Collect VMware Workspace ONE UEM logs
This parser extracts logs from VMware Workspace ONE UEM (formerly known as VMware AirWatch) in Syslog, CEF, or key-value pair formats. It normalizes fields such as usernames, timestamps, and event details, mapping them to the UDM. The parser handles various Workspace ONE UEM event types, populating principal, target, and other UDM fields based on specific event data and logic for different log formats.
Before you begin
- Ensure that you have a Google Security Operations instance.
- Ensure that you have privileged access to the VMware Workspace ONE console.
- Ensure that you have a Windows or Linux host with systemd.
- If running behind a proxy, ensure that the firewall ports are open.
Get Google SecOps ingestion authentication file
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Collection Agents.
- Download the Ingestion Authentication File.
Get Google SecOps customer ID
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Profile.
- Copy and Save the customer ID from the Organization Details section.
Install Bindplane Agent
- For Windows installation, run the following script:
 msiexec /i "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" /quiet
- For Linux installation, run the following script:
 sudo sh -c "$(curl -fsSlL https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh)" install_unix.sh
- Additional installation options can be found in this installation guide.
Configure Bindplane Agent to ingest Syslog and send to Google SecOps
- Access the machine where Bindplane is installed.
- Edit the - config.yamlfile as follows:- receivers: tcplog: # Replace the below port <54525> and IP (0.0.0.0) with your specific values listen_address: "0.0.0.0:54525" exporters: chronicle/chronicle_w_labels: compression: gzip # Adjust the creds location below according the placement of the credentials file you downloaded creds: '{ json file for creds }' # Replace <customer_id> below with your actual ID that you copied customer_id: <customer_id> endpoint: malachiteingestion-pa.googleapis.com # You can apply ingestion labels below as preferred ingestion_labels: log_type: SYSLOG namespace: raw_log_field: body service: pipelines: logs/source0__chronicle_w_labels-0: receivers: - tcplog exporters: - chronicle/chronicle_w_labels
- Restart Bindplane Agent to apply the changes using the following command: - sudo systemctl bindplane restart
Configuring syslog in VMware Workspace ONE UEM
- Sign in to the Workspace ONE UEM Console:
- Go to Settings > System > Advanced > Syslog.
- Check the option to Enable Syslog.
- Specify values for the following input parameters:
- IP Address/Hostname: enter the address of your Bindplane Agent.
- Port: enter the designated port (default: 514).
- Protocol: select UDP or TCP depending on your Bindplane agent configuration.
- Select Log Types: select the logs you want to send to Google SecOps - Device Management Logs, Console Activity Logs, Compliance Logs, Event Logs
- Set the log level (for example, Info, Warning, Error).
 
- Click Save to apply settings
UDM Mapping Table
| Log Field | UDM Mapping | Logic | 
|---|---|---|
| AdminAccount | principal.user.userid | The AdminAccountfrom the raw log is mapped to theprincipal.user.useridfield. | 
| Application | target.application | The Applicationfield from the raw log is mapped to thetarget.applicationfield. | 
| ApplicationUUID | additional.fields | The ApplicationUUIDfield from the raw log is added as a key-value pair to theadditional.fieldsarray in the UDM. The key is "ApplicationUUID". | 
| BytesReceived | network.received_bytes | The BytesReceivedfield from the raw log is mapped to thenetwork.received_bytesfield. | 
| Device | target.hostname | The Devicefield from the raw log is mapped to thetarget.hostnamefield. | 
| FriendlyName | target.hostname | The FriendlyNamefield from the raw log is mapped to thetarget.hostnamefield whenDeviceis not available. | 
| GroupManagementData | security_result.description | The GroupManagementDatafield from the raw log is mapped to thesecurity_result.descriptionfield. | 
| Hmac | additional.fields | The Hmacfield from the raw log is added as a key-value pair to theadditional.fieldsarray in the UDM. The key is "Hmac". | 
| LoginSessionID | network.session_id | The LoginSessionIDfield from the raw log is mapped to thenetwork.session_idfield. | 
| LogDescription | metadata.description | The LogDescriptionfield from the raw log is mapped to themetadata.descriptionfield. | 
| MessageText | metadata.description | The MessageTextfield from the raw log is mapped to themetadata.descriptionfield. | 
| OriginatingOrganizationGroup | principal.user.group_identifiers | The OriginatingOrganizationGroupfield from the raw log is mapped to theprincipal.user.group_identifiersfield. | 
| OwnershipType | additional.fields | The OwnershipTypefield from the raw log is added as a key-value pair to theadditional.fieldsarray in the UDM. The key is "OwnershipType". | 
| Profile | target.resource.name | The Profilefield from the raw log is mapped to thetarget.resource.namefield whenProfileNameis not available. | 
| ProfileName | target.resource.name | The ProfileNamefield from the raw log is mapped to thetarget.resource.namefield. | 
| Request Url | target.url | The Request Urlfield from the raw log is mapped to thetarget.urlfield. | 
| SmartGroupName | target.group.group_display_name | The SmartGroupNamefield from the raw log is mapped to thetarget.group.group_display_namefield. | 
| Tags | additional.fields | The Tagsfield from the raw log is added as a key-value pair to theadditional.fieldsarray in the UDM. The key is "Tags". | 
| User | target.user.userid | The Userfield from the raw log is mapped to thetarget.user.useridfield. TheEvent Categoryfrom the raw log is added as a key-value pair to theadditional.fieldsarray in the UDM. The key is "Event Category". TheEvent Modulefrom the raw log is added as a key-value pair to theadditional.fieldsarray in the UDM. The key is "Event Module". TheEvent Sourcefrom the raw log is added as a key-value pair to theadditional.fieldsarray in the UDM. The key is "Event Source". Set to "SSO" by the parser for specific events. Derived from the raw log's timestamp.  The parser extracts the date and time from the raw log and converts it to a UDM timestamp. Determined by the parser based on theevent_nameand other fields.  See parser code for the mapping logic. Set to "AIRWATCH" by the parser. Theevent_namefrom the raw log is mapped to themetadata.product_event_typefield. Set to "AirWatch" by the parser. Set to "VMWare" by the parser. Thedomainfrom the raw log is mapped to theprincipal.administrative_domainfield. Thehostnameis extracted from thedevice_namefield in the raw log or mapped from theDeviceorFriendlyNamefields. Thesys_ipfrom the raw log is mapped to theprincipal.ipfield. Extracted from the raw log for certain event types. Extracted from the raw log for certain event types. Theuser_namefrom the raw log is mapped to theprincipal.user.useridfield. Extracted from the raw log for certain event types. Set by the parser for specific events. Set by the parser for specific events. Theevent_categoryfrom the raw log is mapped to thesecurity_result.category_detailsfield. Extracted from the raw log for certain event types. Extracted from the raw log for certain event types. Thedomainfrom the raw log is mapped to thetarget.administrative_domainfield. Constructed by combiningDeviceSerialNumberandDeviceUdidfrom the raw log for the "DeleteDeviceRequested" event. Extracted from the raw log for certain event types. Extracted from the raw log for certain event types. Thesys_ipor other IP addresses from the raw log are mapped to thetarget.ipfield. Extracted from the raw log for certain event types. Extracted from the raw log for certain event types. Set by the parser for specific events. Extracted from the raw log for certain event types. Extracted from the raw log for certain event types. Extracted from the raw log for certain event types. | 
Need more help? Get answers from Community members and Google SecOps professionals.