{
  "name": "cisco_secure_email_gateway",
  "title": "Cisco Secure Email Gateway",
  "version": "1.29.1",
  "release": "ga",
  "description": "Collect logs from Cisco Secure Email Gateway with Elastic Agent.",
  "type": "integration",
  "download": "/epr/cisco_secure_email_gateway/cisco_secure_email_gateway-1.29.1.zip",
  "path": "/package/cisco_secure_email_gateway/1.29.1",
  "icons": [
    {
      "src": "/img/cisco-logo.svg",
      "path": "/package/cisco_secure_email_gateway/1.29.1/img/cisco-logo.svg",
      "title": "Cisco logo",
      "size": "32x32",
      "type": "image/svg+xml"
    }
  ],
  "conditions": {
    "kibana": {
      "version": "^8.11.0 || ^9.0.0"
    }
  },
  "owner": {
    "type": "elastic",
    "github": "elastic/integration-experience"
  },
  "categories": [
    "security",
    "network",
    "email_security"
  ],
  "signature_path": "/epr/cisco_secure_email_gateway/cisco_secure_email_gateway-1.29.1.zip.sig",
  "format_version": "3.0.3",
  "readme": "/package/cisco_secure_email_gateway/1.29.1/docs/README.md",
  "license": "basic",
  "screenshots": [
    {
      "src": "/img/cisco-secure-email-gateway-screenshot.png",
      "path": "/package/cisco_secure_email_gateway/1.29.1/img/cisco-secure-email-gateway-screenshot.png",
      "title": "Cisco Secure Email Gateway dashboard screenshot",
      "size": "600x600",
      "type": "image/png"
    },
    {
      "src": "/img/cisco-secure-email-gateway-text-mail-screenshot.png",
      "path": "/package/cisco_secure_email_gateway/1.29.1/img/cisco-secure-email-gateway-text-mail-screenshot.png",
      "title": "Cisco Secure Email Gateway Text Mail dashboard screenshot",
      "size": "600x600",
      "type": "image/png"
    },
    {
      "src": "/img/cisco-secure-email-gateway-antivirus-screenshot.png",
      "path": "/package/cisco_secure_email_gateway/1.29.1/img/cisco-secure-email-gateway-antivirus-screenshot.png",
      "title": "Cisco Secure Email Gateway Antivirus dashboard screenshot",
      "size": "600x600",
      "type": "image/png"
    }
  ],
  "assets": [
    "/package/cisco_secure_email_gateway/1.29.1/LICENSE.txt",
    "/package/cisco_secure_email_gateway/1.29.1/changelog.yml",
    "/package/cisco_secure_email_gateway/1.29.1/manifest.yml",
    "/package/cisco_secure_email_gateway/1.29.1/validation.yml",
    "/package/cisco_secure_email_gateway/1.29.1/docs/README.md",
    "/package/cisco_secure_email_gateway/1.29.1/img/cisco-logo.svg",
    "/package/cisco_secure_email_gateway/1.29.1/img/cisco-secure-email-gateway-antivirus-screenshot.png",
    "/package/cisco_secure_email_gateway/1.29.1/img/cisco-secure-email-gateway-screenshot.png",
    "/package/cisco_secure_email_gateway/1.29.1/img/cisco-secure-email-gateway-text-mail-screenshot.png",
    "/package/cisco_secure_email_gateway/1.29.1/kibana/tags.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/manifest.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/sample_event.json",
    "/package/cisco_secure_email_gateway/1.29.1/docs/knowledge_base/service_info.md",
    "/package/cisco_secure_email_gateway/1.29.1/kibana/dashboard/cisco_secure_email_gateway-3e3a4de0-b00b-11ec-8a45-8d83ac55242a.json",
    "/package/cisco_secure_email_gateway/1.29.1/kibana/dashboard/cisco_secure_email_gateway-406c0f90-6da1-11ee-bfeb-7b49e926f7c6.json",
    "/package/cisco_secure_email_gateway/1.29.1/kibana/dashboard/cisco_secure_email_gateway-6a11cbc0-b513-11ec-aa3c-afc0e710666b.json",
    "/package/cisco_secure_email_gateway/1.29.1/kibana/dashboard/cisco_secure_email_gateway-97ab0d40-b63e-11ec-b665-f79f0daaad54.json",
    "/package/cisco_secure_email_gateway/1.29.1/kibana/dashboard/cisco_secure_email_gateway-a1060e90-b025-11ec-8a45-8d83ac55242a.json",
    "/package/cisco_secure_email_gateway/1.29.1/kibana/dashboard/cisco_secure_email_gateway-b9591cf0-b640-11ec-b665-f79f0daaad54.json",
    "/package/cisco_secure_email_gateway/1.29.1/kibana/dashboard/cisco_secure_email_gateway-be7e9c00-b055-11ec-8a45-8d83ac55242a.json",
    "/package/cisco_secure_email_gateway/1.29.1/kibana/dashboard/cisco_secure_email_gateway-c19f7c50-b05b-11ec-8a45-8d83ac55242a.json",
    "/package/cisco_secure_email_gateway/1.29.1/kibana/dashboard/cisco_secure_email_gateway-c94a00a0-b0a7-11ec-8a45-8d83ac55242a.json",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/fields/agent.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/fields/base-fields.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/fields/ecs.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/fields/fields.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/agent/stream/stream.yml.hbs",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/agent/stream/tcp.yml.hbs",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/agent/stream/udp.yml.hbs",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/default.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_amp.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_anti_spam.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_antivirus.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_authentication.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_bounce.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_consolidated_event.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_content_scanner.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_error_logs.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_gui_logs.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_status.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_system.yml",
    "/package/cisco_secure_email_gateway/1.29.1/data_stream/log/elasticsearch/ingest_pipeline/pipeline_text_mail_logs.yml"
  ],
  "policy_templates": [
    {
      "name": "Cisco Secure Email Gateway",
      "title": "Cisco Secure Email Gateway logs",
      "description": "Collect Cisco Secure Email Gateway logs.",
      "inputs": [
        {
          "type": "logfile",
          "title": "Collect logs from Cisco Secure Email Gateway instances",
          "description": "Collecting Cisco Secure Email Gateway logs."
        },
        {
          "type": "tcp",
          "title": "Collect Cisco Secure Email Gateway logs via TCP input",
          "description": "Collecting Cisco Secure Email Gateway logs via TCP input."
        },
        {
          "type": "udp",
          "title": "Collect Cisco Secure Email Gateway logs via UDP input",
          "description": "Collecting Cisco Secure Email Gateway logs via UDP input."
        }
      ],
      "multiple": true
    }
  ],
  "data_streams": [
    {
      "type": "logs",
      "dataset": "cisco_secure_email_gateway.log",
      "title": "Cisco Secure Email Gateway logs",
      "release": "ga",
      "ingest_pipeline": "default",
      "streams": [
        {
          "input": "tcp",
          "vars": [
            {
              "name": "listen_address",
              "type": "text",
              "title": "Listen Address",
              "description": "The bind address to listen for TCP connections. Set to `0.0.0.0` to bind to all available interfaces.",
              "multi": false,
              "required": true,
              "show_user": true,
              "default": "localhost"
            },
            {
              "name": "listen_port",
              "type": "integer",
              "title": "Listen Port",
              "description": "The TCP port number to listen on.",
              "multi": false,
              "required": true,
              "show_user": true,
              "default": 514
            },
            {
              "name": "ssl",
              "type": "yaml",
              "title": "SSL Configuration",
              "description": "SSL configuration options. See [documentation](https://www.elastic.co/guide/en/beats/filebeat/current/configuration-ssl.html#ssl-common-config) for details.",
              "multi": false,
              "required": false,
              "show_user": false,
              "default": "#certificate: \"/etc/server/cert.pem\"\n#key: \"/etc/server/key.pem\"\n"
            },
            {
              "name": "tags",
              "type": "text",
              "title": "Tags",
              "multi": true,
              "required": true,
              "show_user": false,
              "default": [
                "forwarded",
                "cisco_secure_email_gateway-log"
              ]
            },
            {
              "name": "preserve_original_event",
              "type": "bool",
              "title": "Preserve original event",
              "description": "Preserves a raw copy of the original event, added to the field `event.original`.",
              "multi": false,
              "required": true,
              "show_user": true,
              "default": false
            },
            {
              "name": "processors",
              "type": "yaml",
              "title": "Processors",
              "description": "Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.",
              "multi": false,
              "required": false,
              "show_user": false
            },
            {
              "name": "tz_offset",
              "type": "text",
              "title": "Timezone",
              "description": "IANA time zone or time offset (e.g. `+0200`) to use when interpreting syslog timestamps without a time zone.",
              "multi": false,
              "required": false,
              "show_user": false,
              "default": "UTC"
            }
          ],
          "template_path": "tcp.yml.hbs",
          "title": "Cisco Secure Email Gateway logs",
          "description": "Collect Cisco Secure Email Gateway logs via TCP input.",
          "enabled": true,
          "ingestion_method": "Network Protocol"
        },
        {
          "input": "udp",
          "vars": [
            {
              "name": "listen_address",
              "type": "text",
              "title": "Listen Address",
              "description": "The bind address to listen for UDP connections. Set to `0.0.0.0` to bind to all available interfaces.",
              "multi": false,
              "required": true,
              "show_user": true,
              "default": "localhost"
            },
            {
              "name": "listen_port",
              "type": "integer",
              "title": "Listen Port",
              "description": "The UDP port number to listen on.",
              "multi": false,
              "required": true,
              "show_user": true,
              "default": 514
            },
            {
              "name": "tags",
              "type": "text",
              "title": "Tags",
              "multi": true,
              "required": true,
              "show_user": false,
              "default": [
                "forwarded",
                "cisco_secure_email_gateway-log"
              ]
            },
            {
              "name": "preserve_original_event",
              "type": "bool",
              "title": "Preserve original event",
              "description": "Preserves a raw copy of the original event, added to the field `event.original`.",
              "multi": false,
              "required": true,
              "show_user": true,
              "default": false
            },
            {
              "name": "udp_options",
              "type": "yaml",
              "title": "Custom UDP Options",
              "description": "Specify custom configuration options for the UDP input.",
              "multi": false,
              "required": false,
              "show_user": false,
              "default": "#read_buffer: 100MiB\n#max_message_size: 50KiB\n#timeout: 300s\n"
            },
            {
              "name": "processors",
              "type": "yaml",
              "title": "Processors",
              "description": "Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.",
              "multi": false,
              "required": false,
              "show_user": false
            },
            {
              "name": "tz_offset",
              "type": "text",
              "title": "Timezone",
              "description": "IANA time zone or time offset (e.g. `+0200`) to use when interpreting syslog timestamps without a time zone.",
              "multi": false,
              "required": false,
              "show_user": false,
              "default": "UTC"
            }
          ],
          "template_path": "udp.yml.hbs",
          "title": "Cisco Secure Email Gateway logs",
          "description": "Collect Cisco Secure Email Gateway logs via UDP input.",
          "enabled": true,
          "ingestion_method": "Network Protocol"
        },
        {
          "input": "logfile",
          "vars": [
            {
              "name": "paths",
              "type": "text",
              "title": "Paths",
              "multi": true,
              "required": true,
              "show_user": true
            },
            {
              "name": "tags",
              "type": "text",
              "title": "Tags",
              "multi": true,
              "required": true,
              "show_user": false,
              "default": [
                "forwarded",
                "cisco_secure_email_gateway-log"
              ]
            },
            {
              "name": "preserve_original_event",
              "type": "bool",
              "title": "Preserve original event",
              "description": "Preserves a raw copy of the original event, added to the field `event.original`.",
              "multi": false,
              "required": true,
              "show_user": true,
              "default": false
            },
            {
              "name": "processors",
              "type": "yaml",
              "title": "Processors",
              "description": "Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.",
              "multi": false,
              "required": false,
              "show_user": false
            },
            {
              "name": "tz_offset",
              "type": "text",
              "title": "Timezone",
              "description": "IANA time zone or time offset (e.g. `+0200`) to use when interpreting syslog timestamps without a time zone.",
              "multi": false,
              "required": false,
              "show_user": false,
              "default": "UTC"
            }
          ],
          "template_path": "stream.yml.hbs",
          "title": "Cisco Secure Email Gateway logs",
          "description": "Collect Cisco Secure Email Gateway logs via logfile.",
          "enabled": true,
          "ingestion_method": "File"
        }
      ],
      "package": "cisco_secure_email_gateway",
      "path": "log"
    }
  ]
}
