WinLogBeat Host Collection
Original note created: 25JAN2023
- These notes are for setting up host collection using WinLogBeat with SecurityOnion.
- This page will be updated and enriched in the future.
[+] Download sysmon, and utilize below config file:
https://download.sysinternals.com/files/Sysmon.zip
https://github.com/SwiftOnSecurity/sysmon-config
Syntax:
.\sysmon64.exe -i .\sysmonconfig-export.xml
[+] Download Winlogbeat directly from the SOC to make sure the host and server are using the same versions
[+] Run 'sudo so-allow' on SO and set Logstash Beat (5044/tcp) to allow traffic from anything within the desired subnet.
[+] Navigate to "C:\ProgramData\Elastic\Beats\winlogbeat"
[+] Copy 'winlogbeat.example.yml' to 'winlogbeat.yml' and modify it to:
``
#=== Winlogbeat specific options ===
winlogbeat.event_logs:
- name: Application
ignore_older: 72h
- name: System
- name: Security
- name: Microsoft-Windows-Sysmon/Operational
- name: Microsoft-Windows-PowerShell/Operational
#--- Elasticsearch Output ---
#output.elasticsearch
# Array of hosts to connect to
# hosts: ["localhost:9200"]
#=== Logstash output ===
output.logstash:
# The Logstash hosts
hosts: ["<SECONION_NAME>:5044"]
``
Note:
Make sure you specify the SecOnion name IF you setup DNS resolution/FQDN.
If you didn't, use the IP -- this can make or break host collection.
[+] Start 'Elastic Winlogbeat-Oss' service.