Active Directory Monitoring #1722
-
|
I'm attempting to set up some dashboards to monitor AD events such as logon/logoff, failed login attempts, group membership changes etc and I've found a few sites that explain how this is done in a normal ELK installation. I've successfully got Winlogbeats shipping the logs and I can see them reaching Security Onion. What I was wondering is what files I should be modifying when documentation regarding ELK makes mention to logstash.yml and so on? For reference this is one of the docs I'm following: https://www.syspanda.com/index.php/2018/05/03/monitoring-active-directory-elk/ It is making a bunch of mutate and filters to cut down the events and change the message. Is there a pillar file or something I should be modifying? I've looked through the docs but can't really find anything towards that. Just on the topic of host log shipping is there a "best" method for it? I see we can do it with Wazuh, Winlogbeat or Osquery and was just wondering if there is a method that is preferred by SO or anything like that. I'm open to anything. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 4 replies
-
|
If you use WLB/Wazuh/Osquery for shipping, the parsing is already builtin for Windows Eventlogs. Do you see the Windows Eventlogs in Hunt / Kibana? Are there fields that are not being parsed out correct? |
Beta Was this translation helpful? Give feedback.
If you use WLB/Wazuh/Osquery for shipping, the parsing is already builtin for Windows Eventlogs.
Do you see the Windows Eventlogs in Hunt / Kibana? Are there fields that are not being parsed out correct?