- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Supported OS
ESET Protect - Overview
ESET Protect - Filtered Websites Events
ESET Protect - Threat Events
ESET Protect - Firewall Events
ESET Protect - Audit Events
ESET Protect is a central management platform for ESET security solutions, allowing users to manage security across various devices and platforms from one console. Using the ESET Protect Web Console, you can deploy ESET Solutions, manage tasks, enforce security policies, monitor system status, and quickly respond to problems or detections on remote computers.
This integration enriches and ingests the following logs:
After it collects the logs, ESET Protect channels them into Datadog for analysis. Using the built-in logs pipeline, these logs are parsed and enriched, allowing for effortless search and analysis. The integration provides insights into ESET Protect logs through out-of-the-box dashboards and includes ready-to-use Cloud SIEM detection rules for improved monitoring and security.
To install the ESET Protect integration, run the following Agent installation command. Afterward, follow the steps in the configuration section to set up log collection. For more information, see the Integration Management documentation.
Note: This step is not necessary for Agent version >= 7.68.0.
Linux command:
sudo -u dd-agent -- datadog-agent integration install datadog-eset-protect==1.0.0
Collecting logs is disabled by default in the Datadog Agent. Enable it in the datadog.yaml
file:
logs_enabled: true
Add this configuration block to your eset_protect.d/conf.yaml
file to start collecting your ESET Protect logs.
logs:
- type: tcp/udp
port: <PORT>
source: eset-protect
For available configuration options, see the sample eset_protect.d/conf.yaml. Choose the appropriate protocol (either TCP or UDP) based on your ESET Protect syslog forwarding configuration.
Note: Do not change the source values, as this parameter is integral to the pipeline’s operation.
Run the Agent’s status subcommand and look for eset_protect
under the Checks section.
The ESET Protect integration collects Threat_Event
, FirewallAggregated_Event
, FilteredWebsites_Event
, and Audit_Event
logs.
The ESET Protect integration does not include any metrics.
The ESET Protect integration does not include any events.
If you see a Permission denied error while port binding in the Agent logs, see the following instructions:
Binding to a port number under 1024 requires elevated permissions. Grant access to the port using the setcap
command:
Grant access to the port using the setcap
command:
sudo setcap CAP_NET_BIND_SERVICE=+ep /opt/datadog-agent/bin/agent/agent
Verify the setup is correct by running the getcap
command:
sudo getcap /opt/datadog-agent/bin/agent/agent
With the expected output:
/opt/datadog-agent/bin/agent/agent = cap_net_bind_service+ep
Note: Re-run this setcap
command every time you upgrade the Agent.
Make sure that traffic is bypassed from the configured port if the firewall is enabled.
If you see the Port <PORT-NO> Already in Use error, see the following instructions. The example below is for a PORT-NO value of 514:
On systems using Syslog, if the Agent listens for ESET Protect logs on port 514, the following error can appear in the Agent logs:
Can't start UDP forwarder on port 514: listen udp :514: bind: address already in use
.
By default, Syslog listens on port 514. To resolve this error, take one of the following steps:
Need help? Contact Datadog support.
ESET Protect - Overview
ESET Protect - Filtered Websites Events
ESET Protect - Threat Events
ESET Protect - Firewall Events
ESET Protect - Audit Events