Collect Forcepoint Mail Relay logs
This document explains how to ingest Forcepoint Mail Relay logs to Google Security Operations using Amazon S3.
Forcepoint Mail Relay is a cloud-based email security solution that protects organizations from email-borne threats including spam, phishing, malware, and data loss. The solution provides comprehensive email filtering, data loss prevention (DLP), encryption, and advanced threat protection for both inbound and outbound email traffic.
Before you begin
Make sure that you have the following prerequisites:
- A Google SecOps instance
- Privileged access to Forcepoint Mail Relay Cloudportal
- Privileged access to AWS(S3, IAM)
- Log Exportpermission enabled for your Forcepoint administrator account
Configure Forcepoint Mail Relay Cloud SIEM storage
To configure Forcepoint Mail Relay Cloud to export logs to your AWS S3 bucket, do the following:
-
Create one or more AWS S3 buckets on the AWS portal.
-
Sign in to the Forcepoint Cloud Security Gateway Portal.
-
Go to Account > SIEM Storage.
-
In the Storage typesection, select the Bring your own storageradio button.
-
Click Addto add your bucket to the Storage List: Bring Your Owntable.
-
In the Add Bucketdialog, enter the following:
- Bucket name: Enter the bucket name from the AWS portal (for example,
forcepoint-email-logs). - Prefix(optional): Enter a prefix to organize log files. Use
/to create a folder (for example,email-logs/). If no/is included, the prefix is prepended to the filename.
- Bucket name: Enter the bucket name from the AWS portal (for example,
-
Click Save. The bucket information is added to the table.
-
In the Storage List: Bring Your Owntable, click the JSONlink in the row for the bucket you just added.
-
On the Bucket Policypage, click Copy Textto copy the contents of the JSON pane to a clipboard.
-
In the AWS Management Console, open the S3service.
-
Select your bucket (for example,
forcepoint-email-logs). -
Go to Permissions > Bucket policy.
-
Click Edit.
-
Paste the JSON policy copied from the Forcepoint portal.
-
Click Save changes.
-
Return to the Forcepoint portal SIEM Storagepage.
-
In the Storage List: Bring Your Owntable, click Check connectionfor your bucket.
-
After the connection test succeeds, select the Activeradio button for your bucket in the Storage List: Bring Your Owntable.
-
Click Saveat the bottom of the page.
Enable SIEM logging and configure export format
- In the Forcepoint portal, go to Reporting > Account Reports > SIEM Integration.
- From the Data typelist, select Email Security.
-
Set the Enable data exporttoggle to ON.
-
From the Attributessection on the left, drag the following attributes into the Columnssection:
- Direction
- From: Address
- Policy
- Recipient Address
- Recipient Domain
- Sender Domain
- Sender Name
- Subject
- Action
- Black/Whitelisted
- Blocked Attachment Ext
- Filtering Reason
- Sender IP
- Sender IP Country
- Attachment File Type
- Attachment Filename
- Emb. URL Risk Class
- Emb. URL Severity
- Advanced Encryption
- File Sandbox status
- Virus Name
- Date & Time
- Message Size
- Spam score
- Attachment Size
-
Click Save.
Configure AWS S3 bucket and IAM for Google SecOps
-
Create Amazon S3 bucketfollowing this user guide: Creating a bucket
-
Save bucket Nameand Regionfor future reference (for example,
forcepoint-email-logs). -
Create a Userfollowing this user guide: Creating an IAM user .
-
Select the created User.
-
Select Security credentialstab.
-
Click Create Access Keyin section Access Keys.
-
Select Third-party serviceas Use case.
-
Click Next.
-
Optional: Add description tag.
-
Click Create access key.
-
Click Download .csv fileto save the Access Keyand Secret Access Keyfor future reference.
-
Click Done.
-
Select Permissionstab.
-
Click Add permissionsin section Permissions policies.
-
Select Add permissions.
-
Select Attach policies directly.
-
Search for AmazonS3FullAccesspolicy.
-
Select the policy.
-
Click Next.
-
Click Add permissions.
Configure a feed in Google SecOps to ingest Forcepoint Mail Relay logs
- Go to SIEM Settings > Feeds.
- Click Add New Feed.
- On the next page, click Configure a single feed.
- Enter a unique name for the Feed name.
- Select Amazon S3 V2as the Source type.
- Select Forcepoint Mail Relayas the Log type.
- Click Nextand then click Submit.
-
Specify values for the following fields:
- S3 URI:
s3://forcepoint-email-logs/email-logs/. - Source deletion option: Select the deletion option according to your preference.
- Maximum File Age: Include files modified in the last number of days (default is 180 days).
- Access Key ID: User access key with access to the S3 bucket.
- Secret Access Key: User secret key with access to the S3 bucket.
- Asset namespace: The asset namespace .
- Ingestion labels: The label to be applied to the events from this feed.
- S3 URI:
-
Click Nextand then click Submit.
UDM mapping table
| Log field | UDM mapping | Logic |
|---|---|---|
| |
hybridSpamScore_label.key | Set to "hybridSpamScore" |
|
hybridSpamScore
|
hybridSpamScore_label.value | Value copied directly |
| |
localSpamScore_label.key | Set to "localSpamScore" |
|
localSpamScore
|
localSpamScore_label.value | Value copied directly |
| |
metadata.event_type | Set to "GENERIC_EVENT" initially; set to "EMAIL_TRANSACTION" if has_network_email is true; else set to "NETWORK_CONNECTION" if has_principal and has_target are true; else set to "STATUS_UPDATE" if has_principal is true; else "GENERIC_EVENT" |
|
product_event_type
|
metadata.product_event_type | Value copied directly |
| |
metadata.product_name | Set to "FORCEPOINT_MAIL_RELAY" |
| |
metadata.vendor_name | Set to "FORCEPOINT_MAIL_RELAY" |
|
sender
|
network.email.from | Value copied directly |
|
subject
|
network.email.subject | Value copied directly |
|
recipient
|
network.email.to | Value copied directly |
|
identHostName
|
principal.asset.hostname | Value copied directly |
|
identSrc, trueSrc, src
|
principal.asset.ip | Value from src if not empty, else trueSrc if not empty, else identSrc |
|
identHostName
|
principal.hostname | Value copied directly |
|
identSrc, trueSrc, src
|
principal.ip | Value from src if not empty, else trueSrc if not empty, else identSrc |
|
sender
|
principal.user.email_addresses | Value copied directly |
|
summary
|
security_result.action | Set to "ALLOW" if summary matches (?i)clean |
|
act
|
security_result.action_details | Value copied directly |
|
hybridSpamScore_label, localSpamScore_label
|
security_result.detection_fields | Merged from hybridSpamScore_label and localSpamScore_label |
|
summary
|
security_result.summary | Value copied directly |
|
dst
|
target.asset.ip | Value copied directly |
|
dst
|
target.ip | Value copied directly |
|
recipient
|
target.user.email_addresses | Value copied directly |
Need more help? Get answers from Community members and Google SecOps professionals.

