After you configure the AlienApp for Cloudflare and have a successful connection, you should make sure that the scheduled collection job is enabled. For each deployed sensor, USM Anywhere includes an out-of-the-box log collection job to support AlienApp for Cloudflare data collection. You can then use rules to manage the events Any traffic or data exchange detected by AT&T Cybersecurity products through a sensor, or through external devices such as a firewall. that USM Anywhere generates and stores, as well as the alarms Alarms provide notification of an event or sequence of events that require attention or investigation. that it generates from specific types of events.
Important: The Cloudflare service can generate numerous log messages, depending on the traffic and number of the website assets it manages. When you have AlienApp for Cloudflare configured and the log collection job enabled, the number of events produced in USM Anywhere could be excessive and consume large amounts of data storage. To address this, you should add the suggested filtering rule to eliminate standard "HTTP OK" events.
You can view log collection jobs in the Job Scheduler page and make sure that the job is enabled for the sensor where you configured the AlienApp for Cloudflare.
To verify the Cloudflare collection job
- Go to Settings > Scheduler to open the Job Scheduler page.
In the Filter by option at the top of the list, enter Cloudflare to filter the displayed list for the Cloudflare App jobs.
Jobs that are currently enabled display the icon.
If the jobs for the sensor are not enabled, click the icon to toggle it.
After the collection job runs a few times, you can select the job to view detailed information about the data collected for each job execution. This includes the number of zones scanned, the number of events retrieved per zone, and if the zones were completed or not.
Note: A job run may not be able to complete a zone if the AlienApp for Cloudflare hits the Cloudflare API connection limitation during collection. If a zone is not completed, the next job run will prioritize that zone to collect the missed data. However, if there are incomplete zones in successive jobs, there could be missed events.
In USM Anywhere, a filtering rule instructs your deployed sensors to drop future events that match the specified criteria. The matching events are neither correlated nor stored. Filtering rules enable you to control the event data that you are going to store in USM Anywhere and manage the data consumption associated with your subscription.
The Rules tab of the AlienApp for Cloudflare page provides a suggested rule as the basis for a Cloudflare filtering rule. This suggested rule automatically includes a set of matching criteria for eliminating standard "HTTP OK" log messages to reduce noise and data storage consumption.
Important: Filtering rules are not retroactive — the new rule will apply only to new events and does not eliminate existing events that are a match for the rule.
To add the suggested Cloudflare filtering rule
- In USM Anywhere, go to Data Sources > AlienApps.
- Click the Available Apps tab.
- Search for the AlienApp, and then click the tile.
Click the Rules tab.
Click Use This Rule.
This opens the Create Rule dialog box with preconfigured options for the new rule. You can keep these options exactly as they are, or make some changes according to your specific needs.
(Optional.) Modify any of the suggested rule settings, if needed:
- Change the name of the rule.
- Add one or more Rule Condition items to narrow the scope for a matching event.
- Include a multiple occurrence parameter. (Click the More link to display the fields).
Important: If you choose to modify the conditions or occurrence parameters, the rule may not effectively reduce data storage for Cloudflare events. Excessive events could cause you to go over the storage tier for your subscription.
- Click Save Rule.
There are no out-of-the-box correlation rules that produce alarms from identified Cloudflare events. However, you can create your own alarm rules to generate alarms from Cloudflare events according to your specified criteria. The easiest way to do this is from an event — when you see a Cloudflare event that indicates a potential threat or something that requires high-visibility for you or your team, you can quickly create a new alarm rule from the event so that USM Anywhere generates alarms from similar events in the future.
See Creating Alarm Rules from the Events Page for detailed information about creating an alarm rule.
When you set the conditions for the alarm rule, make sure to select Data Source Integration, Equals, and Cloudflare Enterprise Log Share Received respectively, to create alarms that are specific to events from the AlienApp for Cloudflare.