to Devo
In order to start sending data to Devo using these tags, you must configure some parameters. Go to Policies → Common Objects → Other → Syslog Configuration and enter the following data. Click here for more info.
Configuration | Detail |
---|---|
Server Name |
|
Server Port | 443 |
Transport | TSL |
Event formart | CEF0 |
Private key | Enter your domain private key from the Devo app. To get it, go to Administration → Credentials → Access Keys |
Credentials | Access Keys |
Certificate | Enter your domain private key from the Devo app. To get it, go to Administration → Credentials → X.509 Certificates |
Credentials | X.509 Certificates. |
Chain | Enter your domain private key from the Devo app. To get it, go to Administration → Credentials → X.509 Certificates. |