Skip to content

Forcepoint Web Security🔗

The following instructions are for configuring Forcepoint Web Security to facilitate log ingestion into Secureworks® Taegis™ XDR.

Connectivity Requirements🔗

Source Destination Port/Protocol
Forcepoint Web Security Taegis™ XDR Collector (mgmt IP) TCP/601

Data Provided from Integration🔗

Normalized Data Out-of-the-Box Detections Vendor-Specific Detections
Forcepoint Web Security HTTP

Note

XDR detectors are not guaranteed to be triggered, even if a data source's logs are normalized to a schema associated with a given detector. However, you can create Custom Alert Rules to generate alerts based on normalized data from a data source.

Configure the Forcepoint Web Security Platform🔗

Follow the instructions in the Enabling and configuring SIEM integration section on page 3 of Forcepoint Security Information Event Management (SIEM) Solutions to configure log forwarding.

Enter the following information:

Option Required Value
IP address or hostname XDR Collector (mgmt IP)
Port 601
Transport protocol TCP
SIEM format "syslog/CEF"

Example Query Language Searches🔗

To search for Forcepoint Web Security events from the last 24 hours:

FROM http WHERE sensor_type = 'FORCEPOINT_SECURE_WEB_GATEWAY' and EARLIEST=-24h

To search for http events associated with a specific URL:

FROM http WHERE sensor_type = 'FORCEPOINT_SECURE_WEB_GATEWAY' and uri_host = 'test.domain.com'

To search for http events associated with a specific source IP address:

FROM http WHERE sensor_type='FORCEPOINT_SECURE_WEB_GATEWAY' AND source_address = '10.19.50.23'

Event Details🔗

Forcepoint Web Security Event Details