Onboarding Syslog Data

Once your Syslog Forwarder VM is deployed and configured, it is ready to accept syslog log sources.


Sending Syslog Data

  • Each log source should be configured to send syslog traffic to the forwarder’s IP address.

  • Syslog ports are allocated starting from 60,000.

Examples:

  • Log Source 1 → Port 60,000

  • Log Source 2 → Port 60,001

  • Log Source 3 → Port 60,002

This approach ensures each onboarded device uses a unique port for separation and management.


Request Activation with ThreatDefence Support

After configuring your devices to send logs, raise a request with ThreatDefence Support so the sources can be activated in our backend.

Steps to Raise a Ticket:

  1. Go to the Service Desk portal.

  2. Create a new ticket with:

    • Category: Onboarding

    • Sub-Category: Syslog Log Sources

  3. Provide the following details:

    • Source IP address of the device sending logs.

    • Make/Model of the data source (e.g., Cisco ASA, Palo Alto firewall, Fortinet, etc.).

ThreatDefence SOC will validate the request and enable the log source for ingestion into the platform.


Once enabled, events will be visible in the ThreatDefence Analyst Console and can be correlated with existing detections and dashboards.

Last updated