Broadcom Symantec Endpoint Security Complete
About The Device
Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, and servers in your network against malware, risks, and vulnerabilities. Symantec Endpoint Protection combines virus protection with advanced threat protection to proactively secure your client computers against known and unknown threats, such as viruses, worms, Trojan horses, and adware. Symantec Endpoint Protection provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and spyware that mutates.
Device Information
 Entity | Particulars |
---|---|
Vendor Name | Broadcom (Previously as Symantec) |
Product Name | Symantec Endpoint Security Complete (Older Name: SEP 15/SEP Cloud) |
Type of Device | Cloud |
Collection Method
Log Type | Â Ingestion label | Preferred Logging Protocol - Format | Log Collection Method | Data Source |
---|---|---|---|---|
 Symantec Event export | SYMANTEC_EVENT_EXPORT | JSON | C2C | https://cloud.google.com/chronicle/docs/reference/feed-management-api#symantec-event-export |
Device Configuration
Events can be streamed to cloud storage data buckets. You can add or edit a Data Bucket stream type to stream and export events into the cloud storage buckets.
Log in the cloud console
Navigate to Integration > Event Stream
Click Add if you want to add a new event stream. Else, select an existing event stream in the grid and edit the fields in the event stream details flyout.
In the Add Event Stream, select Data Bucket as the Stream Type.
Type a Name for the event stream that you are configuring for the cloud storage.
In Data Bucket, configure the following options:
Field | Description |
---|---|
Bucket | Type the bucket name that you have already created for your cloud storage. |
Provider | Select a cloud platform from the options provided:
|
Region | Type the region of the data center where your cloud storage account is created. |
Bucket State | Enable the event stream to initiate streaming of events into your selected cloud storage bucket. |
Directory | Type the directory location of your cloud storage bucket where the events are stored in the files. |
Log Rotation | Set the Time and Size as per your organizations retention policy |
Type the KEY and SECRET, the unique identifiers of your storage accounts on the cloud platforms.
These identifiers are used to authorize Symantec Endpoint Security to stream events into the cloud storages.
The unique identifier is known by different names for the cloud platforms that are listed in the PROVIDER drop-down menu.
Refer to this KB for details on configuring the cloud platforms.
Uncheck the COMPRESSION checkbox.
In the Query Filter section, search and filter the event type_ids from the EVENT TYPE ID list to include the corresponding events in the event stream.
If the event type_ids that you selected are already selected and queried by other streams, you must enable the event stream that you are creating to continue streaming of events with no data loss.
Keep OCSF schema unchecked.
Click Test Connection to verify that the connection with the cloud storage account is established.
Click Create.
Streaming into data buckets is not supported for tenants of the India data center.
Â
Integration Parameters
AWS
S3:
Parameter Display Name | Default Value | Description |
---|---|---|
REGION | N/A | Select the region of your S3 bucket |
S3 URI | N/A | The S3 URI to ingest. (It will be a combination of S3 bucket name and prefix. Eg- S3://<S3 bucket name>/<prefix>) |
URI IS A | N/A | The type of file indicated by the URI. Valid values are:
|
SOURCE DELETION OPTION | N/A | Whether to delete source files after they have been transferred to Chronicle. This reduces storage costs. Valid values are:
|
ACCESS KEY ID | N/A | This is the 20 character ID associated with your Amazon IAM account. |
SECRET ACCESS KEY | N/A | This is the 40 character access key associated with your Amazon IAM account. |
ASSET NAMESPACE | N/A | To assign an asset namespace to all events that are ingested from a particular feed, set the |
SQS:
Parameter Display Name | Default Value | Description |
---|---|---|
REGION | N/A | Select the region of your S3 bucket |
QUEUE NAME | N/A | The SQS queue name. |
ACCOUNT NUMBER | N/A | The account number for the SQS queue and S3 bucket. |
QUEUE ACCESS KEY ID | N/A | This is the 20 character ID associated with your Amazon IAM account. |
QUEUE SECRET ACCESS KEY | N/A | This is the 40 character access key associated with your Amazon IAM account. |
SOURCE DELETION OPTION | N/A | Whether to delete source files after they have been transferred to Chronicle. This reduces storage costs. Valid values are:
|
S3 BUCKET ACCESS KEY ID | N/A | This is the 20 character ID associated with your Amazon IAM account. Only specify if using a different access key for the S3 bucket. |
S3 BUCKET SECRET ACCESS KEY | N/A | This is the 40 character access key associated with your Amazon IAM account. Only specify if using a different access key for the S3 bucket. |
ASSET NAMESPACE | N/A | To assign an asset namespace to all events that are ingested from a particular feed, set the |
AZURE:
Parameter Display Name | Default Value | Description |
---|---|---|
AZURE URI | N/A | The URI pointing to a Azure Blob Storage blob or container. Container names are |
URI IS A | Directory which includes subdirectories | The type of object indicated by the URI. Valid values are:
|
SOURCE DELETION OPTION | Never delete files | Source file deletion is not supported in Azure. This field's value must be set to |
Shared Key OR SAS Token | Â | A shared key, a 512-bit random string in base64 encoding, authorized to access Azure Blob Storage. Required if not specifying an SAS Token. |
ASSET NAMESPACE | Â | To assign an asset namespace to all events that are ingested from a particular feed, set the |
Google:
Parameter Display Name | Default Value | Description |
---|---|---|
 STORAGE BUKCET URI |  N/A |  The URI which corresponds to the Google Cloud Storage bucket. The format is the same format used by |
URI IS A | N/A | The type of object indicated by
|
SOURCE DELETION OPTION | N/A | Whether to delete source files after they have been transferred to Google Security Operations. This reduces storage costs. Valid values are:
|
Â
About Accenture:
Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent and innovation led company with 738,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with strong ecosystem relationships. We combine our strength in technology with unmatched industry experience, functional expertise and global delivery capability. We are uniquely able to deliver tangible outcomes because of our broad range of services, solutions and assets across Strategy & Consulting, Technology, Operations, Industry X and Accenture Song. These capabilities, together with our culture of shared success and commitment to creating 360° value, enable us to help our clients succeed and build trusted, lasting relationships. We measure our success by the 360° value we create for our clients, each other, our shareholders, partners and communities. Visit us at www.accenture.com.
About Accenture Security
Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.
Legal notice: Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. This document is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals.