Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Current »

This quick start guide will help Accenture MDR customers configure Splunk® Enterprise™ for Windows® to send logs to the Log collection Platform (LCP).

The document includes the following topics:

Supported Versions

A list of supported versions is available in the Accenture MDR Supported Products List document (Accenture_MDR_Supported_Products_List.xlsx) which can be found in Accenture MDR Portal - https://mss.accenture.com/PortalNextGen/Reports/Documents

Port Requirements

Table 1-1: Port requirements for LCP communication.

Source

Destination

Port

Description

Splunk Enterprise for Windows events

LCP

514 (UDP) or

601 (TCP)

Default port

Note: Please discuss with onboarding team if you have any technologies sending logs to LCP with same port and protocol

Configuring Splunk Enterprise for Windows Events

Note: 

  • Splunk Heavy Forwarder sends indexed events to the LCP using syslog protocol, which uses RFC 5424. Splunk provides the parameters to set the maximum size of an event that can be transmitted over syslog. This functionality has been introduced in version 6.2; therefore, Microsoft Windows via Splunk Enterprise Syslog event collector will not be supporting previous releases over syslog.

  • You need to configure Splunk Enterprise to send syslog messages to the LCP and also configure it to send only Windows-based logs to the LCP. Splunk indexes data from a number of different products, but Accenture Security MDR monitors only Windows events. So, the configuration should be such as to send only Windows container logs to the LCP. To accomplish this, a syslog output processor is required which is only a part of heavy forwarder (Splunk Enterprise).

  • The file path given in the configuration steps is same in both Windows and Linux platform. You need to navigate to the Splunk installation root folder to configure the above mentioned file. These files (output.conf, transform.conf, and props.conf) can also be present under a different location, such as …\etc\system\default\..., but for given configuration to work, the file under the “local” folder needs to be changed.

 To configure Splunk to send the output using syslog, follow the steps below.

  1. Navigate to the Splunk installation root folder: %Splunk_Installation_Path%\etc\system\local\outputs.conf. All the configuration changes must to be performed on the file in the local folder. 

  2. Edit the outputs.conf file and do one of the configuration steps:

If you do not have existing syslog configuration, add the following configuration under syslog.

[syslog]

defaultGroup = SymantecMSS

[syslog:SymantecMSS]

server = LCP_IP_Address:Port_Number

type = tcp

priority = 13

timestampformat =  %b %d %H:%M:%S

maxEventSize = 16384

Note:

Server: Add LCP IP address and Port number

Type: Default is udp for Splunk, but MDR recommends TCP.

Priority: 13 is default value for auditing. Collector doesn't support if this field is set to NO_PRI.  Refer the URL for reference:  http://docs.splunk.com/Documentation/ Splunk/6.2.2/Admin/Outputsconf). 

MaxEventSize: MDR recommended value. All events exceeding this size will be truncated.

If you have an existing syslog configuration, add the following configuration after the existing group. 

For example, you may have the existing group name as "Sync1" and the Symantec MDR specified group is "SymantecMSS". So the settings need to be explicit and independent as below.

[syslog]

defaultGroup = Sync1,SymantecMSS

[syslog:Sync1]

server = customer_defined_server

Attribute2…=

Attribute3…=

# This ends settings for Sync1. Add, MSS defined settings here:

[syslog:SymantecMSS]

server = LCP_IP_Address:Port_Number

type = tcp

priority = 13

timestampformat =  %b %d %H:%M:%S

maxEventSize = 16384

 

Note:

  • Server: Add LCP IP address and Port number

  • Type: Default is udp for Splunk, but MDR recommends TCP.

  • Priority: 13 is default value for auditing. Collector doesn't support if this field is set to NO_PRI.  Refer the URL for reference:  http://docs.splunk.com/Documentation/ Splunk/6.2.2/Admin/Outputsconf). 

  • MaxEventSize: MDR recommended value. All events exceeding this size will be truncated.

 To configure Splunk to route only Windows logs to the LCP and filter others, follow the steps below.

  1. Navigate to the Splunk installation root folder %Splunk_Installation_Path%\etc\system\local\props.conf. All the configuration changes must to be performed on the file in the local folder. 

2. Edit the props.conf file and add the below routing attribute at the bottom.

[source::WinEventLog:*]

TRANSFORMS-WinEventLog=SymantecMSSStanza - This can be any name.

3. Save and close the file.

4. Navigate to the Splunk installation root folder %Splunk_Installation_Path%\etc\system\local\transforms.conf. All the configuration changes must be performed on the file in the local folder.

5. Edit the transforms.conf file and add the below stanza at the bottom.

6. Edit $SPLUNK_HOME/etc/system/local/transforms.conf and set rules to match your props.conf stanza (i.e. SymantecMSSStanza):

[SymantecMSSStanza]

# This is stanza name which is defined in props.conf.

REGEX=.

DEST_KEY=_SYSLOG_ROUTING

FORMAT=SymantecMSS

# This is group name which defined in outputs.conf file

 

Note: All these file attributes are case-sensitive and has to be used as mentioned. Refer the following documentation for complete visibility on configuration: 

http://docs.splunk.com/Documentation/Splunk/6.2.2/Admin/Outputsconfhttp://docs.splunk.com/Documentation/Splunk/6.2.2/Admin/Propsconf, and http://docs.splunk.com/Documentation/Splunk/6.2.2/Admin/Transformsconf

 LCP Configuration Parameters

Table 1-2: The Splunk Enterprise for Windows event collector (Syslog - 3780) properties to be configured by MDR are shown in the table.

Property

Default Value

Description

Protocol

TCP

Default protocol for syslog events.

IP Address

Splunk Enterprise for Windows IP address

Logging device IP address mentioned in the Pre-Installation Questionnaire (PIQ).

Note: If the device sends logs using multiple interfaces, contact the Accenture Security MDR onboarding team.

Signature

LogName=Security,

LogName=Application,

LogName=System

MDR recommended signatures processed by the Splunk Enterprise for Windows event collector.

Port Number

601

The default port for syslog.

Note: Please discuss with onboarding team if you have any technologies sending logs to LCP with same port and protocol

Sample Logs

Windows 2008

Jul 25 06:16:06 Test 07/25/2014 06:16:06 AM LogName=Security SourceName=Microsoft Windows security auditing. EventCode=4754 EventType=0 Type=

Information ComputerName=example.com TaskCategory=Security Group Management OpCode=Info RecordNumber=1901 Keywords=Audit Success Message=A security-enabled universal group was created.

Subject: Security ID: NT AUTHORITY\ANONYMOUS LOGON Account Name:ANONYMOUS LOGON Account Domain: TEST Logon ID: 0x3e6 Group:Security ID: SY\Enterprise Read-only Domain Controllers Group Name:

Enterprise Read-only Domain Controllers Group Domain: SY Attributes:SAM Account Name: Enterprise Read-only Domain Controllers SID History: -Additional Information: Privileges:

System Log

Oct 07 12:48:24 Test 10/07/2014 12:48:24 PM LogName=System SourceName=WinHttpAutoProxySvcEventCode=12503 EventType=4 Type=Information ComputerName=SYMANTEC-XITEST5

Category=0 CategoryString=none RecordNumber=89088 Message=The WinHTTPWeb Proxy Auto-Discovery Service has been idle for 15 minutes,it will be shut down.

Application Log

Jun 30 07:30:32 Test 06/30/2014 07:30:32 AM LogName=Application SourceName=ESENTEventCode=327 EventType=4 Type=Information ComputerName=WIN-LAGTESTN10J TaskCategory=General OpCode=Info

RecordNumber=396975Keywords=Classic Message=svchost(1444) The database engine detached a database(1, C:\Windows\system32\LogFiles\Sum\SystemIdentity.mdb).(Time=0 seconds) Internal Timing Sequence:

[1] 0.000, [2] 0.000,[3] 0.000, [4] 0.000,[5] 0.000, [6] 0.016, [7] 0.000, [8] 0.000, [9] 0.000, [10] 0.000,[11] 0.000, [12] 0.000.Revived Cache: 0

  • No labels