Skip to main content


ESET provides anti-virus and firewall solutions. This integration allows you to send ESET logs to your SIEM account.

Before you begin, you'll need:

  • ESET Endpoint Protection Advanced installed
  • ESET Admin Console locally installed. (The cloud management console does not support sending logs to a Syslog server and therefore is not supported.)
  • Filebeat
  • Root access

Install the ESET certificate on your Filebeat server

ESET sends encrypted data, so you'll need to create a dedicated ESET certificate to decrypt the logs by the Filebeat server.

sudo mkdir /etc/filebeat/certificates
sudo openssl req -newkey rsa:2048 -nodes \
-keyout /etc/filebeat/certificates/ESET.key -x509 \
-days 365 \
-out /etc/filebeat/certificates/ESET.crt
Download the public certificate to your credentials server

For HTTPS shipping, download the public certificate to your certificate authority folder.

sudo curl --create-dirs -o /etc/pki/tls/certs/COMODORSADomainValidationSecureServerCA.crt

Configure Filebeat

Open the Filebeat configuration file (/etc/filebeat/filebeat.yml) with your preferred text editor. Copy and paste the code block below, overwriting the previous content. (You want to replace the file's content with this code block.)

This code block adds ESET as an input and sets as the output.


Filebeat requires a file extension specified for the log input.

# ...
- type: tcp
max_message_size: 10MiB
host: ""
ssl.enabled: true
ssl.certificate: "/etc/filebeat/certificates/ESET.crt"
ssl.key: "/etc/filebeat/certificates/ESET.key"
ssl.verification_mode: none

logzio_codec: plain

# Your account token. You can find your token at
type: eset
fields_under_root: true
encoding: utf-8
ignore_older: 3h
filebeat.registry.path: /var/lib/filebeat
- rename:
- from: "agent"
to: "filebeat_agent"
ignore_missing: true
- rename:
- from: "log.file.path"
to: "source"
ignore_missing: true

# ...
hosts: ["<<LISTENER-HOST>>:5015"]
certificate_authorities: ['/etc/pki/tls/certs/COMODORSADomainValidationSecureServerCA.crt']

Replace the placeholders to match your specifics. (They are indicated by the double angle brackets << >>):

  • Replace <<LOG-SHIPPING-TOKEN>> with the token of the account you want to ship to.

  • Replace <<LISTENER-HOST>> with the host for your region. For example, if your account is hosted on AWS US East, or if hosted on Azure West Europe.


One last validation - make sure is the only output and appears only once. If the file has other outputs, remove them.

Start Filebeat

Start or restart Filebeat for the changes to take effect.

Configure ESET to send logs to Logzio

Open the ESET Admin Console on the Security Management Center.

  1. In the left side menu, click the ellipsis [⋯] > More > Server Settings.
  2. Expand the Advanced Settings option.

ESET Admin Console configuration

Scroll down to Server Settings and configure the Syslog server:

In the SYSLOG SERVER section, enable the option to Use Syslog server. Fill in the details:

  • Host - Enter your host address.
  • Port - Enter your port number. (Port 6514 unless you've changed the default)
  • Format - Select BSD as the log format.
  • Transport - Select the TLS protocol.

In the LOGGING section, enable the option to Export logs to Syslog. Fill in the details:

  • Exported logs format - Select the JSON format.

ESET Admin Console configuration

Check for your logs

Give your logs some time to get from your system to ours, and then open Open Search Dashboards.

If you still don't see your logs, see Filebeat troubleshooting.