You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-local/manage/manage-syslog-forwarding.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ Use syslog forwarding to integrate with security monitoring solutions and to ret
18
18
19
19
## Configure syslog forwarding
20
20
21
-
Syslog forwarding agents are deployed on every Azure Local host by default, ready to be configured. Each of the agents will forward security events in syslog format from the host to the customer-configured syslog server.
21
+
Syslog forwarding agents are deployed on every Azure Local host by default, ready to be configured. Each agent forwards security events in syslog format from the host to the customer-configured syslog server.
22
22
23
23
Syslog forwarding agents work independently from each other but can be managed all together on any one of the hosts. Use PowerShell cmdlets with administrative privileges on any host to control the behavior of all forwarder agents.
24
24
@@ -35,9 +35,9 @@ The syslog forwarder in Azure Local supports the following configurations:
35
35
36
36
### Cmdlets to configure syslog forwarding
37
37
38
-
Configuring syslog forwarder requires access to the physical host using a domain administrator account. A set of PowerShell cmdlets has been added to all Azure Local hosts to control behavior of the syslog forwarder.
38
+
Configuring syslog forwarder requires access to the physical host using a domain administrator account. A set of PowerShell cmdlets is added to all Azure Local hosts to control behavior of the syslog forwarder.
39
39
40
-
The `Set-AzSSyslogForwarder` cmdlet is used to set the syslog forwarder configuration for all hosts. If successful, an action plan instance will be started to config the syslog forwarder agents across all hosts. The action plan instance ID will be returned.
40
+
The `Set-AzSSyslogForwarder` cmdlet is used to set the syslog forwarder configuration for all hosts. If successful, an action plan instance is started to config the syslog forwarder agents across all hosts. The action plan instance ID is returned.
41
41
42
42
Use the following cmdlet to pass the syslog server information to the forwarder and to configure the transport protocol, the encryption, the authentication, and the optional certificate used between the client and the server:
43
43
@@ -108,7 +108,7 @@ If you want to test the integration of your syslog server with the Azure Local s
108
108
```
109
109
110
110
> [!IMPORTANT]
111
-
> Microsoft recommends that you do not use the `-SkipServerCertificateCheck` flag in production environments.
111
+
> Microsoft recommends that you don't use the `-SkipServerCertificateCheck` flag in production environments.
112
112
113
113
### Syslog forwarding with TCP and no encryption
114
114
@@ -119,7 +119,7 @@ Set-AzSSyslogForwarder -ServerName <FQDN or IP address of syslog server> -Server
119
119
```
120
120
121
121
> [!IMPORTANT]
122
-
> Microsoft recommends that you do not use this configuration in production environments.
122
+
> Microsoft recommends that you don't use this configuration in production environments.
123
123
124
124
### Syslog forwarding with UDP and no encryption
125
125
@@ -132,7 +132,7 @@ Set-AzSSyslogForwarder -ServerName <FQDN or IP address of syslog server> -Server
132
132
While UDP with no encryption is the easiest to configure, it doesn’t provide any protection against man-in-the-middle attacks or eavesdropping of messages.
133
133
134
134
> [!IMPORTANT]
135
-
> Microsoft recommends that you do not use this configuration in production environments.
135
+
> Microsoft recommends that you don't use this configuration in production environments.
136
136
137
137
## Enable syslog forwarding
138
138
@@ -160,19 +160,19 @@ Parameter for `Enable-AzSSyslogForwarder` and `Disable-AzSSyslogForwarder` cmdle
160
160
161
161
## Verify syslog setup
162
162
163
-
After you successfully connect the syslog client to your syslog server, you will start to receive event notifications. If you don’t see notifications, verify your cluster syslog forwarder configuration by running the following cmdlet:
163
+
After you successfully connect the syslog client to your syslog server, you'll start to receive event notifications. If you don’t see notifications, verify your cluster syslog forwarder configuration by running the following cmdlet:
Each host has its own syslog forwarder agent that uses a local copy of the cluster configuration. They are always expected to be the same as the cluster configuration. You can verify the current configuration on each host by using the following cmdlet:
169
+
Each host has its own syslog forwarder agent that uses a local copy of the cluster configuration. They're always expected to be the same as the cluster configuration. You can verify the current configuration on each host by using the following cmdlet:
170
170
171
171
```powershell
172
172
Get-AzSSyslogForwarder -PerNode
173
173
```
174
174
175
-
You can also use the following cmdlet to verify the configuration on the host you are connected to:
175
+
You can also use the following cmdlet to verify the configuration on the host you're connected to:
176
176
177
177
```powershell
178
178
Get-AzSSyslogForwarder -Local
@@ -286,7 +286,7 @@ Miscellaneous events that are forwarded. These events can't be customized.
|Event log service events specific to Security channel |query="Security!*[System[Provider[@Name='Microsoft-Windows-Eventlog']]]" |
288
288
|Special Privileges (Admin-equivalent Access) assigned to new logon, excluding LocalSystem |query="Security!*[System[(EventID=4672)] and EventData[Data[1] != 'S-1-5-18']]" |
289
-
|New user added to local, global or universal security group |query="Security!*[System[(EventID=4732 or EventID=4728 or EventID=4756)]]" |
289
+
|New user added to local, global, or universal security group |query="Security!*[System[(EventID=4732 or EventID=4728 or EventID=4756)]]" |
290
290
|User removed from local Administrators group |query="Security!*[System[(EventID=4733)] and EventData[Data[@Name='TargetUserName']='Administrators']]" |
291
291
|Certificate Services received certificate request (4886), Approved and Certificate issued (4887), Denied request (4888) |query="Security!*[System[(EventID=4886 or EventID=4887 or EventID=4888)]]" |
292
292
|New User Account Created(4720), User Account Enabled (4722), User Account Disabled (4725), User Account Deleted (4726) |query="Security!*[System[(EventID=4720 or EventID=4722 or EventID=4725 or EventID=4726)]]" |
@@ -298,7 +298,7 @@ Miscellaneous events that are forwarded. These events can't be customized.
|WER events for application crashes only | query="Application!*[System[Provider[@Name='Windows Error Reporting']] and EventData[Data[3]='APPCRASH']]" |
301
-
|User logging on with Temporary profile (1511), cannot create profile, using temporary profile (1518) |query="Application!*[System[Provider[@Name='Microsoft-Windows-User Profiles Service'] and (EventID=1511 or EventID=1518)]]" |
301
+
|User logging on with Temporary profile (1511), can't create profile, using temporary profile (1518) |query="Application!*[System[Provider[@Name='Microsoft-Windows-User Profiles Service'] and (EventID=1511 or EventID=1518)]]" |
302
302
|Application crash/hang events, similar to WER/1001. These include full path to faulting EXE/Module. |query="Application!*[System[Provider[@Name='Application Error'] and (EventID=1000)] or System[Provider[@Name='Application Hang'] and (EventID=1002)]]" |
303
303
|Task scheduler Task Registered (106), Task Registration Deleted (141), Task Deleted (142) |query="Microsoft-Windows-TaskScheduler/Operational!*[System[Provider[@Name='Microsoft-Windows-TaskScheduler'] and (EventID=106 or EventID=141 or EventID=142 )]]" |
0 commit comments