-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Windows Event Logs #19
Comments
Hi @elvarb, thanks for the suggestion. I agree with you that OSSEC is not parsing all we would like to get out of a Windows event. Ideally we should be able to process most of them, but in any case, do you have examples of fields that you think could be interesting? thank you! |
I am most used to nxlog as a log shipper and it handles the extra data fields and ships those as json. What nxlog also does is preserves the newlines so when viewing the log in Kibana the message field is easy to read compared to how it is with ossec. But an example, windows event ID 4624, An account was successfully logged on. Here are the fields that are included in the event that ossec ignores
What are most important here are the TargetUserName, TargetLogonId and LogonType but I'm sure some of the others are very useful as well. Sometimes though he values do not have a name but show up as Param1, Param2 and so on. Here is an example of that( %1, %2 and so on) I have in the past used Logstash to parse the message field from Ossec but with limited success, which is why nxlog is simply easier to work with for Windows environments. |
There is a similar open issue for Elastic's Winlogbeat elastic/beats#465 |
I found in the OSSEC windows client the file vista_sec.csv (or vista_sec.txt as it is in the source) that contains most events with the %1 values. For example:
Do you know how the OSSEC agent uses this file? |
Found more issues related to this file |
Thank you @elvarb very useful. I'll leave the issue open, so we can have a detailed look at it. |
What´s the difference between Wazuh-Agent for Windows and Winlogbeat? |
Hello @claudiopbail Wazuh Agent and Winlogbeat are two very different tools. Winlogbeat reads and forwards Windows event logs. That's all. Wazuh agent is a security tool which has several plugins. One of those plugins is Logcollector which reads and forwards log lines and Windows event logs. But also is able to execute commands and forward the results. In Windows events, you can filter them, do queries, etc. In addition to this Wazuh Agent will send logs and the logs will be analyzed by the manager. The Wazuh Manager could determinate if the event received is an alert or if it can be ignored. Wazuh has ~1600 different rules for all kind of events and provides an engine to have custom rules. Custom rules joined the automatic JSON decoder system give to Wazuh the capability to easily analyze the most of the software logs actually. So, the Winlogbeat capabilities are contained in Wazuh Logcollector, but Wazuh agent is much more than that:
If you need further information please let us know. |
The Wazuh fork is really promising but it comes with the flaw of ossec is that it handles Windows Event Logs rather badly. There is so much content in them that can help identify problems that is not parsed, for example any usernames, file paths, domains and so on.
Parsing every single possible event format is not the best course of action but possibly the only option. I know that Windows Event Logs have more meta data in them than you can view through the xml view. Ossec sadly is not aware of it so to bring Wazuah to a level above Ossec getting that detailed information is incredibly valuable.
Are there any plans to modify the ossec client to get that information?
The text was updated successfully, but these errors were encountered: