Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
minLevel1
maxLevel6
outlinefalse
styledisc
typelist
printabletrue

About the Device

An IIS web server runs on the Microsoft .NET platform on the Windows OS. It’s versatile and stable, and it’s been widely used in production for many years. A web server is a process for hosting web applications. The web server allows an application to process messages that arrive through specific TCP ports (by default). For example, the default port for HTTP traffic is 80, and the one for HTTPS is 443.

Device Information

 Entity

Particulars

Vendor Name

Microsoft

Product Name

IIS

Type of Device

Hosted

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log collection method

Microsoft IIS

IIS

Syslog - Structured

CyberHub

Port Requirements

Source

Destination

Port

Microsoft IIS (NxLog Agent)

CyberHub

10014 (TCP)

Microsoft IIS (Epilog Agent & Syslog-NG Agent)

CyberHub

10013

To facilitate secure communication and align with our best practice, we strongly encourage the use of Transport Layer Security (TLS) between your security devices and our Adaptive MxDR platform for event forwarding.

While we understand that TLS support may not be available on all devices, if your devices do support TLS communication, we recommend utilizing port 10014 for seamless integration.

In some cases, the upgraded version of the device might incorporate TLS support without prior notice. If you come across such a scenario or for further assistance in configuring TLS, we kindly ask you to reach out to your dedicated Adaptive MxDR Service Delivery Lead.

Device Configuration

Prerequisite: Generate certificate on CyberHub using the following steps.

  1. Navigate to support user mode by executing following command su - support on CyberHub terminal and choose option 29 - Manage the TLS certificates.

  2. Choose option 2 - View EA Server TLS certificate and this will print Private Key and Certificate content on console.

  3. Copy certificate from the console output to a file and save it.

Here you should copy and paste content from ----BEGIN CERTIFICATE---- to ----END CERTIFICATE---- .

To configure Microsoft IIS on Windows Server 2012 and 2016

  1. Click Start > Administrative Tools > Internet Information Services (IIS) Manager.

  2. In Connections, select the server or site for which to configure logging.

  3. In Home, click Logging.

image-20240119-065803.png
  1. In Logging > Log File, click W3C in the Format and click Select Fields.

image-20240119-065857.png
  1. In W3C Logging Fields window, click select all fields, then click OK.

  2. To get the real source IPs in the IIS hit logs for servers, create a new custom field (optional)

Field Name – Source-IP

Source Type – Request Header

Source – X-FORWARDED-FOR

image-20240119-070313.png
  1. Please proceed with restarting IIS. Following this action, our IIS logs will display the IP addresses of client PCs instead of the IP addresses of the load balancer.

To configure NxLog Agent for Microsoft IIS logs on port 10014

  1. Download and install the NXLog Windows agent from the following location: https://nxlog.co/products/nxlog-community-edition/download.

  2. Navigate to services.msc and stop the nxlog service.

  3. Navigate to the folder C:\Program Files\nxlog\data and delete the file configcache.dat if it present.

  4. Rename the attached

    View file
    nameNxlog_MS-IIS_TCP.conf
    file to nxlog.conf and copy into C:\Program Files\nxlog\conf. folder.

  5. Replace the placeholder CyberHub IP with the actual CyberHub IP in the nxlog.conf file.

  6. Copy the previously created certificate file on Windows machine where nxlog agent is installed and mentioned this cert path in nxlog.conf against "CAFile" on line number 45.

  7. Now, start the NxLog service from services.msc.

  8. NXLog agent logs will be available at the location C:\Program Files\nxlog\data\nxlog.log.

  9. The log flow should work, and you can check it using tcpdump with the command tcpdump -AA port 10014

Log configuration via Epilog Agent (version 5.4.1 onwards)

To enable logging

  1. Login to Snare Epilog Console using Web UI.

  2. Navigate to Log Configuration > Add

image-20240119-072008.png
  1. Select Custom Event Log in Select the Log Type and mention Epilog-IISWebLog.

  2. Select Single line only in Multi-Line Format

  3. Enable Send Comments

  4. Select HTTP log file directory of MS-IIS in Log File or Directory

  5. Provide log file name (in case of multiple files, make it “u_ex%.log”) in Log Name Format

  6. Click Change Configuration to save your configuration.

image-20240119-072047.png

To configure destination

  1. Navigate to Destination Configuration

image-20240119-072132.png
  1. Mention CyberHub IP Address in Domain/IP in Network Destination

  2. Mention Port as 10013

  3. Select TCP as protocol

  4. Select SYSLOG (RFC3164) in format

  5. Select Space [] in Delimiter Character

image-20240119-072204.png
  1. Click Update Destinations to save your configuration

  2. Navigate to Menu and click Apply Configuration and Restart Service.

Log configuration via Syslog-NG Agent (version 5.4.1 onwards)

To configure HTTP logging

  1. Navigate to Settings > Eventlog Sources in syslog-ng Agent

  2. Click Disable in Setting. This will prevent syslog-ng to send windows event logs further. (Recommended)

  3. Click File Sources, select to Enable

  4. Click Add, opens File Source Property window.

  5. Browse the directory where MS-IIS store its HTTP log files in Base Directory

  6. Browse the file which you want to be monitored in File Name Filter

  7. Mention MSIISHTTP in Application Name

  8. Click Ok to save the configurations.

image-20240119-072355.png

To configure destination:

  1. Right-click on Destinations and click Add New Server

  2. Select Server tab

  3. Select Enable Flow Control

  4. Add CyberHub IP Address in Server Name or Address (IPv4) field

  5. Mention port number as 10013 in Server Port

image-20240523-195549.png
  1. Select Messages tab

  2. Select Legacy BSD Syslog Protocol in Protocol field and mention below text in Template field:

Code Block
NXLOG|${HOST}|OFFBOX-MSFTWEBIIS-TO-LCP|${FILE_NAME}|::::${MSG}
image-20240119-072448.png
  1. Click Ok to save the configurations.

  2. Start the syslog-ng service.

We have removed FTP configuration steps, as parser does not support ftp logging.

Integration Parameters

Parameters required from customer for Integration.

Property

Default Value

Description

IP Address

Microsoft IIS interface IP address

Hostname or IP address of the device which forwards logs to the CyberHub