Configuring Log Sources
Configuring Log Sources
Configuration
Guide
Version Numbers
Check Point
Log import from most versions and LEA support for R54 and
above
NetScreen
Most version
Cisco Systems
Microsoft ISA
CyberGuard
Cyberoam
FortiNet
WatchGuard
All Firebox Models v 5.x, 6,x, 7.x, 8.x, 10.x, 11, Firebox X series,
x550e, x10e, x1000, x750e
Snort
Most versions
Secure Computing
Sidewinder
SonicWALL
SOHO3, SOHO TZW, TELE3 SP/TELE3 Spi, PRO 230, 2040, 3060,
4060, 5060, TZ 100/ TZ 100w, TZ 170, TZ 170 Wireless, TZ 170
SP Wireless, TZ 200/ TZ 200w, TZ 210/ TZ 210w, NSA 240, NSA
2400, NSA 2400MX, NSA 3500, NSA 4500, NSA 5000, NSA
E5500, NSA E6500, NSA E7500, NSA E8500, NSA E8510,
Management, Application control & SSL-VPN logs
Juniper Networks
NetScreen series
ISG series
2000
3Com
IPCop
Stonesoft
Palo Alto
Uncheck the TCP option. This will make the firewall to send syslogs in the
configured UDP port.
If you would like to send NetScreen logs in WELF to SureLog, the you need to Disable
Syslog Messages and Enable WebTrends Messages in the above steps. For more information,
refer the NetScreen documentation.
Configure/Enable Syslog Messages for Netscreen Firewall device using CLI Console:
Execute the following commands to configure syslog via CLI:
Syngress > set syslog config 10.23.23.2 facilitates local0 local0
Syngress > set syslog config 10.23.23.2 port 514
Syngress > set syslog config 10.23.23.2 log all
Syngress > set syslog enable
To enable the SNMP Manager running in SureLogto make queries to SNMP Agent running in
the firewall:
set snmp host "<community name>" <SureLogIP> [src-interface <interface through which
SureLogis connected>]
Example: The following command example defines the IP address '10.5.1.24' as member of
the SNMP community named 'olympia':
set snmp host "olympia" 10.5.1.24 [src-interface inside]
Enable SNMP manageability on the interface through which the SNMP manager in
SureLogcommunicates with the SNMP agent in the NetScreen device.
set interface <interface name> manage snmp
To add a new SNMP community: (Skip this step, if you have already defined a community)
To enable the SNMP Manager running in SureLogto make queries to SNMP Agent running in
the firewall:
Edit community to add SNMP Manager IP <SureLogIP address> and the source
interface (interface through which SureLogconnects firewall) to that community.
Under communities section, you will find the option to edit community. If SNMP
Agent does not have a community, click 'New Community' button and provide
community string, SNMP Manager IP address <SureLogIP address> and the source
interface (interface through which SureLogconnects firewall) to that community.
Click Apply.
Enable SNMP manageability on the interface through which the SNMP manager in SureLog,
communicates with the SNMP agent in the NetScreen device.
Click OK.
8xx
18xx
28xx
38xx
72xx
73xx
3005
1900
2911
3925
6500
7600
6.x
7.x
Cisco ASA:
5500 series
9.1
3000
3500
Model Family
Model
c871, c876,
c877,c878
12.4(4)T
c1841
12.3(14)T
c1811, c1812
12.4(4)T
c1801, c1802,
c1803
12.4(4)T
28xx
c2801, c2851,
c2821, c2811
12.3(14)T
38xx
c3845, c3825
12.3(14)T
72xx
7206VXR,
7204VXR
12.3(14)T
73xx
CISCO7301
12.3(14)T
8xx
18xx
To find out the version of your PIX firewall, Telnet to the PIX firewall and enter the show
version command.
Cisco PIX does not create log files, but instead directs a log stream to the syslog
server, which writes the log information into a file. Make sure the syslog server
on SureLog can access the PIX firewall on the configured syslog port. For this,
you may have to make a rule specific to this situation.
where,
interface_name
syslog_ip
indicates that logs will be sent using the UDP protocol, to the
configured syslog port on the syslog server. If left blank, the
17/<syslog_port> syslogs are sent through the default syslog port (UDP port 514). If
the logs are sent through any other port, mention it as 17/<the
UDP port number> (For example: 17/1514).
hostname
ipaddress
interface_name
string text
context-name
To verify your configuration, enter the show logging command after the last command
above. This will list the current logging configuration on the PIX firewall.
For every transaction happening in Cisco PIX Firewall, an ACL configured in it matches.
The matched ACL along with complete transaction detail is audited through Message-ID
106100. Ensure that the logging is enabled for 'Message-ID 106100' in Cisco PIX Firewall.
For more information about the message ID follow the below link.
d.
http://www.cisco.com/en/US/docs/security/pix/pix63/system/message/pixemsgs.html#wp108
6617
This message identifier contains the information about both accepted and denied
transactions. The log information is parsed to get the 'Used' rules and is available in the
'Firewall Rules Report > Top Used Rules Report'.
If you want to create a new SNMP community use the below command:
configure terminal
snmp-server community <community-string>
Example:
configure terminal
snmp-server community public
3. If there are no URL Reports available in SureLog for CISCO ASA, enable HTTP inspection by
executing the following command:
inspect http
Enabling HTTP inspection will generate syslogs with ID 304001. This ID will be used
by SureLog to generate URL Reports.
interface_name
syslog_ip
udp/<syslog_port>
indicates that logs will be sent using the UDP protocol, to the
configured syslog port on the syslog server. If left blank, logs will
be sent to the default UDP port 514.
hostname
ipaddress
interface_name
string text
context-name
Disable Logging
You can disable specific syslog IDs based on your requirement.
Note: By selecting the check mark for the Include timestamp in syslogs option, you can add
the date and time that they were generated as a field to the syslogs.
Configuring Cisco ASA NetFlow Logs and Disabling NetFlow on Cisco ASA/ADM using command
line and ASDM
SureLog support NetFlow version 9 packets, which is introduced in Cisco ASA 8.2.1/ASDM
6.2.1.
Configuring ASA device using console mode to send NetFlow version 9 packets to SureLog
is given below:
As SureLog is capable of receiving either Syslog or NetFlow packet from an ASA box, disable
Syslog and enable NetFlow.
Option 1
If you have a global policy map, associate the above netflow class-map netflow-export-class
to the global policy.
For example: if your global policy map is named global_policy_asa, you need to execute the
below commands:
Option 2
If you wish to create a new policy map named netflow-export-policy and make this as your
global policy follow the below steps:
(config)# policy-map netflow-export-policy
(config-pmap)# class netflow-export-class
(config-pmap-c)# flow-export event-type any destination <SureLog Server IP>
if the above command fails use the one below:
(config-pmap-c)# flow-export event-type all destination <SureLog Server IP>
Make policy map netflow-export-policy as your global policy:
(config)# service-policy netflow-export-policy global
For UI mode configuration using ASDM access, refer the Cisco forum topic:
https://supportforums.cisco.com/docs/DOC-6114
configure terminal
snmp-server enable
snmp-server host <interface name> <hostname | IP address of SureLog> [poll]
Example:
configure terminal
snmp-server enable
snmp-server host inside 192.168.101.155 poll
If you want to create a new SNMP community use the below command:
configure terminal
snmp-server community <community-string>
Example:
configure terminal
snmp-server community public
Multi line
Tab Delimited
Comma Delimited
Configure/Enable SNMP Protocol for Cisco Firewall devices using Cisco ASDM tool
Using Web UI:
Configure SNMP parameters for SNMP Versions 1 and 2c
Carry out the following steps:
In the ASDM main window, select Configuration > Device Management > Management
Access > SNMP
In the Community String (default) field, enter default community string. This applies to
SNMP Versions 1 and 2c only
Fill appropriate values in Contact and Location fields
In the Listening Port field, enter the port number of the security appliance that listens for
SNMP requests from management stations; or retain the default port number 161
Click Apply
With this, SNMP parameters for Versions 1 and 2c are configured and the changes are saved
to the running configuration.
To enable the SNMP Manager running in SureLog to make queries to SNMP Agent running
in the firewall:
In the ASDM main window, choose Configuration > Device Management > Management
Access > SNMP
In the SNMP Management Stations pane, click Add. The Add SNMP Host Access Entry dialog
box appears
In the Interface Name drop-down list, choose the interface on which the SureLog resides
In the IP Address field, enter the SureLog IP address
In the UDP Port field, enter the SureLog UDP port, or retain the default port 162
In the Community String field, enter the SureLog community string. If no community string is
specified for a management station, the value set in the Community String (default) field on
the SNMP Management Stations pane is used
In the SNMP Version drop-down list, choose the SNMP version used by the SureLog
If you have selected SNMP Version 3 in the previous step, in the Username drop-down list,
choose the name of a configured user
To specify the method for communicating with this management station, check the Poll
check boxes
Click OK. The Add SureLog Access Entry dialog box closes.
Click Apply.
With this, the management station is configured and changes are saved to the running
configuration.
Configure SNMP Parameters for Version 3:
SNMP Version 3 allows you to configure additional authentication and privacy options for
more secure protocol operations by means of SNMP server groups and users.
Carry out the following steps:
In the ASDM main window, choose Configuration > Device Management > Management
Access > SNMP
In the SNMPv3 Users pane, to add a configured user or a new user to a group, click Add. To
change user parameters, click Edit. To remove a configured user from a group, click Delete.
When you remove the last user in a group, ASDM deletes the group
Note:
Once a user is created, you cannot change the group to which the user
belongs.
Indicate the type of encryption you want to use by clicking the appropriate radio button: DES
or 3DES, or AES
If you chose AES encryption, from the AES Size drop-down list, specify which level of AES
encryption to use: 128 or 192 or 256
In the Encryption Password field, type the password to use for encryption. The maximum
number of characters allowed for this password is 64
Click OK to create a group (if this is the first user in that group), display this group in the
Group Name drop-down list, and create a user for that group. The Add SNMP User Entry
dialog box closes
The SNMPv3 Users pane lists the following information: SNMP Version 3 server group name,
name of the user that belongs to the specified group, encrypted password setting,
authentication setting, encryption algorithm setting, and the AES size setting
Click Apply
With this, SNMP parameters for Version 3 are configured, and the changes are saved to the
running configuration.
You can schedule the import of logs using localhost. You can share the ISA log folder and can
map it to network drive of SureLog server. Then, you can schedule the local import to import
periodically.
In case if you are running SureLog as a service, you should ensure that SureLog has enough
permission to access the file in shared folder.
If you want SureLog to periodically import the ISA Server logs use FTP import provision in
"Remote Host", with the time interval less than the time interval set in the ISA Server.
We recommend Local Import Schedule option over Remote Host FTP Import option.
Micosoft ISA Proxy server creates log file with new name (with time stamp appended)
everyday. If the Micosoft ISA Proxy log files are to be imported, you do not have to
change the filename daily, instead select the Change filename dynamically option
while importing the logs. Selecting the option displays the the Filename pattern: text
box to enter the time stamp pattern that the Proxy server appends when the Proxy
server creates the log file daily. A help tip icon displays, (when you hover the mouse
on the icon) the mapping of the Timestamp in Filename to the Pattern to be given.
Enter the pattern as required.
Log files options placement in ISA Management Console 2004 & 2006
In order to switch log files format from MSDE to W3C please do the following:
You will need to change log files format for Firewall and Web proxy. Please choose
Configure Firewall Logging and Configure Web Proxy Logging items and perform actions
shown below for each.
Check on File option. In the dropdown list select W3C extended log file format. Enable
logging for this service option should be enabled. If you want to change log files location,
press Options button, another dialog will appear where you can change the log files path,
Compress log files and Delete log files older than should remain disabled. Select Fields tab
and check that all necessary fields are enabled. Please see table below for the list of necessary
fields.
Necessary Fields
Log Date
Log Time
Transport
Client IP and port
Destination IP and port
Action
Protocol
Bytes sent
Bytes sent Delta
Bytes recevied
Bytes recevied Delta
Client Username
Client Agent
Client IP
Client Username
Client Agent
Log Date
Log Time
Bytes Recevied
Bytes Sent
Protocol
URL
Object source
HTTP Status Code
ProxyInspector work only with log files since access to the log files is significantly faster than
access to SQL databases(nevertheless you can import data from existing MSDE databases
using Database | Move data from ISA 2004 & 2006 MSDE databases). ProxyInspector
supports both W3C and ISA Native log files formats. Recommended format is W3C.
Configuring CyberGuard
You can select WebTrends log format for Audit logs too. Either you can send the syslogs to
the default listener ports (514 or 1514) of SureLog
Configuring Cyberoam
SureLog supports Cyberoam Firewall Version: 9.5.4 build 66 onwards
Configuring Cyberoam
On the Cyberoam Firewall Web Admin Console do the following.
1. Select System > Logging > Manage Syslog
2. Specify unique name for Syslog server
3. Specify IP address and port of the syslog server. Cyberoam will send logs to the configured IP
address. The default port is 514
4. Select Facility. Facility indicates the source of a log message to the syslog server. You can
configure Facility to distinguish log messages from different Cyberoam Firewalls
5. Select the Severity level of the messages logged. Severity level is the severity of the message
that has been generated
Cyberoam logs all messages at and above the logging severity level you select.
For example, select ERROR to log all messages tagged as ERROR, as well
as any messages tagged with CRITICAL, ALERT and EMERGENCY
and select DEBUG to log all messages.
Note: SureLog requires the severity level as 'INFORMATIONAL'.
Also you need to enable logging on each rule to monitor allowed and denied traffic. Please
follow the below steps.
Click Log Traffic to enable/disable traffic logging for the rule. Ensure firewall rule logging is in
On/Enable state in the Logging Management. Refer to Cyberoam Console Guide, Cyberoam
Management for more details.
To log the traffic permitted and denied by the firewall rule, you need to keep On/Enable
state in the firewall rule logging from the Web Admin Console > Firewall rule and from the
Telnet Console > Cyberoam Management.
Specify full description of the rule, displays full description of the rule, modify if required.
Name: syslog_client
4. Configure SNMP
Navigate to System > Log and Event Receivers > Add again to add a SNMP2c
Event receiver as given below in the image:
Name: SNMP_Trap
IP Address: 192.168.1.30 (In this case IP address of SureLog host machine is
192.168.1.30)
Port: 162
Repeat Count: 0
Community: public
5. If syslog count goes beyond 2000 logs/second, navigate to System > Log and Event
Receivers > Advanced Settings
If SureLog is unable to receive the logs from the Fortigate after configuring from UI, please
carryout the steps to configure it through command prompt
To determine the version number of the Fortigate that you are running, use the command: get
system status
Configuring the FortiGate Firewall
Follow the steps below to configure the FortiGate firewall:
1. Log in to the FortiGate web interface
2. Select Log & Report > Log Setting or Log & Report > Log Config > Log Setting
(depending on the version of FortiGate)
3. If you want to export logs in WELF format:
Choose the logging level as Information or select the Log All Events checkbox
Select the Log to Remote Host option or Syslog checkbox (depending on the
version of FortiGate) Syslog format is preffered over WELF, in order to support
vdom in Fortigate firewalls.
Select the logging level as Information or select the Log All Events checkbox
(depending on the version of FortiGate)
5. Click Apply
Repeat the above steps for all rules for which you want to log traffic.
For more information, refer the Fortinet documentation.
If SureLog is unable to receive the logs from the Fortigate after configuring from UI,
please carryout the steps to configure it through command prompt
(For the models like Fortigate 60, Fortigate 200, etc.)
Please follow the steps to enable the device to send the logs to SureLog.
Enable syslog:
config log syslogd setting<cr>
Enable traffic:
config log syslogd filter<cr>
set severity information<cr>
set traffic enable<cr>
set web enable<cr>
set email enable<cr>
set attack enable<cr>
set im enable<cr>
set virus enable<cr>
end <cr>
Type "show log syslogd filter" to list all available traffic.
Stop and start the SureLog application/service and check if you are able to receive the
Fortigate Firewall packets in SureLog.
In Fortigate OS v5.0, there is an option to send syslog using TCP. If SureLog is not getting
logs from Fortigate, please check Fortigate OS version. If it is v5.0 or above, ensure option
'reliable' is disabled in syslog config. Then it will use UDP.
Syslog setting can only be done through CLI mode. There is no option in UI.
Ref :http://docslegacy.fortinet.com/fgt/handbook/cli_html/FortiOS%205.0%20CLI/config_log.16.14.html
If you already have a SNMP community, edit it to provide SureLog (SNMP Manager)
IP address. Also specify the source interface through which SureLog connects to
Firewall.
If you want to add a new SNMP community, click 'Create New' button and enter
Community Name. Provide SureLog (SNMP Manager) IP address and the source
interface through which SureLog connects to Firewall.
SureLog supports both WELF and native log formats of WatchGuard Firebox Models v 5.x,
6,x, 7.x, 8.x, 10.x, 11, Firebox X series, x550e, x10e, x1000, x750e, x1250e Core and
Fireware XTM v11.3.5
For analysing native logs, the configuration is straight forward, you just need to forward the
native logs from WatchGuard to the syslog listener ports of SureLog.
By default, WatchGuard Firewall logs do not contain the bytes information. It just has the size
of the packet and header. So one needs to do the following to enable them,
For version 7.3 , you need to go into General Setting area of your proxy and select
the check box Send log message with summary of each transaction.
For version 7.2.1, you need to select the check box Log accounting/auditing
information in your proxy service.
For version 8.x , you need to select the check box Send a log message with
summary information for each transaction in your proxy service.
Edit the proxy action and select the check box Turn on logging for
reports for each desired proxy and save configuration
To configure the Firebox or XTM device to send log messages to a syslog host, you must
have a syslog host configured, operational, and ready to receive log messages.
In the Enable Syslog output to this server text box, type the IP address of the
syslog host.
In the Settings section, to select a syslog facility for each type of log message, click
the adjacent drop-down lists.
If you select NONE, details for that message type are not sent to the syslog host.
Click Save.
http://www.watchguard.com/forum/default.asp?action=9&boardid=15&read=44135&fid
=671
http://www.watchguard.com/help/docs/webui/11/en-US/index_Left.html#CSHID=enUS%2Flogging%2Fsend_logs_to_syslog_host_web.html|StartTopic=Content%2FenUS%2Flogging%2Fsend_logs_to_syslog_host_web.html|SkinName=Web%20UI%20%2
8en-US%29
Ensure that your Watch Guard policies are created with Proxy Action and then follow
the steps
Action > Proxies and add the new policy as per your requirement
Please refer the link of the forum post reply for your reference.
http://www.watchguard.com/forum/default.asp?action=9&boardid=2&read=19115&fid=
43
Configuring Snort
1. Shutdown the Snort server, if it is running.
2. Login as root if you installed Snort in Linux machine.
3. In snort.conf file (available at /etc/snort/snort.conf in linux and
c:\Snort\bin\snort.conf in windows) uncomment the line that contains output
information_syslog and enter the logging facility and the desired detail level (for
example: output alert_syslog:host=hostname:port, LOG_AUTH LOG_ALERT)
4. Add the line config show_year to ensure that year has been included in the alerts
generated by Snort.
5. Save and exit the snort.conf file.
6. In Linux(only) edit the syslog.conf file in the /etc directory.
7. Append *.* @<server_name> at the end, where <server_name> is the name of the
machine on which SureLog is running.
8. Save the configuration and exit the editor.
9. Restart the syslog service on the host using the command:
/etc/rc.d/init.d/syslog restart
Configuring Sidewinder
1. Open /etc/sidewinder/auditd.conf
2. Add the following line at the end of the file, to configure syslog to use the Sidewinder
Export Format (SEF):
You can use local0 through local7 as names for the facility; they are predefined in
syslogd.
3. Save the configuration and exit the editor.
4. Open /etc/syslog.conf
5. Append local0.* @<server_name> at the end, where facility local0 matches the facility
mentioned in step 2 and <server_name> is the name of the machine where SureLog is
running.
6. Save the configuration and exit the editor.
7. Look up syslogs process ID by entering the following command:
pss syslog
Implement the changes by restarting the syslogd and auditd processes, using the following two
commands:
Configuring SonicWALL
Configuring SonicWALL To Direct Log Streams
1. Log in to the SonicWALL appliance
2. Click Log on the left side of the browser window
For more information, refer the SonicWALL documentation in the URL given below:
http://help.mysonicwall.com/sw/jpn/2907/ui2/42600/Help/42_Log_Reporting.html
Whenever you create an access rule in the SonicWALL Firewall, ensure that 'Enable
Logging' check box is selected for the particular rule. For more information refer the URL
http://www.techrepublic.com/article/how-do-i-configure-firewall-security-on-a-sonicwalldevice/6124340
Restart the SonicWALL appliance for the changes to take effect.
Using CLI
1. Log in to the Juniper SRX device CLI console.
2. Execute the following command:
user@host# set system syslog host <IP address of the remote Syslog server (i.e., SureLog)> any any
Click on the policy for which you would like to enable logging.
Navigate to Logging/Count and in Log Options, select Log at Session Close Time.
Using CLI
1. Log in to the Juniper SRX device CLI console.
2. Execute the following command:
user@host# set security policies from-zone trust to-zone untrust policy permit-all
then log session-close
All attacks
Policy load
Restart
Profiler logs
All attacks
Policy load
Restart
Profiler logs
Configuring 3Com
Obtaining Log Information
To create a SureLog firewall profile, you must specify the log file location. 3Com firewalls do
not create a log file. Instead, they direct a log stream to a syslog server which writes the log
information to a file.
4. Click Apply.
5. Navigate to IPS > Action Sets > Notification Contacts > Remote System Log and
complete the form as shown below.
7. Click Apply.
8. Navigate to Firewall > Firewall Rules and click Create Firewall Rule. Complete the
form as shown below.
Note that later versions of TOS do not have separate checkboxes for Enable local logging
and Enable syslog logging they just have a checkbox for Enable logging which enables
both.
9. Click Create. A new rule will be created at the bottom of the table.
10. Click Create Firewall Rule. Complete the form as shown below.
11. Click Create. A new rule will be created at the bottom of the table.
Please note that these last two rules must remain the last two rules in the Firewall Rule table.
They replace two implicit hidden rules that are always present but do not support logging.
12. Click the pencil icon next to the first rule in the Firewall Rule table. This will open the rule
for edit, as in the example below.
13. Click the Enable syslog logging checkbox as shown, then click Save.
14. Repeat steps 12 and 13 for all the Firewall Rules until syslog logging is enabled on them all.
The following is a list of things to check if the SureLog does not operate correctly:
1. Check the syslog server settings on the X-family device are configured to point to the IP
address of the SureLog Server.
2. Check that the SureLog Server is listening on the same port (usually UDP 514) as the Xfamily syslog client is sending on.
3. Check that any firewall device between the X-family and the SureLog Server has a rule
permitting traffic for UDP port 514.
4. Check that there is no syslog daemon running on the same PC as the SureLog Server or
it will take over port 514 which will stop the syslog data from going to the SureLog Server.
5. Traffic through the X-family device will only be counted if it is subject to a Firewall Rule and
syslog logging is enabled for that rule. For example traffic will not be counted if:
For configuring syslog-ng daemon in a Linux host, append the following entries
destination SureLog{ udp("<server_name>" port(514)); };
log { source(src); destination(SureLog); };
For Solaris host, it is just enough to include *.debug<tabseparation>@<server_name> in the syslog.conf file.
3.
where, <server_name> is the name of the machine where SureLog server or
Service is running. Just ensure that only a tab separation alone is there in
between *.debug and @<server_name>.
4. Save the configuration and exit the editor.
5. Edit the services file in the /etc directory.
6. Change the syslog service port number to 514, which is one of the default listener
ports of SureLog. But if you choose a different port other than 514 then
remember to enter that same port when adding the host in SureLog.
7. Start the syslog daemon running on the OS. You need to just execute the below
command.
Usage : /sbin/init.d/syslogd {start|stop}
Command to be executed :
(for HP-UX) /sbin/init.d/syslogd start
(for Solaris) /etc/init.d/syslog start
(for IBM AIX) startsrc -s syslogd
SYSLOG_EXPORT_FORMAT
SYSLOG_PORT
SYSLOG_SERVER_ADDRESS
Values
Set this attribute
to CEF
Default UDP port
is 514, retain it
IPv4 address of
SureLog server
Normal log
Connection
Closing
Log Accounting
Description
No log entries are created when connections are closed
Both connection opening and closing are logged, but no
information is collected on the volume of traffic
Information
For Cisco IronPort v and above carry out the following configuration:
Log in to the UI
For Squid v2.7 and above carry out the following configuration:
Carry out the following changes in the services file:
Login as root user and edit the syslog.conf/rsyslog.conf file in the /etc directory
Append the following entries at the end of syslog-ng.conf file in the /etc/syslog-ng/
directory:
Log file path: Specifies a datastore path to the file syslogd logs all
messages.
Remote host: Specifies a remote host to which syslog messages are
forwarded. In order to receive the forwarded syslog messages, your
remote host must have a syslog service installed.
Remote port: Specifies the port used by the remote host to receive syslog
messages.
5. In the Syslog.Local.DatastorePath text box, enter the datastore path to the file
where syslog will log messages. If no path is specified, the default path is
/var/log/messages.
The datastore path format is [<datastorename>] </path/to/file> where the path is relative to
the root of the volume backing the datastore.
Example: The datastore path [storage1] var/log/messages maps to the path /
vmfs/volumes/storage1/var/log/messages.
6. In the Syslog.Remote.Hostname text box, enter the name of the remote host
where syslog data will be forwarded. If no value is specified, no data is forwarded.
7. In the Syslog.Remote.Port text box, enter the port on the remote host where
syslog data will be forwarded. By default Syslog.Remote.Port is set to 514, the
default UDP port used by syslog. Changes to Syslog.Remote.Port only take effect
if Syslog.Remote.Hostname is configured.
8. Click OK.
The following is a list of things to check if the SureLog does not operate
correctly:
1. Check the syslog server settings on the X-family device are configured to point to the IP
address of the SureLog Server.
2. Check that the SureLog Server is listening on the same port (usually UDP 514) as the X-family
syslog client is sending on.
3. Check that any firewall device between the X-family and the SureLog Server has a rule
permitting traffic for UDP port 514.
4. Check that there is no syslog daemon running on the same PC as the SureLog Server or it
will take over port 514 which will stop the syslog data from going to the SureLog Server.
5. Traffic through the X-family device will only be counted if it is subject to a Firewall Rule and
syslog logging is enabled for that rule. For example traffic will not be counted if:
- it is passing between hosts in the same security zone
- it is passing over a VPN or GRE tunnel to a host which is in the same zone as is used to
terminate the VPN or GRE tunnel.
6. Events will not be generated for hidden firewall rules. At the time of writing, there are two
implicit hidden firewall rules that are not displayed but act as if they were the last two
rules in the Firewall Rule table. These are:
Permit from this-device to ANY zone ANY protocol
Block from ANY zone to ANY zone ANY protocol
These rules do not generate log entries or syslog messages.
To enable the SureLog to monitor events that would be generated by these rules, two explicit
rules must be created as the last two rules in the Firewall Rule table and syslog logging must
be enabled on both of them.
This subsection deals only with steps one and two; all other aspects of audit management are
addressed in the Audit Management subsection of this document.
An auditing policy specifies categories of security-related events that must be audited. When
Windows 2000 is first installed, all auditing categories are turned off. By turning on various
auditing event categories, the administrator can implement an auditing policy that suits the
security needs of the organization.
Auditing can be enabled on the Domain Controller as follows:
1.
2.
3.
4.
5.
8. Click OK. It will take a few minutes for the change to take effect, and other domain
controllers will receive the change at the next regular replication interval.
Enabling Object Auditing
If audit access to objects is chosen as part of the audit policy, either the audit directory service
access category (for auditing objects on a domain controller), or the audit object access
category (for auditing objects on a member server) must be also turned on. Once the correct
object access category has been turned on, each individual object's Properties can be used to
specify whether to audit successes or failures for the specific access request to each group or
user.
Enabling Auditing on Directory Objects
The administrator can set an auditing SACL for a directory object using the following
procedure:
Warning: The SeSecurityPrivilege allows a user to set SACLs on objects. Administrators
must ensure that this privilege is not assigned to non-administrative users.
1. Log on using an administrator account.
2. Open the Active Directory Users and Computers tool.
4.
5.
6.
7.
8.
Locate the container for the object, right-click it, and then click Properties.
Click the Security tab.
Click Advanced, and click the Auditing tab.
Click the Add button.
Select a security principle name and click OK.
15. In the Access Control Settings window, choose whether the choices will be inherited
from the parent container to this object. If yes, then select the Allow inheritable
auditing entries from parent to propagate to this object check box.
6. In the Auditing Entry dialog box, under Access click Successful, Failed, or both to
select the events to be audited for this user and then check the Apply these auditing
entries to objects and/or containers within this container selection box if it is
necessary to propagate the changes to sub-containers. Click OK to close the Auditing
Entry dialog box.
7. To view or change auditing for an existing group or user, simply click on the name,
and then click View/Edit.
8. To remove auditing for an existing group or user, click the name, and then click
Remove.
Note:
If necessary, in the Auditing Entry dialog box, select where auditing is to take place in the
Apply onto list. The Apply onto list is available only for folders.
Before Windows 2000 will audit access to files and folders, the Audit Object Access
setting in the Audit Policy must be enabled. If not, an error message will appear when
auditing is set up for files and folders, and no files or folders will be audited. Once
auditing is enabled, view the security log in Event Viewer to review successful or failed
attempts to access the audited files and folders.
Reference http://technet.microsoft.com/en-us/library/dd277403.aspx
WMI Errors
Error Code
Cause
Solution
0x80070005 Scanning of the Windows workstation failed due to one of the following
reasons:
The login name and password
Check if the login name and password are
provided for scanning is invalid
entered correctly
in the workstation
Remote DCOM option is
disabled in the remote
workstation
0x80040154
The following configuration needs to be done in Cisco Devices (Switches and Routers),
before adding them in SureLog, for them to send syslogs to SureLog and generate reports.
We can also configure other options like logging facility , trap notifications, etc. .. as
Catalyst6500(config)# logging facility local7
Catalyst6500(config)# logging trap notifications
separation>@<server_name>;
For Solaris host, it is just enough to include *.debug<tabseparation>@<server_name> in the syslog.conf file.
3.
4.
5.
6.
7.
where, <server_name> is the name of the machine where SureLog server or Service is
running. Just ensure that only a tab separation alone is there in between *.debug and
@<server_name>.
Save the configuration and exit the editor.
Edit the services file in the /etc directory.
Change the syslog service port number to 514, which is one of the default listener ports of
SureLog. But if you choose a different port other than 514 then remember to enter that same
port when adding the host in SureLog.
Start the syslog daemon running on the OS. You need to just execute the below command.
Usage : /sbin/init.d/syslogd {start|stop}
Command to be executed :
(for HP-UX) /sbin/init.d/syslogd start
(for Solaris) /etc/init.d/syslog start
(for IBM AIX) startsrc -s syslogd
Configuring the Syslog Service on VMware
All ESX and ESXi hosts run a syslog service (syslogd) which logs messages from the
VMkernel and other system components to a file.
Neither vSphere Client nor vicfg-syslog can be used to configure syslog behavior for an ESX
host. To configure syslog for an ESX host, you must edit the /etc/syslog.conf file.
On ESXi hosts, you can use the vSphere Client or the vSphere CLI command vicfg-syslog to
configure the following options:
o
Log file path: Specifies a datastore path to the file syslogd logs all messages.
Remote host: Specifies a remote host to which syslog messages are forwarded. In
order to receive the forwarded syslog messages, your remote host must have a
syslog service installed.
Remote port: Specifies the port used by the remote host to receive syslog messages.
The datastore path format is [<datastorename>] </path/to/file> where the path is relative to
the root of the volume backing the datastore.
Example: The datastore path [storage1] var/log/messages maps to the path /
vmfs/volumes/storage1/var/log/messages.
6. In the Syslog.Remote.Hostname text box, enter the name of the remote host where syslog
data will be forwarded. If no value is specified, no data is forwarded.
7. In the Syslog.Remote.Port text box, enter the port on the remote host where syslog data will
be forwarded. By default Syslog.Remote.Port is set to 514, the default UDP port used by
syslog. Changes to Syslog.Remote.Port only take effect if Syslog.Remote.Hostname is
configured.
8. Click OK.
enabling the auditing policy is only part of the work associated with setting up auditing.
Auditing implementation has several steps:
1.
2.
3.
4.
5.
This subsection deals only with steps one and two; all other aspects of audit management are
addressed in the Audit Management subsection of this document.
An auditing policy specifies categories of security-related events that must be audited. When
Windows 2000 is first installed, all auditing categories are turned off. By turning on various
auditing event categories, the administrator can implement an auditing policy that suits the
security needs of the organization.
Auditing can be enabled on the Domain Controller as follows:
1.
2.
3.
4.
5.
8. Click OK. It will take a few minutes for the change to take effect, and other domain
controllers will receive the change at the next regular replication interval.
Enabling Object Auditing
If audit access to objects is chosen as part of the audit policy, either the audit directory service
access category (for auditing objects on a domain controller), or the audit object access
category (for auditing objects on a member server) must be also turned on. Once the correct
object access category has been turned on, each individual object's Properties can be used to
specify whether to audit successes or failures for the specific access request to each group or
user.
Enabling Auditing on Directory Objects
The administrator can set an auditing SACL for a directory object using the following
procedure:
Warning: The SeSecurityPrivilege allows a user to set SACLs on objects. Administrators
must ensure that this privilege is not assigned to non-administrative users.
1. Log on using an administrator account.
2. Open the Active Directory Users and Computers tool.
3. On the View menu, select Advanced Features.
4. Locate the container for the object, right-click it, and then click Properties.
5. Click the Security tab.
15. In the Access Control Settings window, choose whether the choices will be inherited
from the parent container to this object. If yes, then select the Allow inheritable
auditing entries from parent to propagate to this object check box.
6. In the Auditing Entry dialog box, under Access click Successful, Failed, or both to
select the events to be audited for this user and then check the Apply these auditing
entries to objects and/or containers within this container selection box if it is
necessary to propagate the changes to sub-containers. Click OK to close the Auditing
Entry dialog box.
7. To view or change auditing for an existing group or user, simply click on the name,
and then click View/Edit.
8. To remove auditing for an existing group or user, click the name, and then click
Remove.
Note:
If necessary, in the Auditing Entry dialog box, select where auditing is to take place in the
Apply onto list. The Apply onto list is available only for folders.
Before Windows 2000 will audit access to files and folders, the Audit Object Access
setting in the Audit Policy must be enabled. If not, an error message will appear when
auditing is set up for files and folders, and no files or folders will be audited. Once
auditing is enabled, view the security log in Event Viewer to review successful or failed
attempts to access the audited files and folders.
The Import Windows Event Logs link lets you import a Windows event log file from the
local machine or remotely. In order to import Windows Event Logs, AD settings must be
done before.
After configuring AD, SureLog will start discovery and when discovery finished discovered
computers will be listed.