Broadcom Symantec Endpoint Security Complete

About The Device

Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, and servers in your network against malware, risks, and vulnerabilities. Symantec Endpoint Protection combines virus protection with advanced threat protection to proactively secure your client computers against known and unknown threats, such as viruses, worms, Trojan horses, and adware. Symantec Endpoint Protection provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and spyware that mutates.

Device Information

 Entity

Particulars

 Entity

Particulars

Vendor Name

Broadcom (Previously as Symantec)

Product Name

Symantec Endpoint Security Complete (Older Name: SEP 15/SEP Cloud)

Type of Device

Cloud

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log Collection Method

Data Source

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log Collection Method

Data Source

 Symantec Event export

SYMANTEC_EVENT_EXPORT

JSON

C2C

https://cloud.google.com/chronicle/docs/reference/feed-management-api#symantec-event-export

Device Configuration

Events can be streamed to cloud storage data buckets. You can add or edit a Data Bucket stream type to stream and export events into the cloud storage buckets.

  1. Log in the cloud console

  2. Navigate to Integration > Event Stream

  3. Click Add if you want to add a new event stream. Else, select an existing event stream in the grid and edit the fields in the event stream details flyout.

  4. In the Add Event Stream, select Data Bucket as the Stream Type.

  5. Type a Name for the event stream that you are configuring for the cloud storage.

  6. In Data Bucket, configure the following options:

Field

Description

Field

Description

Bucket

Type the bucket name that you have already created for your cloud storage. 

Provider

Select a cloud platform from the options provided:

  • Amazon S3

  • Google Cloud Storage

  • Microsoft Azure Storage

Region

Type the region of the data center where your cloud storage account is created.

Bucket State

Enable the event stream to initiate streaming of events into your selected cloud storage bucket.

Directory

Type the directory location of your cloud storage bucket where the events are stored in the files.

Log Rotation

Set the Time and Size as per your organizations retention policy

  1. Type the KEY and SECRET, the unique identifiers of your storage accounts on the cloud platforms.

    These identifiers are used to authorize Symantec Endpoint Security to stream events into the cloud storages.

    The unique identifier is known by different names for the cloud platforms that are listed in the PROVIDER drop-down menu.

Refer to this KB for details on configuring the cloud platforms.

  1. Uncheck the COMPRESSION checkbox.

  2. In the Query Filter section, search and filter the event type_ids from the EVENT TYPE ID list to include the corresponding events in the event stream.

If the event type_ids that you selected are already selected and queried by other streams, you must enable the event stream that you are creating to continue streaming of events with no data loss.

  1. Keep OCSF schema unchecked.

  2. Click Test Connection to verify that the connection with the cloud storage account is established.

  3. Click Create.

Streaming into data buckets is not supported for tenants of the India data center.

 

Integration Parameters

AWS

S3:

Parameter Display Name

Default Value

Description

Parameter Display Name

Default Value

Description

REGION

N/A

Select the region of your S3 bucket

S3 URI

N/A

The S3 URI to ingest. (It will be a combination of S3 bucket name and prefix. Eg- S3://<S3 bucket name>/<prefix>)

URI IS A

N/A

The type of file indicated by the URI. Valid values are:

  • FILES: The URI points to a single file which will be ingested with each execution of the feed.

  • FOLDERS: The URI points to a directory. All files contained within the directory will be ingested with each execution of the feed.

  • FOLDERS_RECURSIVE: The URI points to a directory. All files and directories contained within the indicated directory will be ingested, including all files and directories within those directories, and so on.

SOURCE DELETION OPTION

N/A

Whether to delete source files after they have been transferred to Chronicle. This reduces storage costs. Valid values are:

  • SOURCE_DELETION_NEVER: Never delete files from the source.

  • SOURCE_DELETION_ON_SUCCESS:Delete files and empty directories from the source after successful ingestion.

  • SOURCE_DELETION_ON_SUCCESS_FILES_ONLY:Delete files from the source after successful ingestion.

ACCESS KEY ID

N/A

This is the 20 character ID associated with your Amazon IAM account.

SECRET ACCESS KEY

N/A

This is the 40 character access key associated with your Amazon IAM account.

ASSET NAMESPACE

N/A

To assign an asset namespace to all events that are ingested from a particular feed, set the "namespace" field within details. The namespace field is a string.

SQS:

Parameter Display Name

Default Value

Description

Parameter Display Name

Default Value

Description

REGION

N/A

Select the region of your S3 bucket

QUEUE NAME

N/A

The SQS queue name.

ACCOUNT NUMBER

N/A

The account number for the SQS queue and S3 bucket.

QUEUE ACCESS KEY ID

N/A

This is the 20 character ID associated with your Amazon IAM account.

QUEUE SECRET ACCESS KEY

N/A

This is the 40 character access key associated with your Amazon IAM account.

SOURCE DELETION OPTION

N/A

Whether to delete source files after they have been transferred to Chronicle. This reduces storage costs. Valid values are:

  • SOURCE_DELETION_NEVER: Never delete files from the source.

  • SOURCE_DELETION_ON_SUCCESS:Delete files and empty directories from the source after successful ingestion.

  • SOURCE_DELETION_ON_SUCCESS_FILES_ONLY:Delete files from the source after successful ingestion.

S3 BUCKET ACCESS KEY ID

N/A

This is the 20 character ID associated with your Amazon IAM account. Only specify if using a different access key for the S3 bucket.

S3 BUCKET SECRET ACCESS KEY

N/A

This is the 40 character access key associated with your Amazon IAM account. Only specify if using a different access key for the S3 bucket.

ASSET NAMESPACE

N/A

To assign an asset namespace to all events that are ingested from a particular feed, set the "namespace" field within details. The namespace field is a string.

AZURE:

Parameter Display Name

Default Value

Description

Parameter Display Name

Default Value

Description

AZURE URI

N/A

The URI pointing to a Azure Blob Storage blob or container. Container names are insights-logs-signinlogs , insights-logs-auditlogs & RiskyUsers

URI IS A

Directory which includes subdirectories

The type of object indicated by the URI. Valid values are:

  • FILES: The URI points to a single blob that will be ingested with each execution of the feed.

  • FOLDERS_RECURSIVE: The URI points to a Blob Storage container.

SOURCE DELETION OPTION

Never delete files

Source file deletion is not supported in Azure. This field's value must be set to SOURCE_DELETION_NEVER.

Shared Key OR SAS Token

 

A shared key, a 512-bit random string in base64 encoding, authorized to access Azure Blob Storage. Required if not specifying an SAS Token.
OR
A Shared Access Signature authorized to access the Azure Blob Storage container.

ASSET NAMESPACE

 

To assign an asset namespace to all events that are ingested from a particular feed, set the "namespace" field within details. The namespace field is a string.

Google:

Parameter Display Name

Default Value

Description

Parameter Display Name

Default Value

Description

 STORAGE BUKCET URI

 N/A

 The URI which corresponds to the Google Cloud Storage bucket. The format is the same format used by gsutil to specify a resource.

URI IS A

N/A

The type of object indicated by bucketUri. Valid values are:

  • FILES: The URI points to a single file which will be ingested with each execution of the feed.

  • FOLDERS: The URI points to a directory. All files contained within the directory will be ingested with each execution of the feed.

  • FOLDERS_RECURSIVE: The URI points to a directory. All files and directories contains within the indicated directory will be ingested, including all files and directories within those directories, and so on.

SOURCE DELETION OPTION

N/A

Whether to delete source files after they have been transferred to Google Security Operations. This reduces storage costs. Valid values are:

  • SOURCE_DELETION_NEVER: Never delete files from the source.

  • SOURCE_DELETION_ON_SUCCESS:Delete files and empty directories from the source after successful ingestion.

  • SOURCE_DELETION_ON_SUCCESS_FILES_ONLY:Delete files from the source after successful ingestion.

 

About Accenture:
Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent and innovation led company with 738,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with strong ecosystem relationships. We combine our strength in technology with unmatched industry experience, functional expertise and global delivery capability. We are uniquely able to deliver tangible outcomes because of our broad range of services, solutions and assets across Strategy & Consulting, Technology, Operations, Industry X and Accenture Song. These capabilities, together with our culture of shared success and commitment to creating 360° value, enable us to help our clients succeed and build trusted, lasting relationships. We measure our success by the 360° value we create for our clients, each other, our shareholders, partners and communities. Visit us at www.accenture.com.

About Accenture Security
Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.

Legal notice: Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. This document is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals.