I want to ingest Windows 7 logs into the new implementation of Security Onion with elasticstack (ELK). I'm planning on doing this using VMware with a single Windows 7 Enterprise VM, and the newest version of Security Onion with elasticstack built in (14.04.5.4 ISO) for test purposes only. Does anyone have advice on how to do this easily?
I was thinking winlogbeats would be a good solution, but wanted to ask the community prior to executing. Any guidance is highly appreciated.
I'm going to be moving to winlogbeat from OSSEC for reasons such as Wes described. Let me know how setup goes, I had a few moments today, installed Winlogbeat on a server, pointed it at my security onion host for elastic search over port 9200, allowed in firewall via "ufw allow 9200." Yet the server logs are showing errors that security onion is actively rejecting it. I've not had more time to poke around, but curious what you come up with.
Thanks,
Josh
I will give it a shot, although it doesn't appear as though ingestion using winlogbeats is supported out the box with Security Onion at this point.
I wanted to include Wes's input on this thread:
Jesse,
You have a few options here.
You could use OSSEC to forward your Windows logs to Elastic, simply adding an agent to your Windows box and opening up the firewall on your SO box for that agent. However, due to the format of the logs and the way they are handled, they can sometimes be difficult to parse consistently/accurately.
Another option would be to use Winlogbeat (as you mentioned), or even NXLog, but these may required additional configuration not already present in Security Onion.
Thanks,
Wes
Jesse,
Have you given this a go yet? Any luck? I've been unable to get the logs in to elasticsearch.
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
I went to create an index pattern in Kibana and it says winlogbeat-* doesn't exist. Which I assume I need to create, but based on reading the winlogbeat docs they make it seem as the Winhost uses the template to create this.
2017-11-11T08:24:17-05:00 ERR Connecting error publishing events (retrying): Get http://X.X.X.X:9200: dial tcp X.X.X:9200: connectex: No connection could be made because the target machine actively refused it.
UFW Rule:
9200 ALLOW Anywhere
I event broadly opened the port to rule that out as an issue.
Looking at docker ps : 127.0.0.1:9200->9200/tcp, 127.0.0.1:9300->9300/tcp which from my understanding means only that host can access those ports. I noticed logstash has standalone ports such as 5044/tcp, which I assume means (outside of UFW) any host can access that port. I'm hoping I don't need to modify docker images, something that would just be overwritten after updates anyways.
Just rubber ducking here . . . . So I "think" the issue lies in so-elasticsearch docker image ports.
Looking at docker ps : 127.0.0.1:9200->9200/tcp, 127.0.0.1:9300->9300/tcp which from my understanding means only that host can access those ports. I noticed logstash has standalone ports such as 5044/tcp, which I assume means (outside of UFW) any host can access that port. I'm hoping I don't need to modify docker images, something that would just be overwritten after updates anyways.
Is there a different process than the old so-allow ossec and ossec manage_agents to get it to Logstash?