<decoder name="cef_trend_micro">
<program_name>CEF</program_name>
<prematch>0\|Trend Micro\|</prematch>
</decoder>
<!--
May 6 16:49:14 DSM CEF: 0|Trend Micro|Deep Security Agent|11.0.308|3002831|Unix - Syslog|8|cn1=281 cn1Label=Host ID dvc=XXXX TrendMicroDsTenant=Primary TrendMicroDsTenantId=0 cs1=New group added to the system cs1Label=LI Description fname=/var/log/secure shost=XXX-XXX4 msg=May 6 16:49:14 XXXX-tXXX useradd[31802]: new group: name\=XXXXX_, GID\=1398
-->
<decoder name="cef_deep_security_agent">
<parent>cef_trend_micro</parent>
<prematch>Trend Micro\|Deep Security Agent\|</prematch>
<regex>^0\|Trend Micro\|(\.+)\|(\.+)\|\d+\|(\.+)\|\d+\|</regex>
<order>application,version,type</order>
</decoder>
<decoder name="cef_deep_security_agent">
<parent>cef_trend_micro</parent>
<regex>cn1=(\d+) cn1Label=Host ID </regex>
<order>hostID</order>
</decoder>
<decoder name="cef_deep_security_agent">
<parent>cef_trend_micro</parent>
<regex>dvc=(\.+) \w+=</regex>
<order>device</order>
</decoder>
<decoder name="cef_deep_security_agent">
<parent>cef_trend_micro</parent>
<regex>TrendMicroDsTenant=(\S+)</regex>
<order>tenant</order>
</decoder>
<decoder name="cef_deep_security_agent">
<parent>cef_trend_micro</parent>
<regex>TrendMicroDsTenantId=(\S+)</regex>
<order>tenantId</order>
</decoder>
<decoder name="cef_deep_security_agent">
<parent>cef_trend_micro</parent>
<regex>cs1=(\.+) cs1Label=LI Description </regex>
<order>desc</order>
</decoder>
<decoder name="cef_deep_security_agent">
<parent>cef_trend_micro</parent>
<regex>fname=(\S+) </regex>
<order>file_name</order>
</decoder>
<decoder name="cef_deep_security_agent">
<parent>cef_trend_micro</parent>
<regex>shost=(\S+)</regex>
<order>srchost</order>
</decoder>
<decoder name="cef_deep_security_agent">
<parent>cef_trend_micro</parent>
<regex>msg=(\.+)</regex>
<order>message</order>
</decoder>
<decoder name="cef_deep_security_manager">
<parent>cef_trend_micro</parent>
<prematch>Trend Micro\|Deep Security Manager\|</prematch>
<regex>^0\|Trend Micro\|(\.+)\|(\.+)\|\d+\|(\.+)\|\d+\|</regex>
<order>application,version,type</order>
</decoder>
<decoder name="cef_deep_security_manager">
<parent>cef_trend_micro</parent>
<regex>src=(\S+)</regex>
<order>hostID</order>
</decoder>
<decoder name="cef_deep_security_manager">
<parent>cef_trend_micro</parent>
<regex>suser=(\S+)</regex>
<order>device</order>
</decoder>
<decoder name="cef_deep_security_manager">
<parent>cef_trend_micro</parent>
<regex>target=(\.+) \w+=</regex>
<order>tenant</order>
</decoder>
<decoder name="cef_deep_security_manager">
<parent>cef_trend_micro</parent>
<regex>msg=(\.+) \w+=</regex>
<order>tenant</order>
</decoder>
<decoder name="cef_deep_security_manager">
<parent>cef_trend_micro</parent>
<regex>TrendMicroDsTenant=(\S+)</regex>
<order>tenant</order>
</decoder>
<decoder name="cef_deep_security_manager">
<parent>cef_trend_micro</parent>
<regex>TrendMicroDsTenantId=(\S+)</regex>
<order>tenantId</order>
</decoder>
<!--
Generic
May 6 16:49:14 DSM CEF: 0|Trend Micro|Deep Security Agent|11.0.308|3002831|Unix - Syslog|8| ...
-->
<decoder name="cef_trend_micro_generic">
<parent>cef_trend_micro</parent>
<regex>0\|Trend Micro\|(\.+)\|\.+\|\.+\|(\.+)\|\d+\|</regex>
<order>app,type</order>
</decoder>Hi,
The decoder sent above will work for these types of logs:
Apr 26 13:24:45 DSM CEF: 0|Trend Micro|Deep Security Manager|11.0.308|720|Policy Sent|3|src=X.X.X.X suser=System target=X.X.X.X (PP-XXX-XXX) msg=The policy (fingerprint 88:3B:28:7A:96:89:C9:93:60:13:C8:DA:86:EF:38:C2:2A:60:CA:6F) was successfully sent to the agent. TrendMicroDsTenant=Primary TrendMicroDsTenantId=0
Apr 26 13:24:46 DSM CEF: 0|Trend Micro|Deep Security Manager|11.0.308|252|Computer Updated|3|src=X.X.X.X suser=System target=X.X.X.X (XXX-XX-32-XX) msg=Description Omitted TrendMicroDsTenant=Primary TrendMicroDsTenantId=0
Apr 26 13:24:47 DSM CEF: 0|Trend Micro|Deep Security Manager|11.0.308|252|Computer Updated|3|src=X.X.X.X suser=System target=X.X.X.X (X.X.X.X ) msg=Description Omitted TrendMicroDsTenant=Primary TrendMicroDsTenantId=0
Apr 26 13:24:47 DSM CEF: 0|Trend Micro|Deep Security Manager|11.0.308|303|Computer Renamed|3|src=X.X.X.X suser=System target=X.X.X.X (X.X.X.X ) msg=An existing computer was renamed from 10.3.16.10 to 10.3.16.81 in DSM based on changes reported by the Agent/Appliance. TrendMicroDsTenant=Primary TrendMicroDsTenantId=0
Apr 26 13:24:47 DSM CEF: 0|Trend Micro|Deep Security Manager|11.0.308|735|Misconfiguration Detected|6|src=X.X.X.X suser=System target=X.X.X.X (X.X.X.X ) msg=An Agent/Appliance misconfiguration has been detected. The Agent/Appliance has been marked for update and will be updated during the next heartbeat. TrendMicroDsTenant=Primary TrendMicroDsTenantId=0
Apr 26 13:24:47 DSM CEF: 0|Trend Micro|Deep Security Manager|11.0.308|276|Update: Summary Information|3|src=X.X.X.X suser=System target=X.X.X.X (X.X.X.X ) msg=Description Omitted TrendMicroDsTenant=Primary TrendMicroDsTenantId=0
However, the log you sent is following another structure, so you will have to use other decoders. I have written some for the log you sent above, feel free to use them:
<decoder name="cef_trend_micro">
<prematch>^CEF</prematch>
</decoder>
<decoder name="cef_apex_child">
<parent>cef_trend_micro</parent>
<regex>^CEF:0\|Trend Micro\|(\.+)\|(\d+)\|(\.+)\|(\.+)\|(\d+)\|</regex>
<order>device_product, device_version, event_signature_id, event_name, severity</order>
</decoder>
<decoder name="cef_apex_child">
<parent>cef_trend_micro</parent>
<regex offset="after_regex">devicePayloadId=(\w+) rt=(\w+ \d+ \d+ \d\d:\d\d:\d\d \w+\p\d\d:\d\d) dvchost=(\w+) deviceFacility=(\.+) src=(\d+.\d+.\d+.\d+) TMCMLogDetectedIP=(\d+.\d+.\d+.\d+) TMCMLogDetectedHost=(\w+) </regex>
<order>device_payload_id, rt, dvchost, device_facility, src, tmcm_log_detected_ip, tmcm_log_detected_host</order>
</decoder>
<decoder name="cef_apex_child">
<parent>cef_trend_micro</parent>
<regex offset="after_regex">dst=(\d+.\d+.\d+.\d+) smac=(\S+) spt=(\d+) dmac=(\S+) dpt=(\d+) cn2Label=(\w+) cn2=(\d+) act=(\w+) deviceDirection=(\w+) cn3Label=(\w+) cn3=(\d+) cn4Label=(\w+) </regex>
<order>dst, smac, spt, dmac, dpt, cn2_label, cn2, act, device_direction, cn3_label, cn3, cn4_label</order>
</decoder>
<decoder name="cef_apex_child">
<parent>cef_trend_micro</parent>
<regex offset="after_regex">cn4=(\d+) proto=(\d+) cs2Label=(\w+) cs2=(\S+) cn1Label=(\w+) cn1=(\d+) cs1Label=(\S+) cs1=(\.+) cnt=(\d+) </regex>
<order>cn4, proto, cs2_label, cs2, cn1_label, cn1, cs1_label, cs1, cnt</order>
</decoder>
<decoder name="cef_apex_child">
<parent>cef_trend_micro</parent>
<regex offset="after_regex">ApexCentralHost=(\w+) deviceNtDomain=(\S+) dntdom=(\.+)</regex>
<order>apex_central_host, device_nt_domain, dntdom</order>
</decoder>
Here you can check the output:
CEF:0|Trend Micro|Apex Central|2019|Block|Intrusion Prevention|3|devicePayloadId=3100D81Xx765-B80511EC-B9A7-D439-A1FD rt=Apr 11 2022 14:56:23 GMT+04:00 dvchost=TMEPSRV deviceFacility=Apex One src=1.1.1.1 TMCMLogDetectedIP=1.1.1.1 TMCMLogDetectedHost=TestSRV dst=22.99.22.99 smac=22:22:22:22:22:22 spt=49157 dmac=11:11:11:11:11:11 dpt=60102 cn2Label=Mode cn2=0 act=Block deviceDirection=Inbound cn3Label=Priority cn3=100 cn4Label=Severity cn4=4 proto=10003 cs2Label=Application_Type cs2=N/A cn1Label=Rule cn1=0 cs1Label=Reason/Rule cs1=Invalid Flags cnt=1 ApexCentralHost=TM-AC deviceNtDomain=N/A dntdom=first OU\\OU1\\SubOU1\\
**Phase 1: Completed pre-decoding.
full event: 'CEF:0|Trend Micro|Apex Central|2019|Block|Intrusion Prevention|3|devicePayloadId=3100D81Xx765-B80511EC-B9A7-D439-A1FD rt=Apr 11 2022 14:56:23 GMT+04:00 dvchost=TMEPSRV deviceFacility=Apex One src=1.1.1.1 TMCMLogDetectedIP=1.1.1.1 TMCMLogDetectedHost=TestSRV dst=22.99.22.99 smac=22:22:22:22:22:22 spt=49157 dmac=11:11:11:11:11:11 dpt=60102 cn2Label=Mode cn2=0 act=Block deviceDirection=Inbound cn3Label=Priority cn3=100 cn4Label=Severity cn4=4 proto=10003 cs2Label=Application_Type cs2=N/A cn1Label=Rule cn1=0 cs1Label=Reason/Rule cs1=Invalid Flags cnt=1 ApexCentralHost=TM-AC deviceNtDomain=N/A dntdom=first OU\\OU1\\SubOU1\\'
**Phase 2: Completed decoding.
name: 'cef_trend_micro'
act: 'Block'
apex_central_host: 'TM-AC'
cn1: '0'
cn1_label: 'Rule'
cn2: '0'
cn2_label: 'Mode'
cn3: '100'
cn3_label: 'Priority'
cn4: '4'
cn4_label: 'Severity'
cnt: '1'
cs1: 'Invalid Flags'
cs1_label: 'Reason/Rule'
cs2: 'N/A'
cs2_label: 'Application_Type'
device_direction: 'Inbound'
device_facility: 'Apex One'
device_nt_domain: 'N/A'
device_payload_id: '3100D81Xx765-B80511EC-B9A7-D439-A1FD'
device_product: 'Apex Central'
device_version: '2019'
dmac: '11:11:11:11:11:11'
dntdom: 'first OU\\OU1\\SubOU1\\'
dpt: '60102'
dst: '22.99.22.99'
dvchost: 'TMEPSRV'
event_name: 'Intrusion Prevention'
event_signature_id: 'Block'
proto: '10003'
rt: 'Apr 11 2022 14:56:23 GMT+04:00'
severity: '3'
smac: '22:22:22:22:22:22'
spt: '49157'
src: '1.1.1.1'
tmcm_log_detected_host: 'TestSRV'
tmcm_log_detected_ip: '1.1.1.1'
Hope this was helpful. Let us know if you need anything else.
Regards,
Yana.