Collect Symantec CloudSOC CASB logs
This document explains how to ingest Symantec CloudSOC CASB logs to Google Security Operations using the Bindplane agent.
Symantec CloudSOC is a cloud access security broker (CASB) that generates syslog messages for cloud application activity, DLP policy violations, threat detections, content inspection results, and user access events. The parser extracts fields from JSON-formatted and syslog-formatted logs and maps them to the Unified Data Model (UDM).
Before you begin
Make sure you have the following prerequisites:
- A Google SecOps instance
- Windows Server 2016 or later, or Linux host with
systemd - Network connectivity between the Bindplane agent and the Symantec CloudSOC host
- If running behind a proxy, ensure firewall ports are open per the Bindplane agent requirements
- Administrative access to the Symantec CloudSOC host
Get Google SecOps ingestion authentication file
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Collection Agents.
- Download the Ingestion Authentication File.
Save the file securely on the system where Bindplane will be installed.
Get Google SecOps customer ID
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Profile.
Copy and save the Customer ID from the Organization Details section.
Install the Bindplane agent
Install the Bindplane agent on your Windows or Linux operating system according to the following instructions.
Windows installation
- Open Command Prompt or PowerShell as an administrator.
Run the following command:
msiexec /i "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" /quietWait for the installation to complete.
Verify the installation by running:
sc query observiq-otel-collectorThe service should show as RUNNING.
Linux installation
- Open a terminal with root or sudo privileges.
Run the following command:
sudo sh -c "$(curl -fsSlL https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh)" install_unix.shWait for the installation to complete.
Verify the installation by running:
sudo systemctl status observiq-otel-collectorThe service should show as active (running).
Additional installation resources
For additional installation options and troubleshooting, see the Bindplane agent installation guide.
Configure the Bindplane agent to ingest syslog and send to Google SecOps
Locate the configuration file
Linux:
sudo nano /opt/observiq-otel-collector/config.yamlWindows:
notepad "C:\Program Files\observIQ OpenTelemetry Collector\config.yaml"
Edit the configuration file
Replace the entire contents of
config.yamlwith the following configuration:receivers: udplog: listen_address: "0.0.0.0:514" exporters: chronicle/symantec_casb: compression: gzip creds_file_path: '/etc/bindplane-agent/ingestion-auth.json' customer_id: '<customer_id>' endpoint: malachiteingestion-pa.googleapis.com log_type: SYMANTEC_CASB raw_log_field: body service: pipelines: logs/symantec_casb_to_chronicle: receivers: - udplog exporters: - chronicle/symantec_casb
Configuration parameters
Replace the following placeholders:
Receiver configuration:
listen_address: IP address and port to listen on:0.0.0.0to listen on all interfaces (recommended)- Port
514is the standard syslog port (requires root on Linux; use1514for non-root)
Exporter configuration:
creds_file_path: Full path to ingestion authentication file:- Linux:
/etc/bindplane-agent/ingestion-auth.json - Windows:
C:\Program Files\observIQ OpenTelemetry Collector\ingestion-auth.json
- Linux:
customer_id: Customer ID copied from the Google SecOps consoleendpoint: Regional endpoint URL:- US:
malachiteingestion-pa.googleapis.com - Europe:
europe-malachiteingestion-pa.googleapis.com - Asia:
asia-southeast1-malachiteingestion-pa.googleapis.com - See Regional Endpoints for complete list
- US:
Save the configuration file
- After editing, save the file:
- Linux: Press
Ctrl+O, thenEnter, thenCtrl+X - Windows: Click File > Save
- Linux: Press
Restart the Bindplane agent to apply the changes
To restart the Bindplane agent in Linux, run the following command:
sudo systemctl restart observiq-otel-collectorVerify the service is running:
sudo systemctl status observiq-otel-collectorCheck logs for errors:
sudo journalctl -u observiq-otel-collector -f
To restart the Bindplane agent in Windows, choose one of the following options:
Command Prompt or PowerShell as administrator:
net stop observiq-otel-collector && net start observiq-otel-collectorServices console:
- Press
Win+R, typeservices.msc, and press Enter. - Locate observIQ OpenTelemetry Collector.
- Right-click and select Restart.
Verify the service is running:
sc query observiq-otel-collectorCheck logs for errors:
type "C:\Program Files\observIQ OpenTelemetry Collector\log\collector.log"
- Press
Configure syslog in Symantec CloudSOC CASB
- Sign in to your Symantec CloudSOC host.
Run the following command to identify which logger the system uses:
ls -d /etc/*syslog*Go to the corresponding section, according to the response:
- syslog.conf: Legacy Syslog.
- syslog-ng.conf: Syslog-ng.
Legacy syslog configuration
Open the
syslogdfile, typically located in/etc/defaultdirectory:vi /etc/default/syslogdMake sure
SYSLOGDvalue contains the-rflag:SYSLOGD="-r"Save the file and exit the editor.
Open
servicesfile, typically located in the/etcdirectory:vi /etc/servicesEdit the port value for syslog service:
syslog 514/udpSave the file and exit the editor.
Open the
syslog.conffile, typically located in the/etcdirectory:vi /etc/syslog.confUpdate the configuration to forward all logs to the Bindplane agent:
*.* @<BINDPLANE_IP>- Replace
<BINDPLANE_IP>with the Bindplane agent IP address.
- Replace
Open the
hostsfile, typically located in the/etcdirectory:vi /etc/hostsCreate a local DNS entry for the Bindplane agent:
<BINDPLANE_IP> bindplane_agent_hostSave the file and exit the editor.
Restart the syslog daemon service.
Syslog-ng configuration
Open the
syslog-ng.conffile, typically located in the/etcdirectory:vi /etc/syslog-ng.confAdd the following code to the end of the file:
destination d_bindplane { udp("<BINDPLANE_IP>" port(514)); }; log { source(s_src); destination(d_bindplane); };- Replace
<BINDPLANE_IP>with the Bindplane agent IP address.
- Replace
Open the
hostsfile, typically located in the/etcdirectory:vi /etc/hostsCreate a local DNS entry for the Bindplane agent:
<BINDPLANE_IP> bindplane_agent_hostSave the file and exit the editor.
Restart the syslog-ng daemon service.
UDM mapping table
| Log Field | UDM Mapping | Logic |
|---|---|---|
_domain |
target.hostname |
The value of the _domain field |
_domain |
target.asset.hostname |
The value of the _domain field |
_id |
metadata.product_log_id |
The value of the _id field |
actions_taken |
security_result.detection_fields[].value |
The value of the actions_taken field. Key is dynamically generated as Action_ + index. |
activity_type |
metadata.product_event_type |
The value of the activity_type field if product_data.activity_type is empty, or the value of product_data.activity_type if it's not empty. |
collector_device_ip |
principal.ip |
The value of the collector_device_ip field, if not Unknown IP. |
collector_device_ip |
principal.asset.ip |
The value of the collector_device_ip field, if not Unknown IP. |
collector_device_name |
principal.hostname |
The value of the collector_device_name field. |
collector_device_name |
principal.asset.hostname |
The value of the collector_device_name field. |
content_checks.dlp.raw_response.contentdetails[].contentBlockId |
security_result.detection_fields[].value |
The value of content_checks.dlp.raw_response.contentdetails[].contentBlockId. Key is dynamically generated as contentBlockId_ + index. |
content_checks.dlp.raw_response.contentdetails[].topLevelFileType |
security_result.detection_fields[].value |
The value of content_checks.dlp.raw_response.contentdetails[].topLevelFileType. Key is dynamically generated as topLevelFileType_ + index. |
content_checks.dlp.raw_response.requestid |
security_result.detection_fields[].value |
The value of content_checks.dlp.raw_response.requestid. Key is Request ID. |
content_checks.dlp.raw_response.responseaction |
security_result.detection_fields[].value |
The value of content_checks.dlp.raw_response.responseaction. Key is Response Action. |
content_checks.dlp.raw_response.violation[].name |
security_result.detection_fields[].value |
The value of content_checks.dlp.raw_response.violation[].name. Key is dynamically generated as Violation_Policy_Name_ + index. |
content_checks.dlp.raw_response.violation[].policyId |
security_result.detection_fields[].value |
The value of content_checks.dlp.raw_response.violation[].policyId. Key is dynamically generated as Violation_Policy_ID_ + index. |
content_checks.dlp.updated_timestamp |
additional.fields[].value.string_value |
The value of content_checks.dlp.updated_timestamp. Key is Updated TimeStamp. |
content_checks.filename |
target.file.full_path |
The value of content_checks.filename. |
content_checks.mimetype |
target.file.mime_type |
The value of content_checks.mimetype. |
content_checks.risktype_list[] |
security_result.detection_fields[].value |
The value of content_checks.risktype_list[]. Key is dynamically generated as RiskType_ + index. |
content_checks.vba_macros.expressions[].values[].key |
security_result.detection_fields[].key |
The value of content_checks.vba_macros.expressions[].values[].key concatenated with indexes. |
content_checks.vba_macros.expressions[].values[].value |
security_result.detection_fields[].value |
The value of content_checks.vba_macros.expressions[].values[].value. |
content_checks.vk_content_iq_violations[] |
security_result.detection_fields[].value |
The value of content_checks.vk_content_iq_violations[]. Key is dynamically generated as content_violation_ + index. |
content_checks.vk_dlp_policy_violations[] |
security_result.detection_fields[].value |
The value of content_checks.vk_dlp_policy_violations[]. Key is dynamically generated as dlp_policy_violation_ + index. |
content_checks.vk_encryption |
security_result.detection_fields[].value |
The value of content_checks.vk_encryption. Key is vk_encryption. |
content_checks.vk_glba |
security_result.detection_fields[].value |
The value of content_checks.vk_glba. Key is vk_glba. |
content_checks.vk_hipaa |
security_result.detection_fields[].value |
The value of content_checks.vk_hipaa. Key is vk_hipaa. |
content_checks.vk_pci |
security_result.detection_fields[].value |
The value of content_checks.vk_pci. Key is vk_pci. |
content_checks.vk_pii |
security_result.detection_fields[].value |
The value of content_checks.vk_pii. Key is vk_pii. |
content_checks.vk_source_code |
security_result.detection_fields[].value |
The value of content_checks.vk_source_code. Key is vk_source_code. |
content_checks.vk_vba_macros |
security_result.detection_fields[].value |
The value of content_checks.vk_vba_macros. Key is vk_vba_macros. |
content_checks.vk_virus |
security_result.detection_fields[].value |
The value of content_checks.vk_virus. Key is vk_virus. |
content_checks.violations |
security_result.detection_fields[].value |
The value of content_checks.violations. Key is violations. |
created_timestamp |
additional.fields[].value.string_value |
The value of created_timestamp. Key is Created TimeStamp. |
date |
metadata.event_timestamp.seconds |
Epoch seconds extracted from the date field. |
device_ip |
target.ip |
The value of the device_ip field, if not Unknown IP. |
device_ip |
target.asset.ip |
The value of the device_ip field, if not Unknown IP. |
file_size |
target.file.size |
The value of file_size or product_data.file_size if the former is empty. Converted to unsigned integer. |
file_url |
target.file.full_path |
The value of product_data.file_url. |
group_name |
target.group.group_display_name |
The display name extracted from the group_name field. |
hosts[] |
principal.ip |
The values of the hosts field, split by comma. |
inserted_timestamp |
additional.fields[].value.string_value |
The value of inserted_timestamp. Key is Inserted TimeStamp. |
instance |
principal.hostname |
The first value of the instance field if it's an array, or the value of the instance field if it's a string. |
instance |
principal.asset.hostname |
The first value of the instance field if it's an array, or the value of the instance field if it's a string. |
ioi_code |
security_result.summary |
The value of the ioi_code field. |
_latency |
security_result.detection_fields[].value |
The value of the _latency field. Key is Latency. |
locations |
security_result.detection_fields[].value |
The value of the locations field. Key is Locations. |
log_name |
intermediary.asset.asset_id |
The log ID extracted from the log_name field, prefixed with logid:. |
mailbox_owner |
target.user.userid |
The value of product_data.mailbox owner. |
metadata.log_type |
metadata.log_type |
Hardcoded to SYMANTEC_CASB. |
metadata.product_name |
metadata.product_name |
Hardcoded to SYMANTEC_CASB. |
metadata.vendor_name |
metadata.vendor_name |
Hardcoded to SYMANTEC. |
msg |
metadata.description |
The value of the msg field or the message field if msg is not present. |
name |
security_result.detection_fields[].value |
The value of the name field. Key is Name. |
object_name |
security_result.detection_fields[].value |
The value of the object_name field. Key is Object Name. |
object_type |
target.resource.name |
The value of the object_type field. |
org_unit |
security_result.detection_fields[].value |
The value of the org_unit field. Key is org_unit ID. |
policy_action |
security_result.action_details |
The value of the policy_action field. |
policy_type |
security_result.detection_fields[].value |
The value of the policy_type field. Key is policy_type. |
policy_violated |
security_result.detection_fields[].value |
The value of the policy_violated field. Key is policy_violated. |
product_data._domain |
target.hostname |
The value of product_data._domain. |
product_data._domain |
target.asset.hostname |
The value of product_data._domain. |
product_data.activity_type |
metadata.product_event_type |
The value of product_data.activity_type. |
product_data.file url |
target.file.full_path |
The value of product_data.file url. |
product_data.file_size |
target.file.size |
The value of product_data.file_size. |
product_data.group |
target.group.group_display_name |
The value of product_data.group. |
product_data.location |
principal.location.country_or_region |
The value of product_data.location. |
product_data.logon error |
security_result.summary |
The value of product_data.logon error. |
product_data.mailbox owner |
target.user.userid |
The value of product_data.mailbox owner. |
product_data.name |
target.file.full_path |
The value of product_data.name. |
product_data.object_name |
target.file.full_path |
The value of product_data.object_name. |
product_data.originatingserver product_data.service |
target.application |
The value of product_data.service. |
product_data.site url |
target.url |
The value of product_data.site url. |
product_data.target |
target.user.userid |
The value of product_data.target. |
product_data.useragent |
network.http.user_agent |
The value of product_data.useragent. |
product_name |
intermediary.application |
The value of the product_name field. |
product_uid |
metadata.product_name |
The value of the product_uid field. |
responsible_logs |
additional.fields[].value.string_value |
The value of the responsible_logs field. Key is responsible_logs. |
resource_id |
target.resource.product_object_id |
The value of the resource_id field. |
risks |
security_result.detection_fields[].value |
The value of the risks field. Key is Risks. |
security_result.action |
security_result.action |
Derived from product_data.logon error. Set to BLOCK if product_data.logon error is BlockedByConditionalAccess. |
security_result.severity |
security_result.severity |
The uppercase value of the severity field, if it's one of the supported severity levels. |
security_result.severity_details |
security_result.severity_details |
The value of the severity field, if it's not one of the supported severity levels. |
security_result.summary |
security_result.summary |
The value of the ioi_code field or product_data.logon error if ioi_code is not present. |
service |
target.application |
The value of the service field if product_data.service is empty. |
site_url |
target.url |
The value of product_data.site url. |
source |
principal.resource.attribute.labels[].value |
The value of the source field. Key is Source. |
sub_feature |
additional.fields[].value.string_value |
The value of the sub_feature field. Key is Sub Feature. |
target.application |
target.application |
Derived based on product_data.activity_type and presence of principal and target. |
target.resource.name |
target.resource.name |
Derived based on product_data.activity_type and presence of principal and target. |
threat_score |
security_result.detection_fields[].value |
The value of the threat_score field. Key is Threat Score. |
transaction_id |
security_result.detection_fields[].value |
The value of the transaction_id field. Key is Transaction ID. |
updated_timestamp |
additional.fields[].value.string_value |
The value of updated_timestamp or content_checks.dlp.updated_timestamp if the former is empty. Key is Updated TimeStamp. |
user |
principal.user.userid |
The value of the user field. |
user_email |
target.user.userid |
The value of the user_email field. |
user_mail |
target.user.userid |
The value of the user_mail field extracted from the msg field. |
user_name |
principal.user.user_display_name |
The value of the user_name field. |
user_uid |
principal.user.userid or target.user.userid |
The value of the user_uid field. Mapped to principal.user.userid if product_data.activity_type is not InvalidLogin or Login, otherwise mapped to target.user.userid. |
uuid |
intermediary.asset.product_object_id |
The value of the uuid field. |
version |
metadata.product_version |
The value of the version field. |
Need more help? Get answers from Community members and Google SecOps professionals.