How to collect SEP logs?

987 views
Skip to first unread message

Jacky Qin

unread,
Sep 11, 2019, 11:34:47 PM9/11/19
to Wazuh mailing list
Hi,

I have another question here:) .We installed the wazuh client on all windows servers, and several of them also installed the SEP client.I want to collect the SEP quarantine virus logs into the wazuh manager and show them on kibana.The SEP quarantine log is in the windwos application log, but I don't see any SEP logs in the wazuh Alerts. Is it blocked or new rules are required to collect?

Best Regards
Jacky Qin

Eva Lopez

unread,
Sep 12, 2019, 6:43:22 AM9/12/19
to Wazuh mailing list

Hello Jacky Qin,

it isn’t blocked. It necessary rules which match SEP log to show alerts in Kibana.

You can follow our documentation to create rules and decoders for it: Custom rules and decoders

If you need help, you can provide us information about what files (or Windows channel) where SEP writes its logs, and SEP logs examples. We will help you.

Best regards,
Eva

Jacky Qin

unread,
Sep 16, 2019, 2:11:23 AM9/16/19
to Wazuh mailing list
Hi Eva,

Sorry to reply late.

This is an example of Symantec's log in Windows.I don't know how to write new rules according to it. Please help me. Thank you.20190916140223.png

Security Risk Found!PUA.Keygen.KMS in File: C:\Users\Administrator\Desktop\KMSAuto_Net_99down.com (1)\KMSAuto_Net_99down.com\KMSAuto Net.exe by: Auto-Protect scan.  Action: Reboot Required.  Action Description: The file was quarantined successfully.

Best regards
Jacky


在 2019年9月12日星期四 UTC+8下午6:43:22,Eva Lopez写道:
Message has been deleted

Eva Lopez

unread,
Sep 18, 2019, 6:05:15 AM9/18/19
to Wazuh mailing list

Hi!

Apologies for the late response.
There are two ways to monitor the Windows channel. You can use Eventlog or Eventchannel.
By default, Wazuh monitory Application file using Eventchannel. If you open Agent configuration (ossec.conf) you can see follow block in the file:

<localfile>
<location>Application</location>
<log_format>eventchannel</log_format>
</localfile>

Windows agent processes these events and sends manager logs, then the manager adds logs to Analysisd queue to check if it matches rules.

I need that you activate logall option to know which logs are added to Analysisd queue.
Could you modify logall option from no to yes (it’s in manager ossec.conf) and restart Wazuh manager?

It create /var/ossec/logs/archives/archives.log file. Wazuh manager will write all log witch receive here.

Then generate SEP event in the agent connected to the manager and you can see in archive.log the SEP logs which are processed by Analysisd.

could you send us these logs to create new rules?

Regards,
Eva

Jacky Qin

unread,
Sep 29, 2019, 9:10:31 PM9/29/19
to Wazuh mailing list
Hi Eva,

Sorry for the late reply.This is the section on SEP in archives. log
2019 Sep 29 09:05:30 (WIN-B8O4FUQ4SSA) 172.20.102.103->WinEvtLog 2019 Sep 29 17:05:30 WinEvtLog: Application: ERROR(51): Symantec AntiVirus: (no user): no domain: WIN-B8O4FUQ4SSA:      Security Risk Found!Hacktool in File: C:\Users\Administrator\Desktop\ppxshell\ppxshell.gif2398662.asp by: Auto-Protect scan.  Action: Cleaned by Deletion.  Action Description: The file was deleted successfully.

Best regards
Jacky Qin


在 2019年9月18日星期三 UTC+8下午6:05:15,Eva Lopez写道:
archives - sep.log

Eva Lopez

unread,
Sep 30, 2019, 9:14:52 AM9/30/19
to Wazuh mailing list

Hi Jacky,

Exists some rules and decoders for Sysmantec products. They can be found in ruleset/rules/0120-sysmantec-av_rules.xml, ruleset/rules/0125-sysmantec-ws_rules.xml and ruleset/decoders/0330-sysmantec_decoders.xml files. But you need create new rules for events you are interested.

All SEP logs match one of following rules:

  <rule id="7300" level="0">
    <decoded_as>symantec-av</decoded_as>
    <description>Grouping of Symantec AV rules.</description>
  </rule>

  <rule id="7301" level="0">
    <category>windows</category>
    <extra_data>^Symantec AntiVirus</extra_data>
    <description>Grouping of Symantec AV rules from eventlog.</description>
  </rule>

I searched information about SEP logs and I have found following page:
Symantec Endpoint Protection 12.1.x event log entries

You can create rules child of these with the the above link help. A example could be following:

  <rule id="999775" level="3">
    <if_sid>7300, 7301</if_sid>
    <id>^7$</id>
    <description>Definition file loaded</description>
  </rule>

  <rule id="999776" level="3">
    <if_sid>7300, 7301</if_sid>
    <id>^12$</id>
    <description>Configuration changed</description>
  </rule>

  <rule id="999777" level="3">
    <if_sid>7300, 7301</if_sid>
    <id>^13$</id>
    <description>Symantec AntiVirus Shutdown</description>
  </rule>

  <rule id="999778" level="3">
    <if_sid>7300, 7301</if_sid>
    <id>^14$</id>
    <description>Symantec AntiVirus Startup</description>
  </rule>

To test your rules you can use ossec-logtest. It’s useful tool to testing and verificaion of rules.
For example, the Logtest output when the input is the log you sent is:

root@lopezziur:/var/ossecbin/ossec-logtestml
2019/09/30 11:45:35 ossec-testrule: INFO: Started (pid: 6538).
ossec-testrule: Type one log per line.

2019 Sep 29 17:05:30 WinEvtLog: Application: ERROR(51): Symantec AntiVirus: (no user): no domain: WIN-B8O4FUQ4SSA:      Security Risk Found!Hacktool in File: C:\Users\Administrator\Desktop\ppxshell\ppxshell.gif2398662.asp by: Auto-Protect scan.  Action: Cleaned by Deletion.  Action Description: The file was deleted successfully.

**Phase 1: Completed pre-decoding.
       full event: '2019 Sep 29 17:05:30 WinEvtLog: Application: ERROR(51): Symantec AntiVirus: (no user): no domain: WIN-B8O4FUQ4SSA:      Security Risk Found!Hacktool in File: C:\Users\Administrator\Desktop\ppxshell\ppxshell.gif2398662.asp by: Auto-Protect scan.  Action: Cleaned by Deletion.  Action Description: The file was deleted successfully.'
       timestamp: '2019 Sep 29 17:05:30'
       hostname: 'lopezziur'
       program_name: 'WinEvtLog'
       log: 'Application: ERROR(51): Symantec AntiVirus: (no user): no domain: WIN-B8O4FUQ4SSA:      Security Risk Found!Hacktool in File: C:\Users\Administrator\Desktop\ppxshell\ppxshell.gif2398662.asp by: Auto-Protect scan.  Action: Cleaned by Deletion.  Action Description: The file was deleted successfully.'

**Phase 2: Completed decoding.
       decoder: 'windows'
       type: 'Application'
       status: 'ERROR'
       id: '51'
       extra_data: 'Symantec AntiVirus'
       dstuser: '(no user)'
       system_name: 'WIN-B8O4FUQ4SSA'

**Phase 3: Completed filtering (rules).
       Rule id: '7301'
       Level: '0'
       Description: 'Grouping of Symantec AV rules from eventlog.'

You note that the log processing has three phases:

  1. First phase divide log in timestamp, hostname, program_name and log.
  2. Second phase correspond to decoders matching.
  3. Third phase is the rules matching.

I hope it helps you. You can find more information about Ruleset in our documentation

Best regards,
Eva

Schil tech

unread,
Feb 18, 2020, 10:54:34 AM2/18/20
to Wazuh mailing list
Hello,

This case is interesting... i'd like also to send log from SEP to wazuh manager but i don't have any log from application Symantec in archives.log.
I allow alllogs in ossec.conf on wazuh manager and i also check that agent is correctly configured with <localfile>.

Regards,

Schil tech

Schil tech

unread,
Feb 19, 2020, 5:06:31 AM2/19/20
to Wazuh mailing list
My bad it's working now.

Thanks a lot.

Regards,

Schil tech
Reply all
Reply to author
Forward
0 new messages