There is extra contextual data for the Malware Detection events that is needed in order to properly start an investigation into the alerts
First ensure baseline logging and dashboards are setup. Veeam has actually done a very good job of making this easy 😁
You then need to install a Splunk Universal Forwarder on the VBR server to collect the additional context data:
Now you are ready to correlate the Malware Detection events with their contextual data in a custom Detection Alert for your SOC:
You will now see contextual data embedded directly into the SOC alert (we were doing some testing and set .txt and .pdf as bad file extensions just to generate data 😋😞
crossposting: Splunk File Reader for "Malware_Detection_Logs" | Veeam Community Resource Hub
crossposting: Splunk File Reader for "Malware_Detection_Logs" | Veeam Community Resource Hub