USM Anywhere™

Carbon Black Cb Protection

When you configure Carbon Black Cb Protection (formerly Bit9 Security Platform) integration to send log data to USM Anywhere, you can use the Cb Protection plugin to translate the raw log data into normalized events for analysis.

Device Details
Device vendor Carbon Black
Device type Cb Protection
Connection type Syslog
Vendor link

Cb Protection Integration

Before configuring the log collection, you must have the IP address of the USM Anywhere Sensor.

To configure Carbon Black App Control to send log data to USM Anywhere Sensor

  1. Log into the Carbon Black App Control console with Administrator or Power User privileges.
  2. On the Carbon Black App Control Console menu, click the configuration (gear) icon and choose System Configuration.
  3. On the System Configuration page, select the Events tab.
  4. At the bottom of the page, click the Edit button to open the External Event Logging panel.
  5. Set the event logging parameters as follows:

    • Select the Syslog Enabled check box.
    • In the Syslog Address field, enter the IP address of your USM Anywhere Sensor.
    • In the Syslog Port field, enter 514.
    • Set the Syslog Format to Enhanced (RFC5424).
  6. Click Update and choose Yes in the confirmation dialog.

Plugin Enablement

For plugin enablement information, see Adding AlienApps to an Asset.

Available Plugin Fields

The following plugin fields are important attributes extracted from the syslog message. The USM Anywhere reports use these fields, and you can also reference them when creating custom reports. In addition to reporting, the USM Anywhere correlation rules make use of these fields.

  • customfield_0
  • customheader_0
  • event_category
  • event_description
  • event_name
  • event_subcategory
  • file_hash
  • file_name
  • file_path
  • rep_device_rule_id
  • source_address
  • source_hostname
  • source_process
  • source_username
  • timestamp_occured
  • timestamp_received


For troubleshooting, refer to the vendor documentation: