About The Device
Windows Sysmon, short for System Monitor, is a powerful system monitoring utility developed by Microsoft. Designed to enhance the visibility of system activity and aid in the detection of malicious behavior, Sysmon provides detailed information about processes, network connections, registry changes, and more. Its features include the logging of process creation, termination, and network connections, allowing security professionals to analyze system behavior and identify potential threats.
Device Information
Entity | Particulars |
---|---|
Vendor Name | Microsoft |
Product Name | Windows Sysmon |
Type of Device | Hosted |
Collection Method
Log Type | Ingestion label | Preferred Logging Protocol - Format | Log collection method |
---|---|---|---|
Windows Sysmon | WINDOWS_SYSMON | NXLog = JSON | CyberHub |
Port Requirements
Source | Destination | Port |
---|---|---|
Microsoft Windows Sysmon | CyberHub | 6514 (TLS) |
To facilitate secure communication and align with our best practice, we strongly encourage the use of Transport Layer Security (TLS) between your security devices and our Adaptive MxDR platform for event forwarding.
While we understand that TLS support may not be available on all devices, if your devices do support TLS communication, we recommend utilizing port 6514 for seamless integration.
In some cases, the upgraded version of the device might incorporate TLS support without prior notice. If you come across such a scenario or for further assistance in configuring TLS, we kindly ask you to reach out to your dedicated Adaptive MxDR Service Delivery Lead.
Device Configuration
Click here to configure device log forwarding with the Nxlog
Click here to configure device log forwarding with the Splunk
To Configure the NXLog Agent for log forwarding
Pre-requisite:
Obtain the CyberHub Certificate by contacting the Accenture Onboarding Team.
Steps to perform on Nxlog Agent
Download and install the NXLog agent from the following location: https://nxlog.co/products/nxlog-community-edition/download.
Navigate to
services.msc
and stop the nxlog service.Navigate to the folder
"C:\Program Files\nxlog\data"
and delete the file"configcache.dat"
if it is present.Navigate to the installed location
"C:\Program Files\nxlog\conf."
Rename the attached file to"nxlog.conf"
and copy it into this folder.Replace the placeholder
"CyberHub IP"
with the actual CyberHub IP in the nxlog.conf file.Copy the certificate on Windows machine where nxlog agent is installed and mentioned this cert path in nxlog.conf against "CAFile" on line number 63.
Now, start the nxlog service from services.msc.
NXLog agent logs will be available at the location
"C:\Program Files\nxlog\data\nxlog.log"
.The log flow should work, and you can check it using tcpdump with the command
"tcpdump -AA port 6514"
TimeZone handling via NXLog.conf :
If the Local System Time is not set to UTC, lets say it is “Eastern Standard Time“ - then configure the nxlog.conf file (attached above) to override the timezone value using conditional logic. For example - if local System time is set to “Eastern Standard Time“, then use “else if ( $Offset == "Eastern Standard Time" ) $EventTime = $EventTime + (3600*5);“. Adjust the timezone accordingly based on the locally set time zone, altering the value by adding or subtracting seconds.
To Configure the Splunk for log forwarding
Pre-requisite:
All the windows machines should have Splunk Forwarder installed.
All the windows machines Sysmon logs should be forwarded to Splunk indexer with inputs.conf file with property
renderXml=true
to forward logs in xml format.
Steps to perform on Splunk Server
Navigate to the Splunk installation root folder:
%Splunk_Installation_Path%\etc\system\local\outputs.conf
. All the configuration changes must to be performed on the file in the local folder.Edit the
outputs.conf
file and do one of the configuration steps: [ If you do not have existing syslog configuration, add the following configuration under syslog. ][syslog] defaultGroup = AccentureMxDR [syslog:AccentureMxDR] server = CyberHub_IP_Address:Port_Number type = tcp maxEventSize = 16384 sendCookedData = false priority = NO_PRI syslogSourceType = XmlWinEventLog ==================================== ------- Notes ----------- ==================================== Server: Add CyberHub IP address and Port number Type: Default is udp for Splunk, but MDR recommends TCP. MaxEventSize: MDR recommended value. All events exceeding this size will be truncated.
Edit the
props.conf
file and add the below routing attribute at the bottom.[source::WinEventLog:*] TRANSFORMS-WinEventLog=AccentureMxDRStanza - This can be any name.
Save and close the file.
Navigate to the Splunk installation root folder
%Splunk_Installation_Path%\etc\system\local\transforms.conf
. All the configuration changes must be performed on the file in the local folder.Edit the
transforms.conf
file and add the below stanza at the bottom.Edit
$SPLUNK_HOME/etc/system/local/transforms.conf
and set rules to match yourprops.conf
stanza (i.e. AccentureMxDRStanza):[AccentureMxDRStanza] # This is stanza name which is defined in props.conf. REGEX=. DEST_KEY=_TCP_ROUTING FORMAT=AccentureMxDR #This is group name which defined in outputs.conf file
Restart the Splunk service.
All these file attributes are case-sensitive and has to be used as mentioned.
Integration Parameters
Parameters required from customer for Integration.
Property | Default Value | Description |
---|---|---|
IP Address | Microsoft Windows Sysmon interface IP address | Hostname or IP address of the device which forwards logs to the CyberHub. |