Step 3. Configuring Kaspersky CyberTrace for interaction with ArcSight

This section describes how to configure Kaspersky CyberTrace for interaction with ArcSight during normal work.

To configure Kaspersky CyberTrace for interaction with ArcSight:

  1. Open Kaspersky CyberTrace Web.
  2. Go to the SettingsGeneral page.
  3. In the Incoming events section, select the IP address and port that Kaspersky CyberTrace Service listens on for incoming events. The IP address and port are set when ArcSight Forwarding Connector is installed (its default value is 127.0.0.1:9999).
  4. Go to the SettingsEvent sources page.
  5. Click the Pencil icon. (Edit) button next to the Default event source.

    The Edit event source "{{sourceId}}" window opens.

  6. On the Normalization rules tab:
    • In the To replace field, enter the character sequence \=
    • In the Replace with field, enter the character =

    After you make the changes, the Normalization rules tab must look like the following:

    Normalization rules tab.

    Normalization rules tab

  7. Select the Regular expressions tab. This tab contains universal regular expressions that match URLs (with protocol), hashes, IP addresses (src and dst), device name, vendor name, device IP address, user name, and event ID. Change these regular expressions to match the events.
  8. Close the Edit event source "{{sourceId}}" window.
  9. On the SettingsService alerts page, in the Format of service alerts field, enter the following string:

    CEF:0|Kaspersky|Kaspersky CyberTrace for ArcSight|2.0|1|CyberTrace Service Event|4| reason=%Alert% msg=%RecordContext%

  10. On the SettingsDetection alerts page, in the Alert format field, specify the following string:

    CEF:0|Kaspersky|Kaspersky CyberTrace for ArcSight|2.0|2|CyberTrace Detection Event|8| reason=%Category% dst=%DST_IP% src=%DeviceIp% fileHash=%RE_HASH% request=%RE_URL% sourceServiceName=%Device% sproc=%Product% suser=%UserName% msg=CyberTrace detected %Category% externalId=%Id% %ActionableFields% cs5Label=MatchedIndicator cs5=%MatchedIndicator% cn3Label=Confidence cn3=%Confidence% cs6Label=Context cs6=%RecordContext%

ArcSight and actionable fields

The following actionable fields are used in Kaspersky Data Feeds. You can review the actionable fields on the SettingsFeeds page.

Clearing ArcSight fields occupied by information from Kaspersky Data Feeds

If you want to use a CEF field for data other than information from Kaspersky Data Feeds, you must clear this field.

To clear a CEF field:

  1. Select the Settings tab of Kaspersky CyberTrace Web.
  2. Go to the Feeds page.
  3. Make sure the Kaspersky tab is selected, and then click the Kaspersky Threat Data Feed that contains the field that you want to clear.
  4. In the Actionable fields section, find the Output field name containing the name of the CEF field that you want to clear.
  5. Click the delete icon (Trash icon.) next to the Output field name that you found in the previous step.
Page top