Symantec Endpoint Protection
Symantec Endpoint Protection - Overview
Symantec Endpoint Protection - Scan
Symantec Endpoint Protection - Risk
Symantec Endpoint Protection - Application Control
Symantec Endpoint Protection - Security
Symantec Endpoint Protection - System
Symantec Endpoint Protection - Traffic
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Overview
Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, and servers in your network against malware, risks, and vulnerabilities. Symantec Endpoint Protection combines virus protection with advanced threat protection to proactively secure your client computers against known and unknown threats, such as viruses, worms, Trojan horses, and adware. Symantec Endpoint Protection provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and spyware that mutates.
This integration enriches and ingests the following logs from Symantec Endpoint Protection:
- Audit logs: Record changes to policies such as policy updates, policy assignments, and more.
- Risk logs: Track and record potential security risks detected on endpoints, including malware, vulnerabilities, and suspicious activities.
- Scan logs: Record the results of antivirus scans, including detected malware, scan settings, and user information.
- System logs: Record all administrative activities, client activities, server activities and
client_server activities. - Security logs: Record security-related events, including attacks, compliance, and device control.
- Application control logs: Record events related to application control, such as blocked or allowed applications.
- Traffic logs: Record network traffic events, including incoming and outgoing connections, protocols, and ports.
You can also visualize detailed insights into the above-mentioned logs with the out-of-the-box dashboards. Once you’ve installed the integration, you can find the dashboards by searching for “symantec-endpoint-protection” in the dashboards list.
Minimum Agent version: 7.61.0
Setup
Installation
To install the Symantec Endpoint Protection integration, run the following Agent installation command and the steps below. For more information, see the Integration Management documentation.
Note: This step is not necessary for Agent version >= 7.52.0.
Linux command:
sudo -u dd-agent -- datadog-agent integration install datadog-symantec_endpoint_protection==1.0.0
Configuration
Log collection
Collecting logs is disabled by default in the Datadog Agent. Enable it in datadog.yaml:
Add this configuration block to your symantec_endpoint_protection.d/conf.yaml file to start collecting your Symantec Endpoint Protection logs.
See the sample symantec_endpoint_protection.d/conf.yaml for available configuration options.
logs:
- type: udp
port: <PORT>
service: symantec-endpoint-protection
source: symantec-endpoint-protection
Restart the Agent.
Configure Syslog Message Forwarding from Symantec Endpoint Protection Server:
- Log on to your Symantec Endpoint Protection Server.
- Click on Admin.
- Click on servers on the administrative panel.
- Select sites for which you want to forward logs.
- Click on Configure external logging.
- Enable Transmission of Logs to a Syslog Server.
- Provide your syslog server IP.
- Select network protocol as UDP.
- Provide the PORT where you want to forward logs.
Validation
Run the Agent’s status subcommand and look for symantec_endpoint_protection under the Checks section.
Data Collected
Logs
The Symantec Endpoint Protection integration collects audit, risk, scan, security, traffic, application control, and system logs.
Metrics
The Symantec Endpoint Protection integration does not include any metrics.
Events
The Symantec Endpoint Protection integration does not include any events.
Service Checks
The Symantec Endpoint Protection integration does not include any service checks.
Troubleshooting
Permission denied while port binding
If you see a Permission denied error while port binding in the Agent logs, see the following instructions:
Binding to a port number under 1024 requires elevated permissions. Grant access to the port using the setcap command:
Grant access to the port using the setcap command:
sudo setcap CAP_NET_BIND_SERVICE=+ep /opt/datadog-agent/bin/agent/agent
Verify the setup is correct by running the getcap command:
sudo getcap /opt/datadog-agent/bin/agent/agent
With the expected output:
/opt/datadog-agent/bin/agent/agent = cap_net_bind_service+ep
Note: Re-run this setcap command every time you upgrade the Agent.
Restart the Agent.
Data is not being collected
Make sure that traffic is bypassed from the configured port if the firewall is enabled.
Port already in use
If you see the Port <PORT-NO> Already in Use error, see the following instructions. The example below is for PORT-NO = 514:
On systems using Syslog, if the Agent listens for Cisco Secure Firewall logs on port 514, the following error can appear in the Agent logs: Can't start UDP forwarder on port 514: listen udp :514: bind: address already in use.
This error occurs because by default, Syslog listens on port 514. To resolve this error, take one of the following steps:
- Disable Syslog.
- Configure the Agent to listen on a different, available port.
Need help? Contact Datadog support.