AlienVault® USM Anywhere™

Microsoft Windows DHCP NXLog

When you configure Microsoft DHCP Server to send logs through NXLog to USM Anywhere, you can use the Windows DHCP NXLog plugin to translate the raw log data into normalized events for analysis.

Device Details
Device vendor Microsoft
Device type DHCP server
Connection type Syslog

Integrating NXLog for Microsoft DHCP Server

Before you configure the integration, you must have the IP address of the USM Anywhere Sensor.

To install NXLog CE and configure forwarding

  1. Download the newest stable NXLog Community Edition.
  2. Make a backup copy of the original C:\Program Files (x86)\nxlog\conf\nxlog.conf file and give it another name.
  3. Download the NXLog configuration for USM Anywhere and save it as your new nxlog.conf file.
  4. Open the configuration file for editing and replace usmsensoriphere with the IP address of the USM Anywhere Sensor.

    USM Anywhere listens for syslog at UDP port 514, TCP port 601, or TLS/TCP port 6514.

  5. Depending on the protocol you decide to use, edit the configuration file as detailed below. Make sure USM Anywhere allows inbound requests to the corresponding port.

  6. Some sections in the nxlog.conf file have been commented out to improve performance. Depending on which product you want to collect logs from, you need to uncomment the corresponding section.

    • To collect logs from the Microsoft DHCP Server, uncomment the section between DHCP-NXLOG and /DHCP-NXLOG.
  7. Save the file.
  8. Open Windows Services and restart the NXLog service.
  9. Open USM Anywhere and verify that you are receiving NXLog events.

Note: If you need to debug NXLog, open C:\Program Files (x86)\nxlog\data\nxlog.log.

Plugin Enablement

The Windows DHCP NXLog plugin automatically processes all messages when the raw message contains DHCP-NXLOG.

Available Plugin Fields

The following plugin fields are important attributes extracted from the syslog message. The USM Anywhere reports use these fields, and you can also reference them when creating custom reports. In addition to reporting, the USM Anywhere correlation rules make use of these fields.

  • timestamp_occured

  • source_address

  • destination_address

  • destination_port

  • source_username

  • request_user_agent

  • response_code

  • request_referrer

  • request_url

  • request_method

  • duration

  • event_name


For troubleshooting, refer to the vendor documentation: