Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

About The Device

When we review an event log, we have a lot of information available to us about the action that was taken on an asset, no matter if the log source is an endpoint, network or authentication event, to name just a few.

Device Information

 Entity

Particulars

Vendor Name

Microsoft

Product Name

Windows Active Directory

Type of Device

Hosted

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol

Log collection method

Microsoft AD

 WINDOWS_AD

 JSON

 CyberHub

Port Requirements

Source

Destination

Port

Windows AD

CyberHub

6514 (TLS)

Device Configuration

Pre-requisite:

Obtain the CyberHub Certificate by contacting the Accenture Onboarding Team.

Configuring the Windows Server

  1. Configure all systems with the UTC time zone.

  2. Create and set up a Powershell script to gather log data and store it in an output file on each Microsoft Windows Active Directory server.

  3. Create a file with the ps1 extension and paste the below code.

     # Set the location where the log file will be written
    $OUTPUT_FILENAME="<Path_of_the_output_file>"
    
    If (Test-Path -Path $OUTPUT_FILENAME) { Remove-Item -path $OUTPUT_FILENAME -ErrorAction SilentlyContinue}
    
    # USER_CONTEXT: Gets all Active Directory users and their properties.
    Get-ADUser -Filter * -properties samAccountName | % { Get-ADUser $_.SamAccountName -properties * | ConvertTo-JSON -compress | Out-File -encoding utf8 $OUTPUT_FILENAME -Append }
    
    # ASSET_CONTEXT: Gets all Active Directory assets and their properties.
    Get-ADComputer -Filter * -properties samAccountName | % { Get-ADComputer $_.SamAccountName -properties * | ConvertTo-JSON -compress | Out-File -encoding utf8 $OUTPUT_FILENAME -Append }

Notes : See the following example. Change the value of $OUTPUT_FILENAME to the location where the output file should be written. This file will be read by NXLog. Data must be stored in JSON format. Set encoding to utf8. Use the -Filter parameter, rather than the -LDAPFilter parameter when calling the Get-ADUser and Get-ADComputer cmdlets.

  1. Create a recurring task that runs the script to fetch and write data to the output file.

  2. Open the Task Scheduler application.

  3. Click on "Create task" on the right panel.

  4. Enter the Name and Description for the task.

  5. Select the "Run with highest privileges" checkbox to make sure all data is retrieved.

image-20240201-082432.png

  1. In the "Triggers" tab, define when you want to repeat the task.

image-20240201-082541.png

image-20240201-082633.png

  1. In the "Action" tab, add a new action and provide the path of the file where the script is stored.

image-20240201-083003.png

Configuring the NXLog Agent for log forwarding

  1. Download and install the NXLog agent from the following location: https://nxlog.co/products/nxlog-community-edition/download.

  2. Navigate to services.msc and stop the nxlog service.

  3. Go to the folder "C:\Program Files\nxlog\data" and delete the file "configcache.dat" if it present.

  4. Navigate to the installed location "C:\Program Files\nxlog\conf." Rename the attached file to "nxlog.conf" and copy it into this folder.

  5. Replace the placeholder "CyberHub IP" with the actual CyberHub IP in the nxlog.conf file.

  6. Replace the placeholder "output_file_location" with the actual full path of the Powershell script output file in the nxlog.conf file.

  7. Copy the previously created certificate on Windows machine where nxlog agent is installed and mentioned this cert path in nxlog.conf against "CAFile" on line number 52.

  8. Now, start the nxlog service from services.msc.

  9. NXLog agent logs will be available at the location "C:\Program Files\nxlog\data\nxlog.log".

  10. The log flow should work, and you can check it using tcpdump with the command "tcpdump --AA port 10014"

Integration Parameters

Parameters required from customer for Integration.

Property

Default Value

Description

IP Address

Windows AD IP address

Hostname or IP address of the device which forwards logs to the CyberHub.

  • No labels