
You can use Rsyslog for this purpose. You should follow the process below:
Deploy a Linux endpoint and deploy wazuh-agent on it.
Install rsyslog on your agent:
yum install rsyslog for RHEL.
apt-get install rsyslog for Ubuntu.
Configure ESET to send logs to Wazuh agent via Rsyslog
Configure rsyslog to forward logs received from ESET to a specific log file.
Edit the /etc/rsyslog.conf file and add TCP or UDP setting:
-For TCP:
$ModLoad imtcp
$InputTCPServerRun <PORT>
-For UDP
$ModLoad imudp
$UDPServerRun <PORT>
Then, add the following lines to forward events to a file:
# Storing Messages from a Remote System into a specific File
if $fromhost-ip startswith 'xxx.xxx.xxx.' then /var/log/<file_name.log>
& ~
Replace the xxx.xxx.xxx by the first three digits of the IP address of the network where ESET is deployed.
Configure the agent to read the syslog output file by editing /var/ossec/etc/ossec.conf:
<localfile>
<log_format>syslog</log_format>
<location>/var/log/<file_name.log></location>
</localfile>
Restart the rsyslog and wazuh-agent service:
systemctl restart rsyslog
systemctl restart wazuh-agent
Your agent will now receive the logs from ESET and send them to Wazuh manager via the logcollector.
You may need to create custom decoders and rules for your logs. You can find how to create custom rules and decoders in our documentation:
https://documentation.wazuh.com/current/user-manual/ruleset/ruleset-xml-syntax/decoders.html
https://documentation.wazuh.com/current/user-manual/ruleset/ruleset-xml-syntax/rules.html
I hope you find this helpful.
Please don't hesitate to ask may you need further assistance here.
