Sophos Central

Prev Next
Self Service Ingestion

Connect this data source on your own, using the Hunters platform.

TL;DR

Supported data types

3rd party detection

Hunters detection

IOC search

Search

Table name

Log format

Collection method

Sophos Central Events

sophos_central_events

NDJSON

API

Sophos Central Alerts

sophos_central_alerts

NDJSON

API


Overview

imageSophos Central Endpoint (Sophos CE) is a cloud-based security solution that provides advanced protection for endpoints against malware, ransomware, and other cyber threats. It uses artificial intelligence, behavioral analysis, and real-time threat intelligence to detect and prevent attacks before they can cause damage. Sophos CE includes features like web filtering, application control, and automated threat response, allowing security teams to monitor and manage endpoint security from a centralized dashboard. It is designed to provide comprehensive protection for businesses by securing devices across various environments, including on-premises and cloud-based infrastructures.

Supported data types

Sophos Central Events

Table name: sophos_central_events

Details about a virus or spyware is detected or cleaned up, suspicious behavior or file is detected and on.

Sophos Central Alerts

Table name: sophos_central_alerts

Alerts in Sophos Central are crucial for maintaining the security and performance of your IT environment. They notify administrators of potential threats, system health issues, and compliance status changes in real-time.

📘Learn more

Sophos Central gathers information from all Sophos products, such as Sophos XG Firewall, Sophos UTM, and more.

Send data to Hunters

Hunters supports the collection of logs from Sophos using API. To complete the process you'll have to collect the following information from Sophos:

  • Client ID

  • Client Secret

  • Tenant ID

  • Region

⚠️ Note

To allow fetching Sophos logs, the configured user must have Super-Admin permissions as detailed here.


To connect Sophos logs:

  1. Retrieve your Sophos Client ID and Secret:

    1. Log into Sophos Central Admin and go to Global Settings > API Credentials Management.

    2. To create a new token, click Add Credential from the top-right corner of the screen.

    3. Assign the appropriate role for the credential and add a description.

    4. Click Add.
      The API credential Summary for this credential is displayed.

    5. Click on Show Client Secret to display Client Secret.

    6. Copy and save the Client ID and Client Secret in a safe place.

    7. To retrieve your tenant ID, go to Account name > Account Details > Sophos Support and locate the unique ID for your Sophos Central account. This is your tenant ID.

    8. Follow this guide to retrieve your region.

      📘 About the Region field

      From the table in the above mentioned guide, locate your API Host value based on your Data Region. For instance, if you are in US (East), your API Host value is https://api-us03.central.sophos.com.

      From this value, isolate the value after api- and paste it into the Region field on Hunters.

      In this example, you should enter us03 into the Region field.

  2. Complete the process on the Hunters platform, following this guide.

Expected Format

Logs are expected in JSON format.

Sophos Central Events

{"type": "Event::Endpoint::UpdateSuccess", "source": "Person", "severity": "low", "name": "Update succeeded", "location": "LDDD12985", "id": "11111-0526-493f-96fb-bef6976f5797", "source_info": {"ip": "10.101.246.70"}, "customer_id": "bb84e9d3-877e-4b58-a8a0-b35e0370f06a", "endpoint_id": "111111-2118-491e-8e92-343f099ecbdc", "endpoint_type": "computer", "created_at": "2021-03-11T09:07:15.836Z", "user_id": "59111111069cc714ddf5fd60", "when": "2021-03-11T09:07:15.821Z", "group": "UPDATING"}

Sophos Central Alerts

{"description": "Policy non-compliance: Network Threat Protection", "type": "Event::Endpoint::NonCompliant", "source": "CMRE\\Tthree", "data": {"app_id": "NTP", "created_at": 1678540511141, "endpoint_id": "7d4111e-6fcc-4b57-8878-3d8a6eaf6d44", "endpoint_java_id": "7d4f111-6fcc-4b57-8878-3d8a6eaf6d44", "endpoint_platform": "windows", "endpoint_type": "computer", "event_service_id": {"type": 3, "data": "Uw21111DTKOIz16sJIdYnw=="}, "inserted_at": 1678540578041, "make_actionable_at": 1678549578039, "policy_type": 24, "source_info": {"ip": "172.10.10.10"}, "user_match_id": {"timestamp": 1116878171, "date": 1616111171000}, "user_match_uuid": {"type": 3, "data": "7+Fo611HHC2RMlBp9NqVg=="}}, "severity": "medium", "location": "CMRE-TR-3", "id": "5311115f-cf18-4ca3-88cf-5eac2487589f", "customer_id": "bb111113-877e-4b58-a8a0-b35e0370f06a", "event_service_event_id": "111111-cf18-4ca3-88cf-5eac2487589f", "created_at": "2021-03-11T13:16:18.042Z", "when": "2021-03-11T15:46:18.039Z"}