Loading

Imperva

Version 1.7.1 (View all)
Compatible Kibana version(s) 8.11.0 or higher
9.0.0 or higher
Supported Serverless project types
What's this?
Security
Observability
Subscription level
What's this?
Basic
Level of support
What's this?
Elastic

This integration is for Imperva device logs. It includes the datasets for receiving logs over syslog or read from a file:

  • securesphere dataset: supports Imperva SecureSphere logs.

The Imperva integration collects one type of data: securesphere.

Securesphere consists of alerts, violations, and system events. See more details about alerts, violations, and events

Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions.

The minimum kibana.version required is 8.10.1.

  1. The gateway and management server (MX) should have the relevant connectivity for sending logs using the Syslog server.

  2. To send all security violations from the gateway to Elastic:

  • Create a custom action set:

    • From a 'security violation–all', type and add the gateway security system log > gateway log security event to system log (syslog) using the CEF standard.
    • Configure the relevant name and parameters for the action set.
  • Assign a followed action to a security - > policy rule.

  1. To send all security alerts (aggregated violations) from the gateway to Elastic:
  • Create a custom action set:

    • From an 'any event type', type and add the server system log > log security event to system log (syslog) using the CEF standard.
    • Configure the relevant name and parameters for the action set.
  • Assign a followed action to a security - > policy rule.

  1. To send all system events from the gateway to Elastic:
  • Create a custom action set:

    • From an 'any event type', type and add the server system log > log system event to system log (syslog) using the CEF standard.
    • Configure the relevant name and parameters for the action set.
  • Create system events policy.

  • Assign a followed action to a system event policy.

For more information on working with action sets and followed actions, check the Imperva documentation.

  1. In Kibana navigate to Management > Integrations.
  2. In the search bar, type Imperva.
  3. Select the Imperva integration and add it.
  4. Enable the data collection mode from the following: Filestream, TCP, or UDP.
  5. Add all the required configuration parameters, such as paths for the filestream or listen address and listen port for the TCP and UDP.
  6. Save the integration.

This is the Securesphere dataset.

This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.