Still in-progress

  • SIEM-Logging
  • Window-Event-Collector
  • Syslog Server
  • Window-Event-Logging
  • Powershell-Logging
  • DNS-Logging
  • DHCP-Logging
  • SYSMON-Logging
  • SPAN Port Configuration
  • Resources

SIEM-Logging

SIEMs are great if you have the configured correctly. They are still only as good as the data that you are putting into them. There are two things that you will typically see within an organization and they either log everything or hardly log anything within their SIEM. They may log everything because it is easy. They do not want to miss a critical log but there is a point when to much data is a bad thing. To much data can increase cost, slow down search times, and making it more difficult to locate useful data within the logs. This can unlimately cause fatigue on employees attempting to parse through the overwhelming amounts of data. While other organizations may not have the budget to increase their SIEM ingestion. The goal of this repository is to get you and your team on the right track.

Logging ultimately comes down to your organization and the use cases that will be implemented into your SIEM. Wether you a required for compliance reason, audit, or strictly security reasons. We will focus on forming a great baseline which you can later modify to fit your exact needs. It is highly recommended to following a framework such as NIST Or even Mitre Att&CK.

It is highly recommended to have a well rounded knowledge of GPO. <- Inprogress

Window-Event-Collector

Window Event Collectors, also known as WEC allow administrators to get events from remote computers and store them in a local event log on the collector computer. The data that has been forwarded to the collector is saved on the collector as if they were on the orignating host. But additional information is added regarding event forwarding. It is possible to manually configure each remote computer to send logs to the WEC. But group policies are typically used to configure the remote computers to forward events to the WEC.

Why should you use a window event collector? Has your organization ever been tasked with gathering window events from several endpoints? Or perhaps you are performing an incident response investigation and need to ingest all the logs to a centralized location? While using agents such as FileBeat or Splunk Universal Forwarders is still highly recommended, but perhaps you are not able to install those agents on every endpoint. Well this is where the WEC shines! As more and more agents are installed on endpoints you start running into a multitude of issues such as performance issues, agents just not functioning correctly, or even management approval to do so.

https://learn.microsoft.com/en-us/windows/win32/wec/windows-event-collector

Window-Event-Logging

Window event logging can get over looked very easly. It also can seem like a daughting task for some. Instead of recreating the wheel. I would highly recommend reviewing The Windows Logging Cheat Sheets by MalwareArchaeology.

List out the System audit policy: AuditPol /get /category:*

To set an item: Auditpol /set /category:"Account Management" /success:enable /failure:enable

To set a subcategory individually: Auditpol /set /subcategory:"Directory Service Access" /success:disable /failure:disable

Running on a remote host Invoke-Command -ComputerName -ScriptBlock {AuditPol /get /category:*}

WINDOWS LOGGING CHEAT SHEET This “Windows Logging Cheat Sheet” is intended to help you get started setting up basic and necessary Windows Audit Policy and Logging. By no means is this list extensive; but it does include some very common items that should be enabled, configured, gathered and harvested for any Log Management Program. Start with these settings and add to it as you understand better what is in your logs and what you need. Resource from (www.malwarearchaeology.com)

Powershell-Logging

Greater Visibility Through PowerShell Logging Mandiant is continuously investigating attacks that leverage PowerShell throughout all phases of the attack. A common issue we experience is a lack of available logging that adequately shows what actions the attacker performed using PowerShell. In those investigations, Mandiant routinely offers guidance on increasing PowerShell logging to provide investigators a detection mechanism for malicious activity and a historical record of how PowerShell was used on systems.

SYSMON-Logging

DNS-Logging

SPAN Port Configuration

Cisco

  1. Log in to the switch using a console or terminal connection.

  2. Enter privileged EXEC mode by typing the command: enable

  3. Enter global configuration mode by typing the command: configure terminal

  4. Identify the source port that you want to monitor by typing the command: monitor session session_number source interface interface_number

    Replace session_number with the number of the monitoring session you want to create (e.g. 1), and interface_number with the number of the port you want to monitor (e.g. Gi1/0/1).

  5. Identify the destination port where you want to send the monitored traffic by typing the command: monitor session session_number destination interface interface_number

    Replace session_number with the number of the monitoring session you want to create (e.g. 1), and interface_number with the number of the port you want to use as the destination (e.g. Gi1/0/2).

  6. Verify your configuration by typing the command: show monitor session session_number

    This command displays the details of the monitoring session you just created.

  7. Save your configuration by typing the command: copy running-config startup-config

    This command saves your configuration to non-volatile memory, so it persists across reboots.

Example:

monitor session 1 source interface gi0/1
monitor session 1 destination interface gi0/2

Meraki

In Progress

Fortigate

The Switch Port Analyzer (SPAN) feature is now available for hardware switch interfaces on FortiGate models with built-in hardware switches (for example, the FortiGate-100D, 140D, and 200D etc.)

To enable SPAN on a hardware switch via the GUI, go to System > Network > Interfaces and edit a hardware switch interface.

By default the system may have a hardware switch interface called LAN. A new hardware switch interface can also be created. Select the SPAN check box, then select a source port from which traffic will be mirrored. Select the destination port to which the mirrored traffic is sent. Select to mirror traffic received, traffic sent, or both.

SPAN can also be enabled in the CLI:

config system virtual-switch
edit <port>
set span enable
set span-source-port <port>
set span-dest-port <port>
set span-direction {both | Tx | Rx}    
end
end

Resources

Sysmon-modular Description pending
Window Event Collector Reference to Microsoft's documentation regarding window event collectors.