Configuring DSMs
17
C
YBER
-A
RK
V
AULT
The SIEM Cyber-Ark Vault DSM accepts events using the Log Enhanced Event
Protocol (LEEF). SIEM records both user activities and safe activities from the
Cyber-Ark Vault in the audit log events. Cyber-Ark Vault integrates with SIEM to
forward audit logs using syslog to create a complete audit picture of privileged
account activities in SIEM. Before configuring a Cyber-Ark Vault device in SIEM,
you must configure your device to send events to SIEM.
To integrate the device with SIEM:
Step 1
Log in to the Cyber-Ark device.
Step 2
Open the file DBParm.ini.
Step 3
Configure the following parameters:
•
SyslogServerIP
- Type the IP address of SIEM.
•
SyslogServerPort
- Type the UDP port used to connect to SIEM. The default
value is 514.
•
SyslogMessageCodeFilter
- Configure which message codes are sent from
the Cyber-Ark Vault to SIEM. You can define specific message numbers or a
range of numbers. By default, all message codes are sent for user activities and
safe activities.
For example, to define a message code of 1,2,3,30 and 5-10, you must type:
1,2,3,5-10,30
.
•
SyslogTranslatorFile
- Type the file path to the LEEF.xsl translator file. The
translator file is used to parse Cyber-Ark audit records data in the syslog
protocol.
Step 4
Copy LEEF.xsl to the location specified by the SyslogTranslatorFile parameter in
the DBParm.ini file.
Step 5
You are now ready to configure the log source in SIEM.
To configure SIEM to receive events from a Cyber-Ark Vault device:
From the Log Source Type drop-down list box, select
Cyber-Ark Vault
from
the
Log Source Type
option. For more information on configuring log
sources, see the
Log Sources User Guide
.
For more information on Cyber- Ark Vault, see your vendor documentation.
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......