Collect Forescout eyeSight logs

Supported in:

This document explains how to ingest Forescout eyeSight (formerly CounterACT) logs to Google Security Operations using the Bindplane agent.

Forescout eyeSight is a network access control (NAC) platform that provides agentless device visibility, classification, and compliance assessment across IT, IoT, OT, and IoMT devices. It discovers and profiles every connected device in real time, enabling organizations to enforce access policies and reduce the attack surface without requiring endpoint agents.

For more information, see Forescout NAC documentation.

Before you begin

Make sure you have the following prerequisites:

  • A Google SecOps instance
  • A Windows 2016 or later or Linux host with systemd
  • If running behind a proxy, ensure firewall ports are open per the Bindplane agent requirements
  • Privileged access to the Forescout Console (administrator account)
  • Network connectivity between the Forescout appliance and the Bindplane agent host

Get Google SecOps Ingestion Authentication File

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Collection Agents.
  3. Download the Ingestion Authentication File. Save the file securely on the system where Bindplane will be installed.

Get Google SecOps customer ID

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Profile.
  3. Copy and save the Customer ID from the Organization Details section.

Install the Bindplane agent

Install the Bindplane agent on your Windows or Linux operating system according to the following instructions.

Windows installation

  1. Open Command Prompt or PowerShell as an administrator.
  2. Run the following command:

    msiexec /i "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" /quiet
    
  3. Wait for the installation to complete.

  4. Verify the installation by running:

    sc query observiq-otel-collector
    

    The service should show as RUNNING.

Linux installation

  1. Open a terminal with root or sudo privileges.
  2. Run the following command:

    sudo sh -c "$(curl -fsSlL https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh)" install_unix.sh
    
  3. Wait for the installation to complete.

  4. Verify the installation by running:

    sudo systemctl status observiq-otel-collector
    

    The service should show as active (running).

Additional installation resources

For additional installation options and troubleshooting, see Bindplane agent installation guide.

Configure the Bindplane agent to ingest syslog and send to Google SecOps

Locate the configuration file

  • Linux:

    sudo nano /etc/bindplane-agent/config.yaml
    
  • Windows:

    notepad "C:\Program Files\observIQ OpenTelemetry Collector\config.yaml"
    

Edit the configuration file

  • Replace the entire contents of config.yaml with the following configuration:

    receivers:
        udplog:
            listen_address: "0.0.0.0:514"
    
    exporters:
        chronicle/forescout_nac:
            compression: gzip
            creds_file_path: '/etc/bindplane-agent/ingestion-auth.json'
            customer_id: '<CUSTOMER_ID>'
            endpoint: malachiteingestion-pa.googleapis.com
            log_type: FORESCOUT_NAC
            raw_log_field: body
            ingestion_labels:
                env: production
    
    service:
        pipelines:
            logs/forescout_to_chronicle:
                receivers:
                    - udplog
                exporters:
                    - chronicle/forescout_nac
    

Configuration parameters

Replace the following placeholders:

  • Receiver configuration:

    • listen_address: IP address and port to listen on. Use 0.0.0.0 to listen on all interfaces. Port 514 is standard for syslog (requires root privileges on Linux; use 1514 for non-root).
  • Exporter configuration:

    • creds_file_path: Full path to the Google SecOps ingestion authentication file.
      • Linux: /etc/bindplane-agent/ingestion-auth.json
      • Windows: C:\Program Files\observIQ OpenTelemetry Collector\ingestion-auth.json
    • <CUSTOMER_ID>: Google SecOps customer ID.
    • endpoint: Regional endpoint URL:
      • US: malachiteingestion-pa.googleapis.com
      • Europe: europe-malachiteingestion-pa.googleapis.com
      • Asia: asia-southeast1-malachiteingestion-pa.googleapis.com
      • See Regional Endpoints for the complete list.

Save the configuration file

  • After editing, save the file:
    • Linux: Press Ctrl+O, then Enter, then Ctrl+X
    • Windows: Click File > Save

Restart the Bindplane agent to apply the changes

  • To restart the Bindplane agent in Linux, run the following command:

    sudo systemctl restart observiq-otel-collector
    
    1. Verify the service is running:

      sudo systemctl status observiq-otel-collector
      
    2. Check logs for errors:

      sudo journalctl -u observiq-otel-collector -f
      
  • To restart the Bindplane agent in Windows, choose one of the following options:

    • Command Prompt or PowerShell as administrator:

      net stop observiq-otel-collector && net start observiq-otel-collector
      
    • Services console:

    1. Press Win+R, type services.msc, and press Enter.
    2. Locate observIQ OpenTelemetry Collector.
    3. Right-click and select Restart.
    4. Verify the service is running:

      sc query observiq-otel-collector
      
    5. Check logs for errors:

      type "C:\Program Files\observIQ OpenTelemetry Collector\log\collector.log"
      

Configure Forescout eyeSight syslog forwarding

  1. Sign in to the Forescout Console with an administrator account.
  2. Go to Tools > Options.
  3. In the Options tree, expand Modules > Syslog (or Syslog Plugin depending on version).
  4. Click Add to create a new syslog target.
  5. Provide the following configuration details:
    • Name: Enter a descriptive name (for example, SecOps-Bindplane).
    • Server Address: Enter the IP address of the Bindplane agent host (for example, 192.168.1.100).
    • Port: Enter 514 (or the port configured in the Bindplane agent).
    • Protocol: Select UDP.
    • Format: Select CEF (Common Event Format) or Syslog (RFC 3164) depending on your parsing requirements.
    • Facility: Select LOCAL0 (or the facility matching your organization's syslog policy).
    • Severity: Select Informational or the desired minimum severity level.
  6. In the Event Types section, select the log categories to forward:
    • Host Property Changes: Device classification and property updates.
    • Policy Violations: Compliance policy violations and NAC enforcement actions.
    • Network Access Events: Endpoint connection and disconnection events.
    • Authentication Events: 802.1X and user authentication events.
    • Action Results: Results of remediation and response actions.
  7. Click OK to save the syslog target configuration.
  8. Click Apply to activate the changes.
  9. Verify syslog messages are being received by checking the Bindplane agent logs.

UDM mapping table

Log Field UDM Mapping Logic
about about Merged
deviceNtDomain about.administrative_domain Renamed/mapped
deviceExternalId about.asset.asset_id Directly mapped
device_product about.asset.asset_id Directly mapped
device_vendor about.asset.asset_id Directly mapped
fileHash about.file.full_path Directly mapped
filePath about.file.full_path Renamed/mapped
_hash about.file.sha256 Renamed/mapped
fileHash about.file.sha256 Renamed/mapped
fsize about.file.size Renamed/mapped
dvchost about.hostname Renamed/mapped
ips about.ip Merged
dvcmac about.mac Merged
mac_address about.mac Merged
deviceTranslatedAddress about.nat_ip Merged
Emne about.process.command_line Directly mapped
Path about.process.command_line Directly mapped
Subject about.process.command_line Directly mapped
deviceProcessName about.process.command_line Renamed/mapped
dvcpid about.process.pid Renamed/mapped
permissions about.resource.attribute.permissions Merged
Assigned_hosts_label additional.fields Merged
Available_memory_label additional.fields Merged
Available_swap_label additional.fields Merged
Connected_clients_label additional.fields Merged
EM_connection_status_label additional.fields Merged
Engine_status_label additional.fields Merged
Installed_Plugins_label additional.fields Merged
Used_memory_label additional.fields Merged
Used_swap_label additional.fields Merged
additional_cfp1 additional.fields Merged
additional_cfp2 additional.fields Merged
additional_cfp3 additional.fields Merged
additional_cfp4 additional.fields Merged
additional_cn1 additional.fields Merged
additional_cn2 additional.fields Merged
additional_cn3 additional.fields Merged
additional_cs1 additional.fields Merged
additional_cs2 additional.fields Merged
additional_cs3 additional.fields Merged
additional_cs4 additional.fields Merged
additional_cs5 additional.fields Merged
additional_cs6 additional.fields Merged
additional_cs7 additional.fields Merged
additional_devicePayloadId additional.fields Merged
additional_eventId additional.fields Merged
additional_flexString1 additional.fields Merged
additional_fname additional.fields Merged
application_status_label additional.fields Merged
cpu_usage_label additional.fields Merged
cs5_label additional.fields Merged
type_label additional.fields Merged
intermediary intermediary Merged
iporhost intermediary.asset.hostname Directly mapped
middle_ip intermediary.asset.ip Merged
iporhost intermediary.hostname Directly mapped
middle_ip intermediary.ip Merged
pid intermediary.process.pid Directly mapped
desc metadata.description Directly mapped
event_type metadata.description Directly mapped
msg metadata.description Renamed/mapped
device_event_class_id metadata.product_event_type Directly mapped
engineName metadata.product_event_type Directly mapped
event_name metadata.product_event_type Directly mapped
eventtype metadata.product_event_type Directly mapped
externalId metadata.product_log_id Directly mapped
device_product metadata.product_name Directly mapped
product metadata.product_name Directly mapped
device_version metadata.product_version Directly mapped
device_vendor metadata.vendor_name Renamed/mapped
vendor_name metadata.vendor_name Directly mapped
app_protocol_output network.application_protocol Directly mapped
mail_from network.email.from Directly mapped
mail_subject network.email.subject Merged
mail_to network.email.to Merged
requestMethod network.http.method Renamed/mapped
requestClientApplication network.http.user_agent Renamed/mapped
ip_protocol_out network.ip_protocol Directly mapped
protocol network.ip_protocol Directly mapped
protocol1 network.ip_protocol Directly mapped
in network.received_bytes Renamed/mapped
out network.sent_bytes Renamed/mapped
session_id network.session_id Directly mapped
sntdom principal.administrative_domain Renamed/mapped
sourceServiceName principal.application Renamed/mapped
Host principal.asset.hostname Directly mapped
Hostname principal.asset.hostname Directly mapped
Source principal.asset.hostname Directly mapped
Source_1 principal.asset.hostname Directly mapped
host_ip principal.asset.ip Merged
source_ip principal.asset.ip Merged
src_ip principal.asset.ip Merged
Group_name principal.group.group_display_name Directly mapped
Gruppenavn principal.group.group_display_name Directly mapped
Device_name principal.hostname Directly mapped
Enhetsnavn principal.hostname Directly mapped
Host principal.hostname Directly mapped
Hostname principal.hostname Directly mapped
Source principal.hostname Directly mapped
Source_1 principal.hostname Directly mapped
shost principal.hostname Renamed/mapped
host_ip principal.ip Merged
principal_ip principal.ip Merged
shost principal.ip Merged
source_ip principal.ip Merged
src_ip principal.ip Merged
MAC principal.mac Merged
mac principal.mac Merged
mac_addr principal.mac Merged
src_mac principal.mac Merged
sourceTranslatedAddress principal.nat_ip Merged
sourceTranslatedPort principal.nat_port Renamed/mapped
source_port principal.port Renamed/mapped
spt principal.port Renamed/mapped
src_port principal.port Directly mapped
command principal.process.command_line Directly mapped
sproc principal.process.command_line Renamed/mapped
spid principal.process.pid Renamed/mapped
resource principal.resource.name Directly mapped
principal_role principal.user.attribute.roles Merged
suser principal.user.user_display_name Directly mapped
User principal.user.userid Directly mapped
suid principal.user.userid Renamed/mapped
user_id principal.user.userid Directly mapped
user_name principal.user.userid Directly mapped
username principal.user.userid Directly mapped
sec_result security_result Merged
security_result security_result Merged
res_label security_result.about.resource.attribute.labels Merged
_action security_result.action Merged
sec_action security_result.action Merged
security_result_action security_result.action Merged
Action_Taken security_result.action_details Directly mapped
act security_result.action_details Directly mapped
cat security_result.category_details Merged
Category security_result.description Directly mapped
Reason security_result.description Directly mapped
Scan_Type security_result.description Directly mapped
Type security_result.description Directly mapped
act security_result.description Directly mapped
description security_result.description Directly mapped
details security_result.description Directly mapped
et_lower security_result.description Directly mapped
event_type security_result.description Directly mapped
kv_data security_result.description Directly mapped
msg_data_2 security_result.description Directly mapped
policy_details security_result.description Directly mapped
rnmsg security_result.description Directly mapped
infection_channel_label security_result.detection_fields Merged
operasjon_label security_result.detection_fields Merged
operation_label security_result.detection_fields Merged
permission_label security_result.detection_fields Merged
protocol_label security_result.detection_fields Merged
spyware_Grayware_Type_label security_result.detection_fields Merged
threat_probability_label security_result.detection_fields Merged
tillatelse_label security_result.detection_fields Merged
Rule security_result.rule_id Directly mapped
alart_id security_result.rule_id Directly mapped
device_event_class_id security_result.rule_id Directly mapped
Match security_result.rule_name Directly mapped
mwProfile security_result.rule_name Directly mapped
severity security_result.severity_details Directly mapped
Result security_result.summary Directly mapped
appcategory security_result.summary Directly mapped
event_name security_result.summary Directly mapped
event_type security_result.summary Directly mapped
log_description security_result.summary Directly mapped
reason security_result.summary Renamed/mapped
Spyware security_result.threat_name Directly mapped
Unknown_Threat security_result.threat_name Directly mapped
Virus_Malware_Name security_result.threat_name Directly mapped
threat security_result.threat_name Directly mapped
oldFilePath src.file.full_path Renamed/mapped
oldFileSize src.file.size Renamed/mapped
old_permissions src.resource.attribute.permissions Merged
dntdom target.administrative_domain Renamed/mapped
destinationServiceName target.application Renamed/mapped
Destination target.asset.hostname Directly mapped
Target target.asset.hostname Directly mapped
Target_1 target.asset.hostname Directly mapped
computer_name target.asset.hostname Directly mapped
Destination target.asset.ip Merged
dest_ip target.asset.ip Merged
destination_ip target.asset.ip Merged
target_ip target.asset.ip Merged
Destination target.hostname Directly mapped
Target target.hostname Directly mapped
Target_1 target.hostname Directly mapped
computer_name target.hostname Directly mapped
temp_dhost target.hostname Directly mapped
Destination target.ip Merged
IPv6_Address target.ip Merged
dest_ip target.ip Merged
destination_ip target.ip Merged
dst_ip target.ip Merged
target_ip target.ip Merged
dest_mac target.mac Merged
mac_address target.mac Merged
destination_translated_address target.nat_ip Merged
destinationTranslatedPort target.nat_port Renamed/mapped
dest_port target.port Directly mapped
dpt target.port Renamed/mapped
port target.port Renamed/mapped
dproc target.process.command_line Renamed/mapped
File_name target.process.file.full_path Directly mapped
Infected_Resource target.process.file.full_path Directly mapped
Object target.process.file.full_path Directly mapped
Objekt target.process.file.full_path Directly mapped
dpid target.process.pid Renamed/mapped
resource_Type_label target.resource.attribute.labels Merged
request target.url Directly mapped
target_role target.user.attribute.roles Merged
CustomerName target.user.user_display_name Directly mapped
temp_duser target.user.user_display_name Directly mapped
Bruker target.user.userid Directly mapped
User_value target.user.userid Directly mapped
temp_duid target.user.userid Directly mapped
username target.user.userid Directly mapped
N/A about Constant: about
N/A about.ip Constant: ips
N/A about.mac Constant: mac_address
N/A about.nat_ip Constant: deviceTranslatedAddress
N/A about.resource.attribute.permissions Constant: permissions
N/A additional.fields Constant: additional_eventId
N/A extensions.auth.type Constant: MACHINE
N/A intermediary Constant: intermediary
N/A intermediary.asset.ip Constant: middle_ip
N/A intermediary.ip Constant: middle_ip
N/A metadata.event_type Constant: USER_LOGIN
N/A metadata.product_name Constant: FORESCOUT NAC
N/A metadata.vendor_name Constant: FORESCOUT
N/A network.direction Constant: INBOUND
N/A network.email.subject Constant: mail_subject
N/A network.email.to Constant: mail_to
N/A principal.asset.ip Constant: source_ip
N/A principal.ip Constant: principal_ip
N/A principal.mac Constant: mac
N/A principal.nat_ip Constant: sourceTranslatedAddress
N/A principal.user.attribute.roles Constant: principal_role
N/A security_result Constant: security_result
N/A security_result.about.resource.attribute.labels Constant: res_label
N/A security_result.action Constant: _action
N/A security_result.alert_state Constant: ALERTING
N/A security_result.category_details Constant: cat
N/A security_result.detection_fields Constant: operation_label
N/A security_result.rule_name Constant: Virtual Firewall blocking
N/A security_result.severity Constant: LOW
N/A src.resource.attribute.permissions Constant: old_permissions
N/A target.asset.ip Constant: target_ip
N/A target.ip Constant: dst_ip
N/A target.mac Constant: mac_address
N/A target.nat_ip Constant: destination_translated_address
N/A target.resource.attribute.labels Constant: resource_Type_label
N/A target.user.attribute.roles Constant: target_role

Need more help? Get answers from Community members and Google SecOps professionals.