Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log Collection Method

Windows Defender AV

WINDOWS_DEFENDER_AV

NXLog = Syslog - JSON over Syslog

CyberHub

Port Requirements

...

Device Configuration

Prerequisite

  1. Generate certificate on CyberHub using the following steps.

    1. Go to support user mode by executing following command "su - support" on CyberHub terminal and choose “option 29 - Manage the TLS certificates".

    2. Choose “option 2 - View EA Server TLS certificate" and this will print Private Key and Certificate content on console.

    3. Copy certificate from the console output to a file and save it.
      Note:- Here you should copy and paste content from ----BEGIN CERTIFICATE---- to ----END CERTIFICATE---- .

  2. Contact Adaptive MxDR on-boarding engineer to get CyberHub certificate.

  3. Despite Windows Defender AV being automatically enabled in Windows Servers by default, it is essential to verify that it remains activated.

...

  1. Download and install the NXLog agent from the following location: https://nxlog.co/products/nxlog-community-edition/download.

  2. Navigate to services.msc and stop the nxlog service.

  3. Go to the folder "C:\Program Files\nxlog\data" and delete the file "configcache.dat" if it present.

  4. Navigate to the installed location "C:\Program Files\nxlog\conf." Rename the attached

    View file
    nameNXLog.conf
    file to "nxlog.conf" and copy it into this folder.

  5. Replace the placeholder "CyberHub IP" with the actual CyberHub IP in the nxlog.conf file.

  6. Copy the previously created certificate file on Windows machine where nxlog agent is installed and mentioned this cert path in nxlog.conf against "CAFile" on line number 5351.

  7. Now, start the nxlog service from services.msc.

  8. NXLog agent logs will be available at the location "C:\Program Files\nxlog\data\nxlog.log".

  9. The log flow should work, and you can check it using tcpdump with the command "tcpdump -AA port 6514"

...