Hi Eduardo!
I hope you are doing fine!
To be sure about the Cylance configuration, it's possible check if events arrives to Wazuh Manager, look for some Cylance events into /var/ossec/logs/archive/archive.json, that file contains all raw data.
To enable
archive.json logs configure logall and logall_json into
/var/ossec/etc/ossec.conf manager side.
<ossec_config>
<global>
<alerts_log>yes</alerts_log>
<logall>yes</logall>
<logall_json>yes</logall_json>
</global>If there is not Cylance events in
archive.json file, events does not arrives to Manager, I could be a configuration issue.
Check remote configuration, should looks like following configuration:
<remote>
<connection>syslog</connection>
<port>514</port>
<protocol>tcp</protocol>
<allowed-ips> your cylance ip </allowed-ips>
</remote>I other hand, if events arrives to
archive.json file, it's possible check Decoders and Ruleset configured. Into manager side, run
/var/ossec/bin/wazuh-logtest, and paste a sample log, it should process as following lines.
Starting wazuh-logtest v4.4.0
Type one log per line
2021 Dec 23 16:11:23 wazuh->52.67.244.213 1 2021-12-23T16:11:18.488000Z sysloghost CylancePROTECT - - - Event Type: ExploitAttempt, Event Name: terminated, Device Name: XXXX, IP Address: (192.168.XXX.XXX), Action: Terminated, Process ID: 3356, Process Name: ImagePathNotFound, User Name: XXXXXXX, Violation Type: Remote Thread Creation, Zone Names: (XX), Device Id: bf084741-365a-4b32-8122-17550a331b2e, Policy Name: XXXXXXXX
**Phase 1: Completed pre-decoding.
full event: '2021 Dec 23 16:11:23 wazuh->52.67.244.213 1 2021-12-23T16:11:18.488000Z sysloghost CylancePROTECT - - - Event Type: ExploitAttempt, Event Name: terminated, Device Name: XXXX, IP Address: (192.168.XXX.XXX), Action: Terminated, Process ID: 3356, Process Name: ImagePathNotFound, User Name: XXXXXXX, Violation Type: Remote Thread Creation, Zone Names: (XX), Device Id: bf084741-365a-4b32-8122-17550a331b2e, Policy Name: XXXXXXXX'
timestamp: '2021 Dec 23 16:11:23'
**Phase 2: Completed decoding.
name: 'CylancePROTECT_2.0'
CylancePROTECT.Action: 'Terminated'
CylancePROTECT.Device.ID: 'bf084741-365a-4b32-8122-17550a331b2e'
CylancePROTECT.Device.Name: 'XXXX'
CylancePROTECT.Event.Name: 'terminated'
CylancePROTECT.Event.Type: 'ExploitAttempt'
CylancePROTECT.Policy.Name: 'XXXXXXXX'
CylancePROTECT.Process.ID: '3356'
CylancePROTECT.Process.Name: 'ImagePathNotFound'
CylancePROTECT.Username: 'XXXXXXX'
CylancePROTECT.Violation.Type: 'Remote Thread Creation'
CylancePROTECT.Zone.Names: 'XX'
**Phase 3: Completed filtering (rules).
id: '65702'
level: '6'
description: 'Cylance: Exploit Attempt was discovered within the ImagePathNotFound process. | Violation Type: Remote Thread Creation | User: XXXXXXX | Device Name: XXXX'
groups: '['CylancePROTECT_2.0gdpr_IV_35.7.d']'
firedtimes: '1'
mail: 'False'
**Alert to be generated.I hope it will help you, let me know if that works.
Regards!