AlienVault® USM Anywhere™

Microsoft Windows Firewall NXLog

When you configure Microsoft Windows Firewall to send log data through NXLog to USM Anywhere, you can use the Windows Firewall NXLog plugin to translate the raw log data into normalized events for analysis.

Device Details
Device vendor Microsoft
Device type Firewall
Connection type syslog
Vendor link https://technet.microsoft.com/en-us/library/ee806447(v=ocs.14).aspx

Before you configure Windows Firewall with Advanced Security to send logs to USM Anywhere through NXLog, you must first enable logging in the program.

To enable logging in Windows Firewall

  1. Open Windows Firewall with Advanced Security.
  2. In the Actions panel, click Properties.
  3. On the Domain Profile tab, click the Customize button in Logging.
  4. In the new window, complete these steps:

    1. Keep the name as default.
    2. Increase the Size limit (KB) to 8192.
    3. Change both Log dropped packets and Log successful connections to Yes.

    Windows Firewall logging settings

  5. Click OK.

Configure NXLog

Before you configure the integration, you must have the IP address of the USM Anywhere Sensor.

To install NXLog CE and configure forwarding

  1. Download the newest stable NXLog Community Edition.
  2. Make a backup copy of the original C:\Program Files (x86)\nxlog\conf\nxlog.conf file and give it another name.
  3. Download the NXLog configuration for USM Anywhere and save it as your new nxlog.conf file.
  4. Open the configuration file for editing and replace usmsensoriphere with the IP address of the USM Anywhere Sensor.

    USM Anywhere listens for syslog at UDP port 514, TCP port 601, or TLS/TCP port 6514.

  5. Depending on the protocol you decide to use, edit the configuration file as detailed below. Make sure USM Anywhere allows inbound requests to the corresponding port.

  6. Some sections in the nxlog.conf file have been commented out to improve performance. Depending on which product you want to collect logs from, you need to uncomment the corresponding section.

    • To collect logs from the Windows Firewall, uncomment the section between WINDOWS-FW-NXLOG and /WINDOWS-FW-NXLOG.
  7. Save the file.
  8. Open Windows Services and restart the NXLog service.
  9. Open USM Anywhere and verify that you are receiving NXLog events.

Note: If you need to debug NXLog, open C:\Program Files (x86)\nxlog\data\nxlog.log.

Plugin Enablement

The Windows Firewall NXLog plugin automatically processes all messages when the raw message contains "SourceName":"WINDOWS-FW".

Available Plugin Fields

The following plugin fields are important attributes extracted from the syslog message. The USM Anywhere reports use these fields, and you can also reference them when creating custom reports. In addition to reporting, the USM Anywhere correlation rules make use of these fields.

  • access_control_outcome

  • customfield_0

  • customfield_2

  • customfield_3

  • customfield_6

  • customfield_7

  • customheader_0

  • customheader_2

  • customheader_3

  • customheader_6

  • customheader_7

  • destination_address

  • destination_address_6

  • destination_port

  • device_direction

  • event_description

  • event_name

  • event_receipt_time

  • event_subcategory

  • plugin_device

  • plugin_device_type

  • source_address

  • source_address_6

  • source_port

  • transport_protocol

Troubleshooting

For troubleshooting, refer to the vendor documentation:

https://nxlog.co/docs/nxlog-ce/nxlog-reference-manual.html#forwarding

https://nxlog.co/docs/nxlog-ce/nxlog-reference-manual.html#troubleshooting