Overview-
We are providing you with the steps to integrate your Event collection at windows collector computer with Seceon SIEM so One can have Comprehensive visibility and Proactive Threat Detection in your Environment. There will be a log transfer between your firewall to APE(Analytics and Policy Engine) via CCE (Collection and Control Engine ). In this document, we are guiding you through the steps for Log and Netflows forwarding.
On the collector computer, type the following at an elevated command prompt:
1.1 PS C:\Users\Administrator>wecutil qc
...
Create a New Subscription
1.2 On the collector computer, run Event Viewer as an administrator.
1.3 Click Subscriptions in the console tree.
1.4 Start Windows Collector Service
If the Windows Event Collector service is not started, you will be prompted to confirm that you want to start it. This service must be started to create subscriptions and collect events. You must be a member of the Administrators group to start this service.
1.5 On the Actions menu, click Create Subscription.
1.6 In the Subscription Name box, type a name for the subscription
1.7 In the Description box, enter an optional description.
1.8 In the Destination Log box, select the log file where collected events are to be stored. Please make sure that the collected events are stored in the "System" log.
1.9 Click Add and select the computers from which events are to be collected.
1.10 After adding a computer, you can test connectivity between it and the local computer by selecting the computer and clicking Test.
1.11 Click on "Advanced ">> Select "Specific User">>Enter the credentials of the admin user of the Collector system.
1.12 Click Select Events to display the Query Filter dialog box. Use the controls in the Query Filter dialog box to specify the criteria that events must meet to be collected.
...
4. Check the box next to "DriverFrameworks-UserMode"
13
1.12 Click OK on the Subscription Properties dialog box. The subscription will be added to the Subscriptions pane.
...