You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The add-on works in collaboration with Netwrix Auditor, supplying data about activity on your
10
-
Linux-based devices. Aggregating data into a single audit trail simplifies analysis, makes activity
11
-
monitoring more cost effective, and helps you keep tabs on your IT infrastructure.
9
+
The add-on works in collaboration with Netwrix Auditor, supplying data about activity on your Linux-based devices. Aggregating data into a single audit trail simplifies analysis, makes activity monitoring more cost effective, and helps you keep tabs on your IT infrastructure.
12
10
13
-
Implemented as a service, this add-on facilitates the data transition from Linux-based systems to
14
-
Netwrix Auditor. All you have to do is provide connection details and specify parsing rules.
11
+
Implemented as a service, this add-on facilitates the data transition from Linux-based systems to Netwrix Auditor. All you have to do is provide connection details and specify parsing rules.
15
12
16
13
On a high level, the add-on works as follows:
17
14
18
-
**Step 1 –** The add-on listens to the specified UDP ports and captures designated Syslog messages.
15
+
**Step 1** – The add-on listens to the specified UDP ports and captures designated Syslog messages.
19
16
20
-
**Step 2 –** Out of the box, messages from Red Hat Enterprise Linux 7 and 6, SUSE Linux Enterprise
21
-
Server 12, openSUSE42, and Ubuntu 16 are supported. For other distributions, deployment of the
22
-
rsyslog package may be required. You can edit the add-on configuration to extend the captured
23
-
message list.
17
+
**Step 2** – Out of the box, messages from Red Hat Enterprise Linux 6, 7, 8, 9, SUSE Linux Enterprise Server 12, openSUSE 42, and Ubuntu 16 are supported. For other distributions, deployment of the rsyslog package may be required. You can edit the add-on configuration to extend the captured message list.
24
18
25
-
**Step 3 –** The add-on processes these events into Netwrix Auditor-compatible format (Activity
26
-
Records). Each Activity Record contains the user account, action, time, and other details.
19
+
**Step 3** – The add-on processes these events into Netwrix Auditor-compatible format (Activity Records). Each Activity Record contains the user account, action, time, and other details.
27
20
28
-
**Step 4 –** Using the Integration API, the add-on sends the activity records to the Netwrix Auditor
29
-
Server, which writes them to the Long-Term Archive and the Audit Database.
21
+
**Step 4** – Using the Integration API, the add-on sends the activity records to the Netwrix Auditor Server, which writes them to the Long-Term Archive and the Audit Database.
30
22
31
-
See the [Integration API](/docs/auditor/10.8/api/overview.md) topic for additional information on the structure
32
-
of the Activity Record and the capabilities of the NIntegration API.
23
+
See the [Integration API](/docs/auditor/10.8/api/overview.md) topic for additional information on the structure of the Activity Record and the capabilities of the Integration API.
33
24
34
25
## Prerequisites
35
26
36
-
Before running the add-on, ensure that all the necessary components and policies are configured as
37
-
follows:
27
+
Before running the add-on, ensure that all the necessary components and policies are configured as follows:
| The Netwrix Auditor Server side | - The Audit Database settings are configured in Auditor Server. - The TCP **9699** port (default Auditor Integration API port) is open for inbound connections. - The user retrieving data from the Audit Database is granted the Contributor role in Auditor. Alternatively, you can grant the Global administrator role or add the user to the Netwrix Auditor Administrators group. In this case, this user will have the most extended permissions in the product. |
42
-
| The computer where the add-on will be installed | - The UDP 514 port is open for inbound connections. **CAUTION:** UPD 514 port can only be used by one service, otherwise the following error will occur: [ERROR] Error occurred when starting the syslog udp listener. Only one usage of each socket address (protocol/network address/port) is normally permitted - .Net Framework [3.5 SP1](http://www.microsoft.com/en-us/download/details.aspx?id=22), [4.0](https://www.microsoft.com/en-us/download/details.aspx?id=17851), [4.5](https://www.microsoft.com/en-us/download/details.aspx?id=30653), or [4.6](https://www.microsoft.com/en-us/download/details.aspx?id=48130) is installed. |
43
-
| On the target syslog-based platform | Outbound UDP 514 port must be enabled. The **Syslog daemon** must be configured to redirect events. The procedure below explains how to configure redirection. **NOTE:** Red Hat Enterprise Linux 7 and 6, SUSE Linux Enterprise Server 12, openSUSE 42, and Ubuntu 16 are supported out of the box. For other distributions, deployment of the rsyslog package may be required. - On Red Hat Enterprise Linux 7, perform the following steps: **Step 5 –** Open the **/ etc/ rsyslog.conf** file. **Step 6 –** Add the following line: `auth.*;authpriv.* @name:514;RSYSLOG_SyslogProtocol23Format` where **name** is a FQDN, Net BIOSname or IP address of the computer where Netwrix Auditor Server is installed. For example: `auth.*;authpriv.* @172.28.18.25:514;RSYSLOG_SyslogProtocol23Format` **Step 7 –** Launch the **RHEL console** and execute the following command: `service rsyslog restart` - On Ubuntu 16, perform the following steps: **Step 1 –** Navigate to the **/ etc/ rsyslog.d/ 50-default.conf** file. **Step 2 –** Add the following line: `auth.*;authpriv.* @name:514;RSYSLOG_SyslogProtocol23Format` where **name** is a FQDN, Net BIOSname or IP address of the computer where Netwrix Auditor Server is installed. For example: `auth.*;authpriv.* @172.28.18.25:514;RSYSLOG_SyslogProtocol23Format` **Step 3 –** Launch the **UBUNTU console** and execute the following command: `service rsyslog restart` |
29
+
### The Netwrix Auditor Server side
30
+
31
+
- The Audit Database settings are configured in Auditor Server.
32
+
- The TCP **9699** port (default Auditor Integration API port) is open for inbound connections.
33
+
- The user retrieving data from the Audit Database is granted the Contributor role in Auditor. Alternatively, you can grant the Global administrator role or add the user to the Netwrix Auditor Administrators group. In this case, this user will have the most extended permissions in the product.
34
+
- The UDP **514** port is open for inbound connections.
35
+
36
+
**CAUTION:** UDP 514 port can only be used by one service, otherwise the following error will occur:
37
+
38
+
```
39
+
[ERROR] Error occurred when starting the syslog udp listener. Only one usage of each socket address (protocol/network address/port) is normally permitted
40
+
```
41
+
42
+
- .NET Framework [4.7.2](https://www.microsoft.com/en-us/download/details.aspx?id=48130) is installed.
43
+
44
+
### On the target syslog-based platform
45
+
46
+
- Outbound UDP **514** port must be enabled.
47
+
- The **Syslog daemon** must be configured to redirect events. The procedure below explains how to configure redirection.
48
+
49
+
**NOTE:** The deployment of the rsyslog package may be required.
50
+
51
+
#### Configuration for RHEL 6-8 Linux Server
52
+
53
+
**Step 1** – Ensure that rsyslog is installed. If not, install it using the following command:
0 commit comments