Accenture MDR Quick Start Guide for Microsoft Windows Defender Firewall (Generic TCP)
This quick start guide will help Accenture Security customers configure Microsoft Windows Defender Firewall TCP to send logs to the Log collection Platform (LCP).
Â
This document includes the following topics:
Supported Versions
A list of supported versions is available in the Accenture MDR Supported Products List document
(Accenture_MDR_Supported_Products_List.xlsx) which can be found at Accenture MDR Portal.
Port Requirements
Table 1-1: Port requirements for LCP communication.
Source | Destination | Port | Description |
Microsoft Defender Firewall | LCP | 10013 (TCP with Non-TLS) or 10014 (TCP with TLS) | Default port |
Configuring Microsoft Windows Defender Firewall
Â
Open the Group Policy Management Console and navigate to Windows Defender Firewall with Advanced Security.
2. In the details pane, in the Overview section, click Windows Defender Firewall Properties.
3.For each network location type (Domain, Private, Public), perform the following steps.
a. Click the tab that corresponds to the network location type(Domain, Private, Public).
b. Under Logging, click Customize.
c. The default path for the log is %windir%\system32\logfiles\firewall\pfirewall.log
Important:Â Â The default file location must have permissions assigned that permit the Windows Defender Firewall service to write to the log file.
d. The default maximum file size for the log is 4,096 kilobytes (KB). If you want to change this size, clear the Not configured check box, and type in the new size in KB, or use the up and down arrows to select a size. The file won't grow beyond this size; when the limit is reached, old log entries are deleted to make room for the newly created ones.
e. No logging occurs until you set one of following two options:
f. To create a log entry when Windows Defender Firewall drops an incoming network packet, change Log dropped packets to Yes.
g. To create a log entry when Windows Defender Firewall allows an inbound connection, change Log successful connections to Yes.
h. Click OK twice.
i. Repeat above steps for all three network location type Domain, Private and Public.
To configure Windows Nxlog Agent, follow any one of the below options
Windows NxLog Agent for Non TLS TCPÂ
Windows NxLog Agent for TLS TCP
Steps to configure Windows NxLog Agent for Non TLS TCPÂ Log flow on port 10013
Download and Install NxLog agent from Download
Go to services.msc and stop the nxlog service
Go to folder C:\Program Files (x86)\nxlog\data and delete configcache.dat
For Windows Agent , go to the installed location C:\Program Files (x86)\nxlog\conf
Copy the below Windows Defender Firewall(Non - TLS) steps to nxlog.conf file attached
6. Replace LCP_IP_Address with actual LCP IP address in nxlog.conf
7. Now start the nxlog service from services.msc
8.NxLog agent logs will be available at location C:\Program Files (x86)\nxlog\data\nxlog.log
Steps to configure Windows NxLog Agent for TLS TCPÂ Log flow on port 10014
Download and Install NxLog agent from location Download
Go to services.msc and stop the nxlog service
Note:Â Please contact the Accenture MDR onboarding team to obtain the certificate
3. Place the certificate in the Windows server which is obtained from the MDR onboarding team at your desired location
4. Go to folder C:\Program Files (x86)\nxlog\data and delete configcache.dat
5. For Windows Agent, go to installed location C:\Program Files (x86)\nxlog\confÂ
6. Copy the below Windows Defender Firewall(TLS) steps to nxlog.conf file attached
7. Replace LCP_IP_Address with actual LCP IP address in nxlog.conf
8. Provide the file location for the CA certificate on the DNS server
9. Now start the nxlog service from services.msc
10. NxLog agent logs will be available at location C:\Program Files (x86)\nxlog\data\nxlog.log
LCP Configuration Parameters
Table 1-2: The Microsoft Windows defender firewall event collector (Syslog -4008) properties to be configured by MDR are shown in the table.
Property | Default Value | Description |
Protocol | TCP | The default protocol for syslog. |
IP Address | Microsoft Windows Defender Firewall Interface IP address | Logging device IP address mentioned in the Pre-Installation Questionnaire (PIQ). Note: If the device sends logs using multiple interfaces, contact the MDR onboarding team. |
Port Number | TCP/10013 or TCP/10014 | The default port for TCP. Note: The LCP can be configured to listen on a non-standard port, please advise the Accenture MDR onboarding team if this is a requirement. |
Â
Â
Legal Notice
Copyright © 2021 Accenture. All rights reserved.
Accenture, the Accenture Logo, and DeepSight Intelligence are trademarks or registered trademarks of Accenture in the U.S. and other countries. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Accenture and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. ACCENTURE SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Accenture as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.