AlienVault® USM Anywhere™

Plixer Scrutinizer

When you configure Plixer Scrutinizer to send log data to USM Anywhere, you can use the Plixer Scrutinizer plugin to translate raw log data into normalized events for analysis. The table below provides some basic information for the plugin:

Plugin Information
Device Details
Vendor Plixer
Device Type Network Traffic Analytics System
Connection Type Syslog

Integrating Plixer Scrutinizer

Before you configure the Plixer Scrutinizer integration, you must have the IP Address of the USM Anywhere Sensor.

To configure Plixer Scrutinizer to send Syslog messages to USM Anywhere

Syslog server preferences are configured from the Admin Tab. You can also create notification profiles in the Alarms Tab, where required fields are:

  • Host: USM Anywhere IP Address
  • UDP Port: 514 (default)
  • Priority
  • Facility

Plugin Enablement

The Plixer Scrutinizer plugin automatically processes all messages when the raw message contains "FAJSONALARM".

Available Plugin Fields

The following plugin fields are important attributes extracted from the syslog message. The USM Anywhere reports use these fields, and you can also reference them when creating custom reports. In addition to reporting, the USM Anywhere correlation rules make use of these fields.

  • customfield_0
  • customfield_1
  • customfield_2
  • customfield_3
  • customheader_0
  • customheader_1
  • customheader_2
  • customheader_3
  • destination_address
  • destination_port
  • event_category
  • event_name
  • event_severity
  • external_id
  • full_message
  • rep_device_rule_id
  • source_address
  • source_port
  • source_username
  • time_end
  • time_start
  • transport_protocol

Additional Resources and Troubleshooting

For troubleshooting, see the vendor documentation.