Jump to content

How to export events to Splunk


Egor Erastov

23 views

This article is about Kaspersky Security Center for Windows (KSC for Windows)

Step-by-step guide

Make sure that System Management license is installed, otherwise KSC events won't be exported to SIEM. For more information please refer to SIEM integration: the most frequent error.
 

  1. Specify Splunk Server address and port;

    image.thumb.png.7c612694bd409380de78d3795150010c.png

     
  2. Login into Splunk Management console;

    image.thumb.png.284469a336d37bc22b2d0afb5f634063.png

     
  3. Press Settings → Configure data inputs;

    image.thumb.png.bb6c6f03f47abac246dc188d862083d1.png

     
  4. In the opened Add Data window 
    - select TCP;
    - Specify Port you are planning to use. And a Source (KSC server address or DNS-name).

    image.thumb.png.6b352bad628b8326dfa79ee1fe336c7b.png

     
  5. Configure Source type: choose Select and pick syslog from drop down menu. Configure Host: set IP for Method 

    image.thumb.png.263756d3083b4854d868a5f2c5457ad8.png

     
  6. Check the settings on a result screen;

    image.thumb.png.42e2969759f8a6c82a21ff57e5dc45e9.png

     
  7. Open Splunk home page and press Search & Reporting;

    image.thumb.png.1a9e0035917d4a0b161d80960c9fe0fd.png

     
  8. Make sure that KSC event were indexed by Splunk correctly as expected;

    image.thumb.png.073837fabe443b1364047a3961e8dc48.png

     
  9. Right now you are able to see raw KSC events.

    image.thumb.png.8f61152efa92d436d421c753eea4f758.png

 

0 Comments


Recommended Comments

There are no comments to display.

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now


×
×
  • Create New...