Skip to content

Symantec Endpoint Protection (SEP) seclog file IPs parser with adding IPs to SEP Firewall [Python] ex. SEP-seclog-IPs-parser

Notifications You must be signed in to change notification settings

RChutchev/symantec-parser

Repository files navigation

symantec-parser (ex. sep-seclog-ips-parser)

Symantec Endpoint Protection (SEP) seclog file IP Analyzer

Warning

This version may not be suitable for production use!

The package is not being actively maintained, if you want to maintain this package, please reach out!

Please note that this is a beta version which is used for a personal RDP server with a normal workload.

The script tries to find the attacker's IP addresses in the 'seclog' file and blocks if the number of attacks exceeds a certain number. All settings are in the settings.ini file.

[!] Pre-set maximum log file size for SEP SEP [!] Create a predefined rule for auto-update SEP FW

SEP firewall rule blocking:

  1. Export current rules
  2. Add IP addresses to the predefined rule.
  3. Import rules into SEP That's simple but it works fine.

Please, check all settings in the config file before use.

About

Symantec Endpoint Protection (SEP) seclog file IPs parser with adding IPs to SEP Firewall [Python] ex. SEP-seclog-IPs-parser

Topics

Resources

Code of conduct

Stars

Watchers

Forks

Sponsor this project