cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

McAfee Network Security Manager 10.1.7.7

Jump to solution

Hi,

i am facing some problems with Syslog Forward in Network Security Manager.

 

We have configured syslog forwarding to our SIEM (Qradar). The integration between the two products is working very well, but for some events the field where there is the detail "Attack Blocked" is not shown. We have seen several events on our Qradar where the action is not reported, checking the same events on the NSM platform instead we see that they are blocked. We have already configured all the fields to be included in the log and in fact on most of the events we also have the details of the outcome of the attack in the log.

Below all the fields set in the log:

| $ IV_ALERT_ID $ | $ IV_ALERT_TYPE $ | $ IV_ATTACK_TIME $ | "$ IV_ATTACK_NAME $" | $ IV_ATTACK_ID $ | $ IV_ATTACK_SEVERITY $ | $ IV_ATTACK_SIGNATURE $ | $ IV_ATTACK_CONFIDENCE $ | $ IV_ADMIN_DOMAINS $ IVCE_SNIPCE $ IV_SAT $ IV_ADMIN_DOMAIN $ | $ IV_SOURCE_PORT $ | $ IV_DESTINATION_IP $ | $ IV_DESTINATION_PORT $ | $ IV_DIRECTION $ | $ IV_SUB_CATEGORY $ | $ IV_LAYER_7_DATA $ | RESULT = "$ IV_RESULT_STATUS $" | DEST_OS = "$ IV_DEST_MARE_F" $ IV_DEST_MARE_F "$ IV_DEST_MARE =" $ IV_DEST_MARE = ​​"$ IV_DEST_MARE" = "$ IV_MALWARE_FILE_MD5_HASH $" | VIRUS_NAME = "$ IV_MALWARE_VIRUS_NAME $"

Here is a sample log where we are facing the issue:

<157>Apr 7 19:53:58 SyslogAlertForwarder: |6892768202333801908|Signature|2021-04-07 17:53:58 GMT|"RPC: Wind River Systems VxWorks WDB Debug Activities Detected"|0x40805600|Low|vxworks|Medium|Engineering s.p.a|VICDCIPS1|217.(CENS_IP)_24|170.130.187.38|60969|217.172.12.120|17185|Inbound|probe|N/A

 

1 Solution

Accepted Solutions

Re: McAfee Network Security Manager 10.1.7.7

Jump to solution

Solved,

there was a second instance that sent logs to a machine equipped with a samplicator, which sent the logs to SIEM as if it were the IPS. The fields of the second instance did not include the RESULT, so we disabled it and fixed it

 

Regards

View solution in original post

2 Replies
fkazi04
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 3

Re: McAfee Network Security Manager 10.1.7.7

Jump to solution

Hello @AlessioDeMarc 

The fields added for Syslog messages appears to be correct. RESULT = "$ IV_RESULT_STATUS $" will add result in a syslog message.

From the syslog message, I understand "N/A" is the result status. There are multiple attack categories and N/A is one of them. https://kc.mcafee.com/corporate/index?page=content&id=KB56436

 

Regards,
Faizan

Was my reply helpful?
If you find this post useful, please give it a Kudos! l Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

Re: McAfee Network Security Manager 10.1.7.7

Jump to solution

Solved,

there was a second instance that sent logs to a machine equipped with a samplicator, which sent the logs to SIEM as if it were the IPS. The fields of the second instance did not include the RESULT, so we disabled it and fixed it

 

Regards

View solution in original post

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community