Sophos Connector SIEM
Last updated
Was this helpful?
Last updated
Was this helpful?
This data pipeline extracts the SIEM events from Sophos technology using the data Integration API.
This Pipeline integrates with API Logs from the Sophos Platform using the Listener, transforming it from JSON to CSV format.
The Listener pulls events using the Configure as YAML option, using the following YAML:
We need to flatten the incoming JSON with key-value pairs that we can then parse into more specific fields.
The parser extracts the individual fields coming from the OKTA JSON into more detailed fields, including severity, source, Sophos ID, threat level & when, and more.
You can now send on your CSV containing Sophos SIEM logs to your preferred destination using a sink.
We can transform the incoming flattened JSON string into an escape string using the , setting the Escape level to minimal and the Escape Quote to single.
Now we have gleaned information on when a threat took place using the Parser, we can transform this specific field from a string into a value in milliseconds.
We can glean where the log on took place using the source string and transforming it into a Regular Expression using the
We use the action to send on the hours timestamp and source information. Transform the fields to CSV format, using a comma as the delimiter.