Deep Security 10.2 has reached end of support. Use the version selector (above) to see more recent versions of the Help Center.
By default, when you enable application control it logs events, such as when there are software changes or when it blocks software from executing. Software change events appear on the Actions and Events & Reports tabs. If configured, it also triggers an alert.
You can configure some of which application control event logs are recorded, and which are forwarded to external SIEM systems, or syslog servers.
To monitor for software changes on computers, perform these basic steps:
- Choose which application control events to log
- View application control event logs
- Monitor application control alerts
For an overview of the application control module, see Lock down software with application control.
- Go to Administration > System Settings > System Events.
- Scroll down to the application control events such as Event ID 7000 “Application Control Events Exported”.
If you want to record event logs for that type of event, select Record.
When those events occur, they appear on Events & Reports > Events > System Events. Logs are kept until they meet maximum log age criteria. For details, see Event collection in Deep Security.Events that appear on Computers > Details > Application Control > Events are not configured here. They are always logged.
- If you want to forward event logs to a SIEM, or syslog server, select Forward.
If you use an external SIEM, you may need to load the list of possible application control event logs, and indicate what action to take. For a list of application control events, see System events.
Application control generates system events and security events:
- System event: An audit event that provides a history of configuration changes or software updates. To see system events click Events & Reports > Events > System Events. For a list, see System events.
- Security event: An event that occurs on the agent when application control blocks or allows unrecognized software, or blocks software due to a block rule. To see security events click Events & Reports > Events > Application Control Events > Security Events.
Respond to application control security events
Take appropriate action when application control events occur:
- When an unrecognized file is allowed to execute and you want to continue to allow it, create an "Allow" rule. In addition to allowing the file's execution, the event is no longer logged for that file, which reduces noise and makes important events easier to find. (See Allow or block software.)
- When an event shows that a known file's execution is blocked, consider cleaning that file from the computer especially for repeated occurrences.
- When a security event shows that application control is blocking software that should be allowed to execute, undo the rule. (See Undo many new rules and rule changes with the decision log.)
Interpret aggregated security events
When an agent heartbeat includes several instances of the same security event, Deep Security aggregates the events in the Security Events log. Event aggregation reduces the number of items in the log, making it easier to find important events:
- When the event occurs for the same file, which is usually the case, the log includes the file name with the aggregated event. For example, a heartbeat includes 3 instances of the "Execution of Unrecognized Software Allowed" event for the Test_6_file.sh file, and no other instances of that event. Deep Security aggregates these 3 events for the file Test_6_file.sh.
- When the event occurs for many files, the log omits the file names. For example, a heartbeat includes 21 instances of the "Execution of Unrecognized Software Allowed" event that occurred for several different files. Deep Security aggregates the 21 events in a single event, but does not include a file name.
When aggregated events apply to multiple files, other occurrences of these events have likely been reported in other heartbeats. After you respond to other events where the file name is known, it is likely that no more aggregated events occur.
In the log, aggregated events use special icons, and the Repeat Count column indicates the number of events that are aggregated.
To configure which application control events or severity levels cause an alert, go to the Alerts tab, click the Configure Alerts button, and then select an event and double-click Properties. For details, see Configure alerts.
When alerts are enabled for application control events, any software change that the application control engine detects and any software that it blocks from executing appear in the Alerts tab. If you have enabled the Alert Status widget, application control alerts also appear on your dashboard.
To monitor which computers are in maintenance mode, you can also click Add/Remove Widgets and enable the Application Control Maintenance Mode widget, which displays a list of the computers and their scheduled maintenance windows.