TABLE OF CONTENTS
Overview
Infocyte is a threat detection and response platform that provides visibility into endpoint compromises, persistence mechanisms, and malicious activity. By integrating Infocyte with ADR SIEM via Syslog, you can forward security events for centralized monitoring, correlation, and proactive threat detection.
Prerequisites
Administrative access to the Infocyte console
A running ADR CCE server with network reachability from Infocyte
Firewall rules allowing UDP/514 (Syslog default) between Infocyte and CCE
Configuration Steps on Infocyte Console
Log in to the Infocyte Management Console with administrator privileges.
Navigate to:
Settings → Integrations → SyslogEnable Syslog Forwarding.
Fill in the following details:
Syslog Server (CCE IP):
<CCE_IP>Protocol:
UDPPort:
514Format:
CEF(recommended for ADR compatibility)Severity Level: Choose according to your needs (e.g., Informational or above).
Save the configuration.
Verification Steps (MSSP Only)
On ADR CCE Server
Run the following command to confirm logs are being received:
sudo tcpdump -i any port 514 and host <Infocyte_IP> -s0 -AAAIf events are visible, logs are successfully reaching CCE.
On ADR SIEM UI
Log in with administrative rights.
Navigate to: System → Logs and Flows Collection Status
Under Source Device IP, the Infocyte device IP should appear.
Notes
Ensure time synchronization (NTP) is enabled on Infocyte and CCE for accurate log timestamps.
If logs are not visible:
Verify firewall rules (UDP 514 open).
Check if Infocyte Syslog service is enabled and active.
Validate network reachability using ping/telnet from Infocyte to CCE IP.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article