Symantec Endpoint Protection (SEP) Log Collection for SymSubmit Submissions
To manually collect Symantec Endpoint Protection (SEP) logs from an endpoint, you need to navigate to the correct log file location on the machine and copy them. The primary location for SEP client logs is "C:\ProgramData\Symantec\Symantec Endpoint Protection\CurrentVersion\Data\Logs". Within this folder, you'll find various log files, including: AVMan.log, CVE.log, CVE-actions.log, GUProxy.log, and LUMan.log, among others. Additionally, the system log file is located at "C:\ProgramData\Symantec\Symantec Endpoint Protection\CurrentVersion\Data\Logs\syslog.log".
Here's a step-by-step guide:
0000049c 01dbef2909b1ed4e 01dbef29038f9280 01dbef29038f9280 00000001 3706070A1611,51,1,2,AWI-SEP,Administrator,Backdoor.Ratenjay,C:\Users\Administrator\Downloads\13c5cabdb28c7d0a56631b45507340ccf4db9458f8fc448bf594cab8ae451030\13c5cabdb28c7d0a56631b45507340ccf4db9458f8fc448bf594cab8ae451030.exe,5,1,1,256,37748804,"",1751881556,,0,101 {4B58273F-6F90-4406-B521-41CC6064416C} 0 2 Backdoor.Ratenjay 1;0 0 0 eea2a391-097c-46d8-8597-cede2490c6c5 0,730333184,54578,0,0,0,,,0,,0,0,1,0,,{043367F3-ACD6-422E-9FA7-0727998DD223},,,,WORKGROUP,42:01:0A:E1:81:F9,14.3.12154.10000,,,,,,,,,,,,,,,,999,,c2f5bfbd-0266-441b-8a42-c61c33a116f0,730333184,,506 105472 2 13C5CABDB28C7D0A56631B45507340CCF4DB9458F8FC448BF594CAB8AE451030 127 127 127 0 0 13c5cabdb28c7d0a56631b45507340ccf4db9458f8fc448bf594cab8ae451030.exe 1 0 0,,1,,1,1,105,2,0,https://bazaar.abuse.ch/download/5bfd1afc61b984f9ae1e/,msedge.exe,1,127,0,,,,0,3706070A1611,0,,0,Default,100,,,,1099511627776,,0,,0,eyJoaWRfc3RhdHVzIjp7ImhpZF9hdWRpdF9tb2RlIjpmYWxzZSwiaGlkX2VuYWJsZWQiOnRydWV9LCJwb2xpY3kiOnsibmFtZSI6IkRlZmF1bHQgQW50aW1hbHdhcmUgUG9saWN5IiwidWlkIjoiMThhYjU5NTctZWIzNy00NmFjLWI0MzAtOTczNTA0ZWQyOGNlIiwidmVyc2lvbiI6IjI2In19,
===============================================================================================
Logs contain records about client configuration changes, security-related activities, and errors. These records are called events. The logs display these events with any relevant additional information. Security-related activities include information about virus detections, computer status, and the traffic that enters or exits the client computer.
To manually collect Symantec Endpoint Protection (SEP) logs from an endpoint GUI, you need to launch the SEP from the taskbar or from the program menu and go to the logs option, and export the logs from the GUI.
Here's a step-by-step guide with Screenshots for SEP 14 and below:
A. Navigate to the logs option and click on "View Logs" for "Virus and Spyware Protection."
B. Click on Risk Log
C. Once the risk log opens, click on export and save the exported file onto the disk, and send it to Broadcom
3. If your detections have keywords like "SONAR"
A. Navigate to the Logs option and click on "View Logs" for "Virus and Spyware Protection" and click on "Threat Log"
B. Once the threat log opens, click on export and save the exported file onto the disk, and send it to Broadcom
Here's a step-by-step guide with Screenshots for SEP 16:
A. Click on the "information" icon in the GUI.
B. Click on "Logs"
C. From the drop-down, choose "Security Log"
D. Click on export and save the exported file onto the disk, and send it to Broadcom
==============================================================================================
To collect SEP (Symantec Endpoint Protection) logs using smc.exe, you can utilize the command smc -exportlog. This command triggers the client to gather and potentially package the logs, depending on how the system is configured.
Here's a more detailed breakdown:
smc -exportlog 0 0 -1 C:\temp\SystemLog
==============================================================================================
To manually collect Symantec Endpoint Protection (SEP) logs from an endpoint, you need to navigate to the correct log files location on the machine and copy them. The primary location for SEP client logs is "C:\ProgramData\Symantec\Symantec Endpoint Protection\CurrentVersion\Data\Logs". Within this folder, you'll find various log files, including: AVMan.log, CVE.log, CVE-actions.log, GUProxy.log, and LUMan.log, among others. Additionally, the system log file is located at "C:\ProgramData\Symantec\Symantec Endpoint Protection\CurrentVersion\Data\Logs\syslog.log".
Here's a step-by-step guide:
00000cbf 01dbef2bf0f499f3 000000f9 00000003 f981e10a 00000000 00000001 00000001 00000002 01dbef2be12742b3 01dbef2be12742b3 00000001 00000a00 [SID: 60501] URL reputation: Browser navigation to known bad URL attack blocked. Traffic has been blocked for this application: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe 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 Default USER <hostname> 0000ec55 00000000 00000002 00000002 00000000 00000000 00000000000000000000000000000000 00000000000000000000000000000000 URL reputation: Browser navigation to known bad URL http://xx.xx.xx.xx/02.xx.2022.exe 14.3.12154.10000 00000001 00000064 00000000 43
Logs contain records about client configuration changes, security-related activities, and errors. These records are called events. The logs display these events with any relevant additional information. Security-related activities include information about virus detections, computer status, and the traffic that enters or exits the client computer.
To manually collect Symantec Endpoint Protection (SEP) logs from an endpoint GUI, you need to launch the SEP from task bar or from program menu and go to logs option and export the logs from GUI
Here's a step-by-step guide with Screenshots for SEP 14 and below:
A. Navigate to the Logs option and click on "View Logs" for "Virus and Spyware Protection" and click on "Security Log"
B. Once the security log opens, click on File > Export and save the exported file onto the disk and send it to Broadcom
C. The most important detail we need to process the URL correctly is the SID number. You can find it logs inside square brackets. for e.g. [SID: 60501]
==============================================================================================
A. Click on the "Information" icon in the GUI
B. Click on "logs"
C. From the drop-down, choose "Security Log" and locate your block event. It should start with [SID: xxxxx]
==============================================================================================
To collect SEP logs using smc.exe, you can utilize the command smc -exportlog. This command triggers the client to gather and potentially package the logs, depending on how the system is configured.
Here's a more detailed breakdown: