Documentation Center
AlienVault® USM Anywhere™

Sophos Enterprise Console

When you configure Sophos Enterprise Console (SEC) to send log data to USM Anywhere, you can use the Sophos Enterprise Console plugin to translate the raw log data into normalized events for analysis.

Device Details
Vendor Sophos
Device Type Endpoint Security
Connection Type Syslog

Integrating Sophos Enterprise Console

Before you configure the Sophos Enterprise Console integration, you must have the IP Address of the USM Anywhere Sensor.

You must download and install the Sophos Reporting Log Writer to complete this task. Follow the instructions in the Sophos Reporting Log Writer user guide to download and install the Log Writer.

The Sophos Enterprise Console plugin leverages NXLog to send data to USM Anywhere. Therefore, you must also install NXLog on your Sophos Enterprise Console.

To configure NXLog to send log data to USM Anywhere

Plugin Enablement

For plugin enablement information, see Manual Plugin Management.

Available Plugin Fields

The following plugin fields are important attributes extracted from the syslog message. The USM Anywhere reports use these fields, and you can also reference them when creating custom reports. In addition to reporting, the USM Anywhere correlation rules make use of these fields.

  • audit_reason

  • customfield_0

  • customfield_11

  • customfield_12

  • customfield_13

  • customfield_8

  • customheader_0

  • customheader_11

  • customheader_12

  • customheader_13

  • customheader_8

  • device_event_category

  • event_action

  • event_category

  • event_name

  • event_subcategory

  • file_path

  • malware_family

  • malware_variant

  • operating_system

  • rep_device_rule_id

  • rep_device_type

  • request_referrer

  • security_group_name

  • source_address

  • source_hostname

  • source_ntdomain

  • source_username


For troubleshooting, refer to the vendor documentation: