ESET Protect Integration
ESET PROTECT allows you to efficiently manage ESET products across workstations and servers within a networked environment, supporting up to 50,000 devices from a single centralized platform. Through the ESET PROTECT Web Console, you can seamlessly deploy ESET solutions, manage tasks, enforce security policies, monitor system health, and swiftly address any issues or threats on remote devices.
Data streams
The ESET PROTECT integration collects three types of logs: Detection, Device Task and Event.
Detection is used to retrieve detections via the ESET Connect - Incident Management.
Device Task is used to retrieve device tasks via the ESET Connect - Automation.
Event is used to retrieve Detection, Firewall, HIPS, Audit, and ESET Inspect logs using the Syslog Server.
Requirements:
- Elastic Agent must be installed
Setup
To collect data from ESET Connect, follow the below steps:
- Create API User Account (Refer to How to Create an API User Account below)
- Retrieve the username and password generated during the creation of an API user account.
- Retrieve the region from the ESET Web Console URL.
To collect data from ESET PROTECT via Syslog, follow the below steps:
- Follow the steps to configure syslog server (Refer to How to Configure Syslog Server).
- Set the format of the payload to JSON.
- Set the format of the envelope to Syslog.
- Set the minimal log level to Information to collect all data.
- Select all checkboxes to collect logs for all event types.
- Enter the IP Address or FQDN of the Elastic Agent that is running the integration in the Destination IP field.
How to Create an API User Account:
For ESET Business Account and ESET MSP Administrator 2
Follow the steps below to create the dedicated API user account:
- Log in as Superuser (or Root) to your ESET Business Account or ESET MSP Administrator 2.
- Navigate to User management and create a new user.
- Under the Access Rights section, enable the toggle next to Integrations.
- Click Create to apply the changes.
- The new user receives an invitation email and must finish the account activation process.
For ESET PROTECT Hub
Follow the steps below to create the dedicated API user account:
- Log in as a Superuser to your ESET PROTECT Hub account.
- Navigate to Users and add a new user.
- Under the Permissions section, enable the toggle next to Integrations.
- Click Next and then click Create to apply the changes.
- The new user receives an invitation email and must finish the account activation process.
How to Configure Syslog Server
If you have a Syslog server running in your network, you can Export logs to Syslog to receive certain events (Detection Event, Firewall Aggregated Event, HIPS Aggregated Event, etc.) from client computers running ESET Endpoint Security.
To enable the Syslog server:
- Click More > Settings > Syslog and click the toggle next to Enable Syslog sending.
- Specify the following mandatory settings:
- Format of payload: JSON, LEEF or CEF
- Format of envelope of the log: BSD (specification), Syslog (specification)
- Minimal log level: Information, Warning, Error or Critical
- Event type of logs: Select the type of logs you want to include (Antivirus, HIPS, Firewall, Web protection, Audit Log, Blocked files, ESET Inspect alerts).
- Destination IP or FQDN of TLS-compatible syslog server: IPv4 address or hostname of the destination for Syslog messages
- Validate CA Root certificates of TLS connections: Click the toggle to enable the certificate validation for the connection between your Syslog server and ESET PROTECT. After enabling the validation, a new text field will be displayed where you can copy and paste the required certificate chain. The server certificate must meet the following requirements:
- The whole certificate chain in PEM format is uploaded and saved in the Syslog export configuration (this includes root CA, as there are no built-in trusted certificates)
- Your Syslog server's certificate provides a Subject Alternative Name extension (DNS=/IP=), in which at least one record corresponds to the FQDN/IP hostname configuration.
You need the certification authority version 3 (and later) with the Basic Constraints certificate extension to pass the validation.
The validation of TLS connections applies only to the certificates. Disabling the validation does not affect the TLS settings of ESET PROTECT.
After making the applicable changes, click Apply settings. The configuration becomes effective in 10 minutes.
The regular application log file is constantly being written to. Syslog only serves as a medium to export certain asynchronous events, such as notifications or various client computer events.
No Comments