About the Device
An IIS web server runs on the Microsoft .NET platform on the Windows OS. It’s versatile and stable, and it’s been widely used in production for many years. A web server is a process for hosting web applications. The web server allows an application to process messages that arrive through specific TCP ports (by default). For example, the default port for HTTP traffic is 80, and the one for HTTPS is 443.
Device Information
Entity | Particulars |
---|---|
Vendor Name | Microsoft |
Product Name | IIS |
Type of Device | Hosted |
Collection Method
Log Type | Ingestion label | Preferred Logging Protocol - Format | Log collection method |
---|---|---|---|
Microsoft IIS | IIS | Syslog - Structured | CyberHub |
Port Requirements
Source | Destination | Port |
---|---|---|
Microsoft IIS | CyberHub | 10014 (TCP) |
To facilitate secure communication and align with our best practice, we strongly encourage the use of Transport Layer Security (TLS) between your security devices and our Adaptive MxDR platform for event forwarding.
While we understand that TLS support may not be available on all devices, if your devices do support TLS communication, we recommend utilizing port 10014 for seamless integration.
In some cases, the upgraded version of the device might incorporate TLS support without prior notice. If you come across such a scenario or for further assistance in configuring TLS, we kindly ask you to reach out to your dedicated Adaptive MxDR Service Delivery Lead.
Device Configuration
Prerequisite: Generate certificate on CyberHub using the following steps.
Navigate to support user mode by executing following command
su - support
on CyberHub terminal and chooseoption 29 - Manage the TLS certificates
.Choose
option 2 - View EA Server TLS certificate
and this will print Private Key and Certificate content on console.Copy certificate from the console output to a file and save it.
Here you should copy and paste content from ----BEGIN CERTIFICATE----
to ----END CERTIFICATE----
.
To configure Microsoft IIS on Windows Server 2012 and 2016
Click Start > Administrative Tools > Internet Information Services (IIS) Manager.
In Connections, select the server or site for which to configure logging.
In Home, click Logging.
In Logging > Log File, click W3C in the Format and click Select Fields.
In W3C Logging Fields window, click select all fields, then click OK.
To get the real source IPs in the IIS hit logs for servers, create a new custom field (optional)
Field Name – Source-IP
Source Type – Request Header
Source – X-FORWARDED-FOR
Please proceed with restarting IIS. Following this action, our IIS logs will display the IP addresses of client PCs instead of the IP addresses of the load balancer.
To configure NxLog Agent for Microsoft IIS logs on port 10014
Download and install the NXLog Windows agent from the following location: https://nxlog.co/products/nxlog-community-edition/download.
Navigate to
services.msc
and stop the nxlog service.Navigate to the folder
C:\Program Files\nxlog\data
and delete the fileconfigcache.dat
if it present.Rename the attached
file tonxlog.conf
and copy intoC:\Program Files\nxlog\conf.
folder.Replace the placeholder
CyberHub IP
with the actual CyberHub IP in the nxlog.conf file.Copy the previously created certificate file on Windows machine where nxlog agent is installed and mentioned this cert path in nxlog.conf against "CAFile" on line number 45.
Now, start the NxLog service from services.msc.
NXLog agent logs will be available at the location
C:\Program Files\nxlog\data\nxlog.log
.The log flow should work, and you can check it using tcpdump with the command
tcpdump -AA port 10014
Log configuration via Epilog Agent (version 5.4.1 onwards)
To enable logging
Login to Snare Epilog Console using Web UI.
Navigate to Log Configuration > Add
Select Custom Event Log in Select the Log Type and mention Epilog-IISWebLog.
Select Single line only in Multi-Line Format
Enable Send Comments
Select HTTP log file directory of MS-IIS in Log File or Directory
Provide log file name (in case of multiple files, make it “u_ex%.log”) in Log Name Format
Click Change Configuration to save your configuration.
To configure destination
Navigate to Destination Configuration
Mention CyberHub IP Address in Domain/IP in Network Destination
Mention Port as 10013
Select TCP as protocol
Select SYSLOG (RFC3164) in format
Select Space [] in Delimiter Character
Click Update Destinations to save your configuration
Navigate to Menu and click Apply Configuration and Restart Service.
Log configuration via Syslog-NG Agent (version 5.4.1 onwards)
To configure HTTP logging
Navigate to Settings > Eventlog Sources in syslog-ng Agent
Click Disable in Setting. This will prevent syslog-ng to send windows event logs further. (Recommended)
Click File Sources, select to Enable
Click Add, opens File Source Property window.
Browse the directory where MS-IIS store its HTTP log files in Base Directory
Browse the file which you want to be monitored in File Name Filter
Mention MSIISHTTP in Application Name
Click Ok to save the configurations.
To configure destination:
Right-click on Destinations and click Add New Server
Select Server tab
Select Enable Flow Control
Add CyberHub IP Address in Server Name or Address (IPv4) field
Mention port number as 10013 in Server Port
Select Messages tab
Select Legacy BSD Syslog Protocol in Protocol field and mention below text in Template field:
NXLOG|${HOST}|OFFBOX-MSFTWEBIIS-TO-LCP|${FILE_NAME}|::::${MSG}
Click Ok to save the configurations.
Start the syslog-ng service.
We have removed FTP configuration steps, as parser does not support ftp logging.
Integration Parameters
Parameters required from customer for Integration.
Property | Default Value | Description |
---|---|---|
IP Address | Microsoft IIS interface IP address | Hostname or IP address of the device which forwards logs to the CyberHub |