Accenture MDR Quick Start Guide for Windows®

This quick start guide will help Accenture MxDR customers configure Windows® servers to send logs to the Log collection Platform (LCP).

The document includes the following topics:

Supported Versions

A list of supported versions is available in the Accenture MxDR Supported Products List document (Accenture_MDR_Supported_Products_List.xlsx) which can be found at Accenture Portal - https://mss.accenture.com/PortalNextGen/Reports/Documents

Port Requirements

Table 1-1: Port requirements for LCP communication.

Source

Destination

Port

Description

Windows server

LCP

514 (UDP) or

601 (TCP)

Default port

Configuring Windows Server

You can configure Windows to send syslog messages to the LCP using the following agents:

Configuring the Snare agent  5.6.0 for log forwarding

  1. Access the Snare control interface using one of the following methods.

    1. Enter the following URL via a web browser on the local machine:
      http://localhost:6161/

    2. Navigate to the Snare installation directory and open the file openweb.bat.

  2. From the left pane menu, Click Destination Configuration, go to Network Destinations.

    Domain/IP - Type the IP address of the LCP.
    Port - Type the port number used for Syslog communication. Use 6514 for TLS, 601 for TCP and 514 for UDP.
    Protocol - Select TLS (MxDR Preferred Method) or TCP or UDP
    Format- Select Format as SYSLOG (RFC3164)
    Delimiter Character - Select Delimiter Character as TAB

3. Check Enable Use Host IP Address as source address.

4. Set SYSLOG Facility to Local4.

5. Click on Update Destinations to save configuration.

6. While using TLS protocol for Log forwarding, click Security Certificate and keep Network Destination Certificate Verification setting to Accept Any. 

Note : The ability to send events to multiple hosts or using the TLS OR TCP protocol is provided with the Enterprise Version of the Snare agent. Please refer the vendor documentation for more information.

 

To ensure all type of events are configured for Snare

  1. On the Snare web interface, go to Audit Policy Configuration from left pane.

  2. Click on Add Audit Policy. 

3. In the Identify the event logs section, check all the options.

4. Select the Exclude option for Event ID Match Type.

5. In the Event ID Search Term box, enter 5156 to filter self-generated connection logs.

6. Click Change Configuration.

Find the below snapshots for an entire configuration :

7. From the left pane menu, click Apply Configuration & Restart Service. 

Note :

 

Configure Lasso to send Syslog messages

  1. From the Lasso host computer, navigate to the Lasso installation directory.

  2. Edit the Lasso.ini configuration file to use the following format:

LogAppliance,IP_Address,Port_Number,udp

  • LogAppliance is a reserved keyword and must be the first parameter.

  • IP_Address is the IP address of the LCP. You must specify the IP address.

  • Port_Number is the port number used for Syslog communication. The default Syslog port is 514. You also can configure a different port.

  • You must specify UDP as the protocol.

For example, if the LCP’s IP address is 192.0.2.1, and the Syslog port is 514, then the corresponding line in the Lasso.ini file is as follows:  LogAppliance,192.0.2.1,514,udp

3. Save and close the Lasso.ini configuration file.

4. Restart the Lasso service.

 

Configure Balabit Syslog agent

  1. Click Start > All Programs > syslog-ng Agent for windows > Configure syslog-ng Agent for windows.

  2. In the Syslog-ng-agent configuration window, in the left pane, select Destinations.

  3. In the right pane, right-click Destination Global Settings, and select Add New Server.

  4. In the Server Property window, click the Server tab.

  5. In the Server Name or Address (IPv4) field, enter the IP address or name of the machine on which the LCP is installed.

  6. In the Server Port field, enter the port number used for Syslog communication.

  7. Click the Messages tab.

  8. Select Snare Protocol from the Protocol drop-down list.

  9. Click OK.

  10. Restart the syslog-ng agent service

 

Configure Nxlog Agent

Nxlog is a snare like agent to forward windows event logs. To get snare format logs from the nxlog agent, do the following:  

  1. Edit the file nxlog.conf: The nxlog configuration file, nxlog.conf is available at either C:\ProgramFiles\nxlog\conf or C:\ProgramFiles (x86)\nxlog\conf while installing through standard installation but this folder could also be set to any custom path during installation. 

  2. Using a text editor, open nxlog.conf.

  3. Configure nxlog: The most common use-case for nxlog on windows is to collect logs from the EventLog subsystem and forward it over the network.  Here is a simple configuration which reads the EventLog and forwards it over UDP in the SNARE agent format :

## This is a sample configuration file created by Accenture MxDR
## See the nxlog reference manual about the configuration options.
## It should be installed locally and is also available
## online at http://nxlog.org/nxlog-docs/en/nxlog-reference-manual.html

## For Standard installation, Nxlog configuration files path could be available
## on either C:\\Program Files\\nxlog or C:\\Program Files (x86)\\nxlog path
## But this path could also be set to any custom one during installation. 

## Please set the ROOT to the folder where your nxlog was installed into,  
## otherwise it will not start. 

## Here we have provided two ROOT config blocks 
## You can use either of them by commenting out the other
## You can also define any custom ROOT configuration and remove these blocks

define ROOT C:\\Program Files\\nxlog
define ROOT_STRING C:\\Program Files\\nxlog

#define ROOT C:\\Program Files (x86)\\nxlog
#define ROOT_STRING C:\\Program Files (x86)\\nxlog

 

define CERTDIR %ROOT%\\cert
Moduledir %ROOT%\\modules
CacheDir %ROOT%\\data
Pidfile %ROOT%\\data\\nxlog.pid
SpoolDir %ROOT%\\data
LogFile %ROOT%\\data\\nxlog.log

<Extension syslog>
Module xm_syslog
</Extension>

# Windows Event Log
<Input eventlog>
# Uncomment im_msvistalog for Windows Vista/2008/2012 and later
Module im_msvistalog

#Uncomment im_mseventlog for Windows XP/2000/2003
#Module im_mseventlog

<QueryXML>
<QueryList>
<Query Id='1'>
<Select Path='Application'>*</Select>
<Select Path='Security'>*</Select>
<Select Path='System'>*</Select>
<!-- To send Microsoft Active Directory Domain Services logsTo send Microsoft Active Directory Domain Services logs -->
<!-- <Select Path='Directory Service'>*</Select> -->
</Query>
</QueryList>
</QueryXML>

 

#For nxlog older version 
#MxDR recommendation to drop self-loop logs, Uncomment the following line to enable thit
#Exec if ($EventID == 5156 AND $DestinationPort == 514) drop();

#For nxlog v3.0.2284 version and onwords
#MxDR recommendation to drop self-loop logs, Uncomment the following line to enable this
#Exec if ($EventID == 5156) AND ($DestPort == '514') drop();

#To send logs in English language when the Windows OS is in Non-English#This feature is available only in NXLog enterprise edition.

#Language en-US
</Input>

 

<Output out>
Module om_udp
Host LCP_IP
Port 514
Exec to_syslog_snare();
</Output>

<Route 1>
Path eventlog => out
</Route>

 

 

4. Start nxlog: Start nxlog using one of the following methods:

  • Start the Service Manager. Select ’nxlog’ in the list and, then start the service.

  • Double-click on nxlog.exe.

Outcome:

  • Supported log collection mechanism: Syslog

  • Preferred log collection mechanism: Syslog

  • Event flow logical diagram : Snare AgentĂ Remote Syslog Server

LCP Configuration Parameters

Table 1-2: Windows event collector (Syslog - 3241) sensor properties to be configured by MxDR are shown in the table.

Property

Default Value

Description

Protocol

UDP

The default protocol for syslog. The collector can also accept logs in TCP.

Note: While TCP offers guaranteed delivery of log packets, it places a larger overhead on the LCP. To balance TCP for reliability over UDP for speed/simplicity, contact the Accenture MxDR onboarding team.

IP Address

Windows server interface IP address

Logging device IP address mentioned in the Pre-Installation Questionnaire (PIQ).

Note: If the device sends logs using multiple interfaces, contact the Accenture MxDR onboarding team.

Signatures

MSWinEventLog, SnareServerLog

MxDR recommended signatures processed by the Snare for Windows event collector.

Port Number

514

The default port number for syslog. For TCP, the default port is 601. Syslog TLS uses TCP/6514.

Note: The LCP can be configured to listen on a non-standard port, please advise the Accenture MxDR onboarding team if this is a requirement.

 

 

Legal Notice

Copyright © 2021 Accenture. All rights reserved.

Accenture, the Accenture Logo, and DeepSight Intelligence are trademarks or registered trademarks of Accenture in the U.S. and other countries. Other names may be trademarks of their respective owners.

The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Accenture and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. ACCENTURE SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Accenture as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.