- What is Discovered and Monitored
- Event Types
- Settings for Access Credentials
- Example Syslog
|Protocol||Information Discovered||Metrics Collected||Used For|
|Syslog||Network IPS alerts||Security Monitoring|
In ADMIN > Device Support > Event Types, search for "stonesoft" to see the event types associated with this device.
There are no predefined rules for this device.
There are no predefined reports for this device.
FortiSIEM processes events from this device via CEF formatted syslog sent by the device. Configure the device to send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
|Device Type||McAfee Stonesoft IPS|
|Access Protocol||See Access Credentials|
|Port||See Access Credentials|
|Password config||See Password Configuration|
<6>CEF:0|McAfee|IPS|5.4.3|70018|Connection_Allowed|0|spt=123 deviceExternalId=STP-NY-FOO01 node 1 dmac=84:B2:61:DC:E1:31 dst=188.8.131.52 cat=System Situations app=NTP (UDP) rt=Apr 08 2016 00:26:13 deviceFacility=Inspection act=Allow deviceOutboundInterface=Interface #5 deviceInboundInterface=Interface #4 proto=17 dpt=123 src=10.64.9.3 dvc=184.108.40.206 dvchost=220.127.116.11 smac=78:DA:6E:0D:FF:C0 cs1Label=RuleId cs1=2097152.6