On 2014-09-08 19:45, Jay Bittner wrote:
> One problem I've noticed in the logs, which isn't very helpful, is
> that some for the event 'Windows Logon Success' (Alert 1410221611),
> often times it puts 'ANONYMOUS LOGON' or 'SYSTEM', instead of the
> actual user account that logged in. But on other alerts, from some of
> the other computers, it puts the actual person's login name ( ex.
>
j...@gmail.com ). Our employees use emails to login to Windows.
The problem is that in these cases the user truly is 'ANONYMOUS' or
'SYSTEM.' If you look at the event in event viewer, you will see that
the user in the top part of the event (where the fields are delineated)
is the user you are seeing decoded (most likely). For instance, a failed
logon will often show up as SYSTEM because Windows wasn't able to truly
authenticate who it was, so it uses its own name.
To correct this requires a rewrite of the decoder to account for the
nuances where the expected username is further into the message. It's
not a simple task. Sometimes one even contains a source and destination
user, as is the case with account changes, so you have to decide which
one you care about. And each event ID from different versions of Windows
may be different.
Awhile back I started a log corpus and put a call out for help so we
could tackle this problem, but no one jumped in. I don't think this can
be truly fixed without a large sample of Windows logs and documentation
of the OSSEC log format, the latter of which I also offered to help with
but that offer was rejected.