Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents

Overview:

We are providing you with the steps to integrate your event collection at windows collector computer with Seceon SIEM so we can have Comprehensive visibility and Proactive Threat Detection in your Environment. There will be a log transfer between your firewall to APE(Analytics and Policy Engine) via CCE (Collection and Control Engine ). This document will guide you through the steps for Log and Netfwlows forwarding.

Steps of configuration:

On the collector computer, type the following command on the command prompt:

>>  wecutil qc

Now create a New Subscription

>>  On the collector computer in search box, run Event Viewer as an administrator.

Image RemovedImage Added

>>  Click Subscriptions in the console which is situated in the left side

Image RemovedImage Added

>>  Start Windows Collector Service

If the Windows Event Collector service is not started, you will be prompted to confirm that you want to start it. This service must be started to create subscriptions and collect events. You must be a member of the Administrators group to start this service.

>>  On the actions menu, in right side click on the create subscription.

Image RemovedImage Added

>>  In the Subscription Name box, type a name for the subscription

>>  In the Description box, enter an optional description.

Image RemovedImage Added

>>  In the Destination Log, select the log file with help of dropdown where collected events are to be stored. Please make sure that the collected events are stored in the "System" log.

Image RemovedImage Added

>>  now click on select computers from which events are to be collected

>> After adding a computer, you can test connectivity between it and the local computer by selecting the computer and clicking Test.

Image RemovedImage Added

>> Now click on the add domain computer

Image RemovedImage Added

>> In object name put your computer name one by one

Image RemovedImage Added


>> Now click on select events

Image RemovedImage Added

>> and click on all the events Critical, Warning, Verbose, Error, Information 

Image RemovedImage Added

>>Drop Down Event level

Image RemovedImage Added

>>Select Windows logs and click on check box as shown below.



>> After that drop down the events logs and in envent logs follow this path microsoft-windows-DriverFrameworks and click on the ok
 choose "Windows Log" in the dropdown.

1. Click on + next to Application & Services:

2. Click on + next to Microsoft

3. Click on + Next to Windows

4. Check the box next to "DriverFrameworks-UserMode"

Image Removed


Image Added

>>Then click on the advance tab

Image RemovedImage Added


>> Select "Specific User" and then click on user name and password


>> And put the username and password with the admin privilege


Click OK.

 >> Click OK on the Subscription Properties dialog box. The subscription will be added to the Subscriptions pane.

To check the status,

Right click on the Subscription name, select "runtime status". if the operation was successful, the Status of the subscription will be Active.

The following link provides additional information: https://msdn.microsoft.com/en-us/library/cc722010.aspx

Now, the collector setup is done, please

1.Forward logs from the other sources on this collector. Follow the steps in the article using the link below on source computers:

From Source Windows Server

2. Now, configure Nxlog on the collector, using the steps in the article using the link below:

Nxlog Configuration for Windows AD Logs

Note: If the AD machine is configured as the collector then you need to enable audit logs only on the AD machine. If the case is otherwise(any endpoint is configured as the collector), then you need to enable audit logs on each of the computers added in the subscriptions separately.

3. Steps to enable audit logs are given in the article from the link below:

Windows- Enable Audit Logs/Policies