GithubHelp home page GithubHelp logo

itsi-sep's Introduction

Summary

The ITSI Content Pack for Symantec Endpoint Protection (SEP) from Kinney Group is specifically designed to monitor the health and performance of SEP across your network. It leverages Splunk ITSI to provide in-depth analysis and visualization of logs for SEP, ensuring that all endpoints are protected and compliant with security policies. This content pack is an essential tool for IT professionals looking to enhance the security and efficiency of their endpoint protection infrastructure.

  • Comprehensive Endpoint Protection Monitoring: Offers detailed insights into the protection status, virus definitions, and policy compliance of endpoints, ensuring optimal security.
  • Real-Time Threat Detection: Monitors and detects various types of threats, including viruses, malware, and spyware, enabling immediate response and mitigation.
  • Enhanced System Performance: Tracks the impact of SEP on system performance, including CPU and memory usage, to ensure that endpoint protection does not hinder system operations.

This ITSI Content Pack is open source and available for community collaboration and enhancement on GitHub.

For more information about Kinney Group's Splunk Products, visit our website.

Details

The ITSI Content Pack for Symantec Endpoint Protection (SEP) contains service definitions and KPIs ready to import to ITSI. The KPI Thresholds and importance values are set to defaults so that they can be tuned manually for your use case. This content pack helps users monitor the overall protection status of endpoints, ensuring that virus definitions are up-to-date, real-time protection is enabled, and security policies are complied with.

Kinney Group ITSI Content Pack Blog

For more information about Kinney Group's Splunk Products, visit our website.

Services

SEP monitoring encompasses several specialized services, each targeting specific aspects of endpoint protection:

  1. Endpoint Protection
    • Description: Manages the overall protection status of endpoints, including real-time protection, virus definitions, and policy compliance.
  2. Virus Definitions
    • Description: Ensures that all endpoints have the latest virus and spyware definitions.
  3. Real-Time Protection
    • Description: Monitors and ensures that real-time protection features like Auto-Protect are enabled and functioning.
  4. Policy Compliance
    • Description: Ensures that all endpoints comply with the defined security policies.
  5. Threat Detection
    • Description: Monitors and detects various types of threats, including viruses, malware, and spyware.
  6. System Performance
    • Description: Monitors the impact of Symantec Endpoint Protection on system performance, including CPU and memory usage.
  7. Network Activity
    • Description: Monitors network traffic related to Symantec Endpoint Protection, including blocked and allowed connections.

KPIs

Each service utilizes specific KPIs to measure its effectiveness:

  1. Definition Status
    • Description: Status of virus definition updates.
  2. Definition Age
    • Description: Age of the virus definitions on endpoints.
  3. Auto-Protect Status
    • Description: Status of Auto-Protect.
  4. Real-Time Enabled
    • Description: Check if real-time protection is enabled.
  5. Compliance Status
    • Description: Compliance status of endpoints with security policies.
  6. Non-Compliance Count
    • Description: Number of endpoints out of compliance.
  7. Detected Threats
    • Description: Number of detected threats.
  8. Threat Types
    • Description: Types of threats detected.
  9. Resolved Threats
    • Description: Number of resolved threats.
  10. CPU Usage
    • Description: CPU usage by SEP processes.
  11. Memory Usage
    • Description: Memory usage by SEP processes.
  12. Blocked Connections
    • Description: Number of blocked network connections.
  13. Allowed Connections
    • Description: Number of allowed network connections.

Relationships

Dependencies:

Services are interconnected; for instance, Endpoint Protection is dependent on Virus Definitions, Real-Time Protection, and Policy Compliance. Similarly, Virus Definitions rely on Update Distribution to ensure all endpoints receive the latest definitions.

Hierarchical Structure:

Some services form a hierarchy, such as Real-Time Protection depending on Threat Detection, illustrating a layered approach to protection where base metrics support broader security indicators.

Installation

Installation prerequisites:

Splunk Addon for Symantec

Splunk App for Content Packs

Splunk ITSI

Troubleshooting

Kinney Group ITSI Content Pack Blog

Github and Readme

[email protected]

Contact

To provide feedback, visit our Github and Readme for our content packs.

[email protected]

For more information about Kinney Group's Splunk Products, visit our website

Version History

Version Date Description
0.0.1 06/06/24 Initial Preview Release

Considerations:

Kinney Group ITSI Content Pack Blog

itsi-sep's People

Watchers

Chris Lee avatar  avatar Brian Clark avatar Matt Ondriezek avatar Steve Hunger avatar Brett Woodruff avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.