UpPrevious Next
Sheriff CSMâ„¢
Artillery Honeypot
When you configure Binary Defense Artillery Hfoneypot to send log data to Sheriff CSM, you can use the Artillery Honeypot plugin to translate raw log data into normalized events for analysis. The table below provides some basic information for the plugin:
Plugin Information
Device | Details |
Vendor | Binary Defense |
Device Type | Honeypot |
Connection Type | Syslog |
Data Source Name | Artillery |
Data Source ID | 1914 |
Integrating Artillery Honeypot
Before you configure the Artillery Honeypot integration, you must have the IP Address of the Sheriff CSM Sensor (Deputy).
To configure Artillery Honeypot to send Syslog messages to Sheriff CSM
Edit the Artillery Honeypot
config
file, located in your Artillery Honeypot project folder, as follows:
# Specify SYSLOG TYPE to be local, file or remote. LOCAL will pipe to syslog, REMOTE will pipe to remote SYSLOG, and file will send to alerts.log in local artillery directory
SYSLOG_TYPE="REMOTE"
#
# IF YOU SPECIFY SYSLOG TYPE AS REMOTE, SPECIFY A REMOTE SYSLOG SERVER TO SEND ALERTS TO
SYSLOG_REMOTE_HOST="<Sheriff_CSM_IP_ADDRESS>"
Plugin Enablement
For plugin enablement information, see
Enable Plugins.
Additional Resources and Troubleshooting
https://github.com/BinaryDefense/artillery
https://github.com/BinaryDefense/artillery/blob/master/config
For troubleshooting, see the vendor documentation.