Collect Symantec Endpoint Protection logs

Supported in:

This document explains how to ingest Symantec Endpoint Protection logs to Google Security Operations using Bindplane. The parser processes logs in SYSLOG or KV format, first extracting timestamps from various formats within the log data. Then, it utilizes a separate configuration file ( sep_pt2.include ) to perform further parsing and structuring of the log events, ensuring successful processing only if the initial timestamp extraction is successful.

Before you begin

Ensure that you have the following prerequisites:

  • Google SecOps instance
  • Windows 2016 or later or Linux host with systemd
  • If running behind a proxy, firewall ports are open
  • Privileged access to the Symantec Endpoint Protection platform

Get Google SecOps ingestion authentication file

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Collection Agents.
  3. Download the Ingestion Authentication File. Save the file securely on the system where Bindplane will be installed.

Get Google SecOps customer ID

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Profile.
  3. Copy and save the Customer IDfrom the Organization Detailssection.

Install the Bindplane agent

The following sections describe how to install the Bindplane agent.

Windows installation

  1. Open the Command Promptor PowerShellas an administrator.
  2. Run the following command:

      msiexec 
      
     / 
     i 
      
     "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" 
      
     / 
     quiet 
     
    

Linux installation

  1. Open a terminal with root or sudo privileges.
  2. Run the following command:

     sudo  
    sh  
    -c  
     " 
     $( 
    curl  
    -fsSlL  
    https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh ) 
     " 
      
    install_unix.sh 
    

Additional installation resources

For additional installation options, consult the installation guide .

Configure the Bindplane agent to ingest syslog and send to Google SecOps

  1. Access the configuration file:
    • Locate the config.yaml file. Typically, it's in the /etc/bindplane-agent/ directory on Linux or in the installation directory on Windows.
    • Open the file using a text editor (for example, nano , vi , or Notepad).
  2. Edit the config.yaml file as follows:

      receivers 
     : 
      
     udplog 
     : 
      
     # Replace the port and IP address as required 
      
     listen_address 
     : 
      
     ` 
     0.0.0.0:514` 
     exporters 
     : 
      
     chronicle/chronicle_w_labels 
     : 
      
     compression 
     : 
      
     gzip 
      
     # Adjust the path to the credentials file you downloaded in Step 1 
      
     creds 
     : 
      
     '/path/to/ingestion-authentication-file.json' 
      
     # Replace with your actual customer ID from Step 2 
      
     customer_id 
     : 
      
    < customer_id 
    >  
     endpoint 
     : 
      
     malachiteingestion-pa.googleapis.com 
      
     # Add optional ingestion labels for better organization 
      
     ingestion_labels 
     : 
      
     log_type 
     : 
      
     'CES' 
      
     raw_log_field 
     : 
      
     body 
     service 
     : 
      
     pipelines 
     : 
      
     logs/source0__chronicle_w_labels-0 
     : 
      
     receivers 
     : 
      
     - 
      
     udplog 
      
     exporters 
     : 
      
     - 
      
     chronicle/chronicle_w_labels 
     
    
  3. Replace the port and IP address as required in your infrastructure.

  4. Replace <customer_id> with the actual customer ID.

  5. Update /path/to/ingestion-authentication-file.json to the path where the authentication file was saved in the Get Google SecOps ingestion authentication file section.

Restart the Bindplane agent to apply the changes

  • To restart the Bindplane agent in Linux, run the following command:

     sudo  
    systemctl  
    restart  
    bindplane-agent 
    
  • To restart the Bindplane agent in Windows, you can either use the Servicesconsole or enter the following command:

     net stop BindPlaneAgent && net start BindPlaneAgent 
    

Configure Syslog in Symantec Endpoint Protection

  1. Sign in to your Symantec Endpoint Protection Managerweb UI.
  2. Click the Adminicon.
  3. Locate the View Serverssection, and click Servers.
  4. Click Local Site > Configure External Logging.
  5. Select the Enable Transmission of Logs to a Syslog Servercheckbox.
  6. Provide the following configuration details:
    • Syslog Server: Enter the Bindplane IP address.
    • UDP Destination Port: Enter the Bindplane port number (for example, 514 for UDP).
    • Log Facility: Enter Local6.
    • Select the Audit Logscheckbox.
    • Select the Security Logscheckbox.
    • Select the Riskscheckbox.
  7. Click OK.

UDM mapping table

Log field UDM mapping Remark
_DB_HOST
target.hostname
a_record
network.dns.questions.type
AccessCheckResults
security_result.detection_fields
Accesses
security_result.detection_fields
AccessList
security_result.detection_fields
AccessMask
security_result.detection_fields
AccessReason
security_result.description
AccountName
target.user.user_display_name
AccountType
principal.user.attribute.roles
ACTION
security_result.detection_fields
ACTION_TYPE
security_result.action_details
ActiveProfile
target.resource.name
ActivityID
additional.fields
AdditionalInfo2
security_result.detection_fields
ADMIN_NAME
principal.user.userid
AGENT_SECURITY_LOG_IDX
metadata.product_log_id
AgentVer
additional.fields
Alert
security_result.detection_fields
ALERT_IDX
security_result.rule_id
ALERTDATETIME
security_result.first_discovered_time
ALERTENDDATETIME
security_result.last_discovered_time
ALERTINSERTTIME
security_result.detection_fields
AlgorithmName
security_result.detection_fields
Allowedapplicationreason
security_result.detection_fields
APP_NAME
target.application
app_name
principal.application
AppPoolID
target.application
AuthenticationPackageName
additional.fields
AuthenticationSetId
security_result.detection_fields
AuthenticationSetName
target.resource.name
BitlockerUserInputTime
additional.fields
BootMenuPolicy
additional.fields
BootType
additional.fields
BU
additional.fields
BugcheckString
additional.fields
CALLER_PROCESS_ID
principal.process.pid
CALLER_PROCESS_NAME
principal.process.file.full_path
callerReturnAddress
additional.fields
callerReturnModuleName
additional.fields
Caption
target.application
Category
security_result.category_details
Channel
security_result.about.resource.attribute.labels
CIDS_SIGN_SUB_ID
additional.fields
CLIENT_USER2
principal.user.userid
Comment
metadata.description
Component
security_result.detection_fields
connection.ether_type
security_result.about.labels
ConnectionSecurityRuleName
target.resource.name
ConnectionSecurityRuleId
security_result.detection_fields
CryptographicSetId
security_result.detection_fields
CryptographicSetName
target.resource.name
CSPEID
additional.fields
DCName
intermediary.hostname
Desc
metadata.description
DesiredAccess
security_result.detection_fields
device.last_app_connection
target.asset.last_discover_time
device.wss_feature
target.asset.attribute.labels
DeviceName
target.resource.name
DeviceNameLength
additional.fields
DeviceTime
additional.fields
DeviceVersionMajor
additional.fields
DeviceVersionMinor
additional.fields
disposition
security_result.detection_fields
dns_direction
security_result.detection_fields
domain
target.administrative_domain
Domain
principal.administrative_domain
DOMAIN_ID
target.resource.product_object_id
EDate
additional.fields
EDateUTC
metadata.event_timestamp
elevated_token
additional.fields
EntryCount
additional.fields
Error
security_result.description
error
security_result.detection_fields
ErrorCode
security_result.description
ErrorDescription
security_result.description
Event
metadata.description
EVENT_DATA
additional.fields
event_type
metadata.product_event_type
EventData.Binary
additional.fields
eventDesc
metadata.description
eventInsertTime
metadata.collected_timestamp
EventReceivedTime
metadata.collected_timestamp
EventTime
metadata.event_timestamp
EventType
metadata.product_event_type
ExceptionCode
security_result.detection_fields
executionPolicy
security_result.rule_name
ExecutionProcessID
principal.process.pid
ExecutionThreadID
principal.process.product_specific_process_id
ExtensionId
security_result.detection_fields
ExtensionName
target.resource.name
ExtraInfoLength
additional.fields
ExtraInfoString
additional.fields
FailureId
security_result.detection_fields
faulting_application_name
principal.process.file.names
faulting_application_path
principal.process.file.full_path
FaultingModuleName
additional.fields
FaultingModulePath
additional.fields
FaultOffset
additional.fields
FILE_SIZE
about.file.size
FilterID
security_result.detection_fields
FinalStatus
security_result.description
GPODisplayName
target.resource.name
GPOFileSystemPath
target.file.full_path
Group
principal.resource.attribute.labels
HACK_TYPE
security_result.category_details
HandleId
target.resource.attribute.labels
HID_LEVEL
additional.fields
HN
additional.fields
host
principal.hostname
Hostname
principal.hostname
id
metadata.product_log_id
IdleImplementation
additional.fields
IdleStateCount
additional.fields
ImpersonationLevel
additional.fields
IntensiveProtectionLevel
security_result.detection_fields
Interface
security_result.detection_fields
intermediary_host
intermediary.ip
intermediary.hostname
Maps to intermediary.ip if the value is an IP address. Maps to intermediary.hostname if the value is a hostname.
INTRUSION_PAYLOAD_URL
target.url
INTRUSION_URL
target.url
IP
principal.ip
IP_ADDR
src.ip
IpAddress
principal.ip
IpPort
principal.port
KERNEL
principal.platform_patch_level
KeyFilePath
target.file.full_path
KeyLength
additional.fields
KeyName
security_result.detection_fields
KeyType
security_result.detection_fields
lastUpdateTime
target.resource.attribute.last_update_time
LmPackageName
security_result.detection_fields
LoadOptions
additional.fields
LogonGuid
network.session_id
LogonProcessName
target.application
LogonType
extensions.auth.auth_details
MandatoryLabel
target.resource.attribute.labels
MasterKeyId
security_result.detection_fields
MaximumPerformancePercent
additional.fields
Message
metadata.description
MinimumPerformancePercent
additional.fields
MinimumThrottlePercent
additional.fields
Minutes
target.resource.attribute.labels
NewFile
target.file.full_path
NewGrp
target.group.group_display_name
NewModDt
target.file.last_modification_time
NewOwn
additional.fields
NewPerms
additional.fields
NewProcessId
target.process.pid
NewProcessName
target.process.file.full_path
NewSecurityDescriptor
security_result.description
NewSize
additional.fields
NominalFrequency
principal.resource.attribute.labels
Number
principal.resource.attribute.labels
NumberOfGroupPolicyObjects
additional.fields
ObjectName
target.resource.name
ObjectServer
target.resource.attribute.labels
ObjectType
target.resource.resource_type
ObjId
target.resource.attribute.labels
OldFile
src.file.full_path
OldGrp
src.group.group_display_name
OldModDt
src.file.last_modification_time
OldOwn
additional.fields
OldPerms
additional.fields
OldSize
additional.fields
omittedFiles
security_result.detection_fields
Opcode
additional.fields
OpcodeValue
metadata.product_event_type
Operation
security_result.description
Operation
additional.fields
OperationType
security_result.category_details
OriginalSecurityDescriptor
additional.fields
OS
principal.platform
OSVER
principal.platform_version
param2
security_result.detection_fields
param3
security_result.detection_fields
param4
security_result.detection_fields
PARAM_DEVICE_ID
principal.hostname
PARAMETER
target.file.full_path
parameters
additional.fields
PARENT_SERVER_TYPE
additional.fields
PerformanceImplementation
additional.fields
POLNm
additional.fields
prevalence
security_result.detection_fields
Priority
security_result.detection_fields
PrivilegeList
target.resource.attribute.permissions.name
PrivilegesUsedForAccessCheck
security_result.detection_fields
ProblemID
additional.fields
ProcessId
principal.process.pid
ProcessID
target.process.pid
ProcessingMode
additional.fields
ProcessingTimeInMilliseconds
additional.fields
ProcessName
principal.process.file.full_path
ProcName
principal.process.file.names
ProcPath
principal.process.file.full_path
product_event_type
metadata.product_event_type
PROFILE_SERIAL_NO
additional.fields
protected
security_result.detection_fields
ProviderGuid
metadata.product_deployment_id
ProviderName
security_result.detection_fields
PuaCount
additional.fields
PuaPolicyId
additional.fields
PUB_KEY
additional.fields
Reason
additional.fields
ReasonCode
additional.fields
RecordNumber
metadata.product_log_id
RecoveryReason
security_result.description
RecType
metadata.product_event_type
RelativeTargetName
target.user.user_display_name
report_id
metadata.product_log_id
request
additional.fields
restricted_admin_mode
additional.fields
restricted_sid_count
additional.fields
risks
security_result.detection_fields
Rule
security_result.rule_name
RuleName
security_result.rule_name
RuleType
additional.fields
scan_duration
security_result.detection_fields
scan_state
security_result.detection_fields
scan_type
security_result.detection_fields
scanned_number
security_result.detection_fields
ScriptType
additional.fields
SecurityPackageName
about.file.full_path
SEQ_ID
additional.fields
Service
target.application
SeverityValue
security_result.severity_details
sha256
principal.process.file.sha256
ShareLocalPath
target.file.full_path
ShareName
target.resource.name
SITE_IDX
additional.fields
skipped_files
security_result.detection_fields
SourceModuleName
additional.fields
SourceModuleType
additional.fields
SourceName
principal.application
spn1
target.resource.attribute.labels
spn2
target.resource.attribute.labels
standard_schemes
security_result.detection_fields
State
additional.fields
Status
target.resource.attribute.labels
StopTime
additional.fields
SubjectDomainName
principal.administrative_domain
SubjectLogonId
principal.user.userid
SubjectUserName
principal.user.userid
SubjectUserSid
principal.user.windows_sid
SupportInfo1
additional.fields
SupportInfo2
additional.fields
syslogServer
intermediary.ip
intermediary.hostname
The value (the IP address or hostname) is from header of the log, and it is associated with an intermediary.
TargetDomainName
target.administrative_domain
TargetLogonId
target.user.userid
TargetUserName
target.user.userid
TargetUserSid
target.user.windows_sid
TaskContentNew
additional.fields
TaskName
target.resource.name
TaskValue
metadata.description
THREATS
security_result.detection_fields
threats
security_result.detection_fields
TimeDifferenceMilliseconds
additional.fields
TimeSampleSeconds
additional.fields
timestamp
metadata.event_timestamp
TokenElevationType
target.resource.attribute.labels
transaction_id
metadata.product_log_id
TransitedServices
security_result.detection_fields
TSId
network.session_id
type
security_result.threat_name
UMDFDeviceInstallBegin.version
target.resource.attribute.labels
UMDFReflectorDependencyMissing.Dependency
additional.fields
updateGuid
target.process.product_specific_process_id
updateRevisionNumber
target.resource.attribute.labels
updateTitle
target.resource.name
UpdateType
additional.fields
Url
target.url
urlTrackingStatus
security_result.detection_fields
User
principal.user.userid
UserID
target.user.userid
UserSid
target.user.windows_sid
VAPI_NAME
security_result.summary
VAST
additional.fields
Version
metadata.product_version
virtual_account
additional.fields
VSAD
additional.fields
WorkstationName
additional.fields
N/A
metadata.log_type The log type is hardcoded to SEP .
N/A
metadata.product_name The product name is hardcoded to SEP .
N/A
metadata.vendor_name The vendor name is hardcoded to Symantec .

UDM mapping delta reference

On August 26, 2025, Google SecOps released a new version of the Symantec Endpoint Protection parser, which includes significant changes to the mapping of Symantec Endpoint Protection log fields to UDM fields and changes to the mapping of event types.

Log-field mapping delta

The following table lists the mapping delta for Symantec Endpoint Protection log-to-UDM fields exposed prior to August 26, 2025 and subsequently (listed in the Old mappingand Current mappingcolumns respectively).

Log field Old mapping Current mapping
_DB_DRIVER
about.resource.id about.resource.product_object_id
_ip
principal.ip intermediary.ip
Actualaction: Quarantined
security_result.action : BLOCK security_result.action : QUARANTINE
BEGIN_TIME
additional.fields target.resource.attribute.labels
callerProcessId
target.process.pid principal.process.pid
callerProcessName
target.file.full_path principal.process.file.full_path
CATEGORY_DESC
additional.fields security_result.category_details
CLIENT_TYPE
additional.fields principal.user.attribute.roles
DESCRIPTION
security_result.detection_fields security_result.summary
device.id
target.resource.id target.resource.product_object_id
device_uid
principal.resource.id principal.resource.product_object_id
DURATION
additional.fields network.session_duration.seconds
END_TIME
additional.fields target.resource.attribute.last_update_time
feature_name
about.labels security_result.about.labels
REMOTE_HOST_MAC
additional.fields principal.mac
resourceId
principal.resource.id principal.resource.product_object_id
server_name_1
principal.hostname
intermediary.hostname
target.hostname
UUID
additional.fields principal.asset.asset_id

Event-type mapping delta

Multiple events that were classified before as generic events are now properly classified with meaningful event types.

The following table lists the delta for the handling of Symantec Endpoint Protection event types prior to August 26, 2025 and subsequently (listed in the Old event_typeand Current event_typecolumns respectively).

eventType from log Old event_type Current event_type
Administrator logout
GENERIC_EVENT USER_LOGOUT
Block all other IP traffic and log
STATUS_UPDATE NETWORK_CONNECTION
File Created
GENERIC_EVENT FILE_CREATION
File Modified
GENERIC_EVENT FILE_MODIFICATION
File Renamed
GENERIC_EVENT FILE_MODIFICATION
Scan started on selected drives
GENERIC_EVENT SCAN_HOST
Scan started on selected drives, and has a file
GENERIC_EVENT SCAN_FILE
User accessing a resource, based on an event
USER_UNCATEGORIZED USER_RESOURCE_ACCESS
User is attempting to terminate
GENERIC_EVENT STATUS_SHUTDOWN
VAPI_NAME = File Delete
USER_UNCATEGORIZED FILE_DELETION
VAPI_NAME = File Write
USER_UNCATEGORIZED FILE_CREATION

Need more help? Get answers from Community members and Google SecOps professionals.

Design a Mobile Site
View Site in Mobile | Classic
Share by: