Collect Forcepoint DLP logs
This document describes how you can collect Forcepoint Data Loss Prevention (DLP) logs by using a Google Security Operations forwarder.
For more information, see Data ingestion to Google Security Operations overview.
An ingestion label identifies the parser which normalizes raw log data to structured
UDM format. The information in this document applies to the parser with the
FORCEPOINT_DLP ingestion label.
Configure Forcepoint DLP
- Sign in to the Forcepoint Security Manager console.
- In the Additional actions section, select the Send syslog message checkbox.
- In the Data security module, select Settings > General > Remediation.
- In the Syslog settings section, specify the following:
- In the IP address or hostname field, enter the IP address or hostname of the Google Security Operations forwarder.
- In the Port field, enter the port number.
- Clear the Use syslog facility for these messages checkbox.
 
- To send the syslog server a verification test message, click Test connection.
- To save your changes, click Ok.
Configure the Google Security Operations forwarder to ingest Forcepoint DLP logs
- Go to SIEM Settings > Forwarders.
- Click Add new forwarder.
- In the Forwarder Name field, enter a unique name for the forwarder.
- Click Submit. The forwarder is added and the Add collector configuration window appears.
- In the Collector name field, type a name.
- Select Forcepoint DLP as the Log type.
- Select Syslog as the Collector type.
- Configure the following mandatory input parameters:
- Protocol: specify the connection protocol that the collector uses to listen for syslog data.
- Address: specify the target IP address or hostname where the collector resides and listens for syslog data.
- Port: specify the target port where the collector resides and listens for syslog data.
 
- Click Submit.
For more information about the Google Security Operations forwarders, see Manage forwarder configurations through the Google Security Operations UI. If you encounter issues when you create forwarders, contact Google Security Operations support.
Field mapping reference
This parser extracts key-value pairs from Forcepoint DLP CEF formatted logs, normalizing and mapping them to the UDM. It handles various CEF fields, including sender, recipient, actions, and severity, enriching the UDM with details like user information, affected files, and security results.
UDM Mapping Table
| Log Field | UDM Mapping | Logic | 
|---|---|---|
| act | security_result.description | If actionPerformedis empty, the value ofactis assigned tosecurity_result.description. | 
| actionID | metadata.product_log_id | The value of actionIDis assigned tometadata.product_log_id. | 
| actionPerformed | security_result.description | The value of actionPerformedis assigned tosecurity_result.description. | 
| administrator | principal.user.userid | The value of administratoris assigned toprincipal.user.userid. | 
| analyzedBy | additional.fields.key | The string "analyzedBy" is assigned to additional.fields.key. | 
| analyzedBy | additional.fields.value.string_value | The value of analyzedByis assigned toadditional.fields.value.string_value. | 
| cat | security_result.category_details | The values of catare merged into thesecurity_result.category_detailsfield as a list. | 
| destinationHosts | target.hostname | The value of destinationHostsis assigned totarget.hostname. | 
| destinationHosts | target.asset.hostname | The value of destinationHostsis assigned totarget.asset.hostname. | 
| details | security_result.description | If both actionPerformedandactare empty, the value ofdetailsis assigned tosecurity_result.description. | 
| duser | target.user.userid | The value of duseris used to populatetarget.user.userid.  Multiple values separated by "; " are split and assigned as individual email addresses if they match the email regex, otherwise they are treated as user IDs. | 
| eventId | metadata.product_log_id | If actionIDis empty, the value ofeventIdis assigned tometadata.product_log_id. | 
| fname | target.file.full_path | The value of fnameis assigned totarget.file.full_path. | 
| logTime | metadata.event_timestamp | The value of logTimeis parsed and used to populatemetadata.event_timestamp. | 
| loginName | principal.user.user_display_name | The value of loginNameis assigned toprincipal.user.user_display_name. | 
| msg | metadata.description | The value of msgis assigned tometadata.description. | 
| productVersion | additional.fields.key | The string "productVersion" is assigned to additional.fields.key. | 
| productVersion | additional.fields.value.string_value | The value of productVersionis assigned toadditional.fields.value.string_value. | 
| role | principal.user.attribute.roles.name | The value of roleis assigned toprincipal.user.attribute.roles.name. | 
| severityType | security_result.severity | The value of severityTypeis mapped tosecurity_result.severity. "high" maps to "HIGH", "med" maps to "MEDIUM", and "low" maps to "LOW" (case-insensitive). | 
| sourceHost | principal.hostname | The value of sourceHostis assigned toprincipal.hostname. | 
| sourceHost | principal.asset.hostname | The value of sourceHostis assigned toprincipal.asset.hostname. | 
| sourceIp | principal.ip | The value of sourceIpis added to theprincipal.ipfield. | 
| sourceIp | principal.asset.ip | The value of sourceIpis added to theprincipal.asset.ipfield. | 
| sourceServiceName | principal.application | The value of sourceServiceNameis assigned toprincipal.application. | 
| suser | principal.user.userid | If administratoris empty, the value ofsuseris assigned toprincipal.user.userid. | 
| timestamp | metadata.event_timestamp | The value of timestampis used to populatemetadata.event_timestamp. | 
| topic | security_result.rule_name | The value of topicis assigned tosecurity_result.rule_nameafter commas are removed. Hardcoded to "FORCEPOINT_DLP". Hardcoded to "Forcepoint". Extracted from the CEF message.  Can be "Forcepoint DLP" or "Forcepoint DLP Audit". Extracted from the CEF message. Concatenation ofdevice_event_class_idandevent_name, formatted as "[device_event_class_id] - event_name". Initialized to "GENERIC_EVENT". Changed to "USER_UNCATEGORIZED" ifis_principal_user_presentis "true". | 
Need more help? Get answers from Community members and Google SecOps professionals.