Configure the syslog data connection
The
CylancePROTECT
Application for Splunk
can consume real-time syslog data from the Cylance
console. To send these events to Splunk
, syslog forwarding needs to be enabled and configured within Splunk
and in the Cylance
console. For more information about how to configure forwarding, see Configure Splunk indexing and forwarding to use TLS certificates. - InSplunk, on theSplunkmenu bar, clickSettings>Data Inputs>TCP.For multi-tenant configuration, each tenant will require its own stanza in inputs.conf, and each tenant requires its own port. For example, if there are two tenants, CompanyOne and CompanyTwo, the inputs.conf file should follow the model below:[tcp-ssl://6514] disabled = false sourcetype = syslog_protect source = CompanyOne index = cylance_protect[tcp-ssl://6515] disabled = false sourcetype = syslog_protect source = CompanyTwo index = cylance_protect
- In thePort 6515row, in theStatuscolumn, clickEnable.
- In theCylanceconsole, on the menu bar, clickSettings>Application.
- Select theSyslog/SIEMcheck box.
- Choose the desired event types.
- In theSIEMdrop-down list, clickSplunk.
- In theProtocoldrop-down list, clickTCP.
- In theIP/Domainfield, type the IP address or FQDN of your forwarder orSplunkenvironment.
- In thePortfield, type the port number of your Splunk environment.
- ClickSave.
Optionally, to encrypt the syslog data connection with SSL, see Configuring the syslog data connection over SSL in Splunk.