Cbc-syslog

Latest version: v2.0.3

Safety actively analyzes 629503 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 2

1.0.1

Bug Fix

Removed the package fcntl and replaced it with the package psutils. This ensures multi-platform functionality for
the connector.

1.0.0

New Installation instructions

The Syslog Connector will now be moved to a pip install. Please see README.md for more information about the
installation instructions. The previous yum installation will be deprecated.

Back Up Directory Feature

In the configuration file, a Backup Directory location can now be added. This allows backup files to be stored
in the case that the Connector fails to send the data to Syslog.

Please see the following example:

backup_dir = /Users/jdoe/Documents/

> **Note**: These fields are not optional and must be present in the config file.

API Key

In the configuration file, a API Key is now available to be added. This will allow Audit Logs to be pulled from each
server in the configuration file.

Please see the following example:

[cbdefense1]
api_connector_id = GO5M953111
api_key = BYCRM7BRNSH0CXZR5V1Y3111

> **Note**: These fields are not optional and must be present in the config file. If no API Key is needed, please
leave the field blank as shown below:

[cbdefense1]
api_connector_id =
api_key =


Audit Logs

Audit Logs are now available to be pulled from the Syslog Connector. To set up the program to pull Audit Logs, please
see the API Key section above. When the Syslog Connector is executing, the program will grab the Audit Logs that have
been generated since the last time the Connector was run. The following file formats are compatible with Audit Logs:
CEF,LEEF, JSON

> **Note**: All events types will be pulled from the Syslog Connector. As of now, no additional filtering is
compatible for Audit Logs.


ThreatHunter

ThreatHunter notifications are now available to be pulled from the Syslog Connector. To set up the Connector to pull
ThreatHunter notifications you need to add the API Key as shown below in the configuration file:


[cbdefense1]
siem_connector_id = UEUWR4U111
siem_api_key = XNS5UKWZXZMCC3CYC7DFM111


The file formats that are compatible with ThreatHunter Notifications are: LEEF, CEF, JSON. Just like with Audit Logs, the
program will grab only the notifications that have been generated since the last time the Connector was run.

> **Note**: All events types will be pulled from the Syslog Connector. As of now, no additional filtering is
compatible for the ThreatHunter Notifications.

Page 2 of 2

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.