Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Configure Syslog Forwarding in Darktrace

Before InsightIDR can start ingesting data from Darktrace, a Darktrace administrator with UI access must configure Darktrace to send syslog to the InsightIDR Collector.

To configure syslog forwarding in Darktrace:

  1. Log in to the Darktrace interface.

  2. Within the Threat Visualizer, navigate to Admin > System Config.

  3. From the left-hand menu, select Modules and choose Syslog from the available Workflow Integrations.

  4. In the configuration window, select the relevant form of Syslog - here, it's Syslog JSON - and click New to open the configuration settings.

  5. Set the JSON Syslog Alerts field to true.

  6. In the JSON Syslog Server field, specify the IP address of the InsightIDR Collector.

  7. In the JSON Syslog Server Port field, specify a unique port over 1024 that you will use with the InsightIDR event source.

  8. Set the JSON Syslog TCP Alerts field to true.

...

Table of Contents

Overview

We are providing you with the steps to integrate your Darktrace with Seceon SIEM so One can have Comprehensive visibility and Proactive Threat Detection in your Environment. There will be a log transfer between your firewall to APE(Analytics and Policy Engine) via CCE (Collection and Control Engine ). In this document, we are guiding you through the steps for Log forwarding.

Steps Of Configuration

  1. Log in to Darktrace interface;

  2. Expand top left menu and select Admin, a second menu appears;

  3. Select System Config page

...

  1. In Alerting section, click on Verify Alert Settings

  2. In JSON Syslog Alerts, set field to True

  3. Set syslog server to CCE Server’s IP address

  4. Set a port 514 UDP to use with the CQ event source

  5. Set JSON Syslog TCP Alerts to True

...

Ref link: https://docs.rapid7.com/insightidr/darktrace/

Verification Of Configuration

Verification can be done either from CCE Server or from UI.

Verification On the Seceon UI

Step 1: Log in to UI with Administrative Rights & Navigate to System>> Log/Flow Collection Status Option.

...

Steps 2: Inside Source Device IP, the IP Address of the Device will reflect including the no. of logs sent to the Seceon Servers.

...

 

Using CCE Server

sudo tcpdump -i any host 514 and host <IP address> -AAA” command should be running on the CCE server to check whether or not we are getting logs.