There's a bakery rule "Finetune Windows Eventlog monitoring", that should be used to define which Eventlogs should be considered, and how.
In this use case, we are only interested in the Security log, so the rule should look like this and should match all hosts we want to monitor the Security log on:
Setup→ Agents → Windows, Linux, Solaris, AIX → Agent rules → Finetune Windows Eventlog monitoring → Add Rule
After saving this rule, activate the changes and bake & sign your agents.
If you would discover the services of your affected Windows hosts now, you will get the old-school Checkmk Services "Log Security" with the "Open Log" in their context menus.
Instead, we want the events to be forwarded to the Event Console. Therefore, we use the rule "Logwatch Event Console Forwarding":
Setup → Services → Service monitoring rules → Logwatch Event Console Forwarding → Add Rule
We recommend using the spooling, so the events are buffered if the Event Console should be down for a moment. The syslog facility "local1" can be used later in the EC rules for efficient event handling.
After saving this rule, do a service discovery on the affected hosts and activate the changes.
From now on, the events from the Windows Eventlog on your hosts will be translated to Checkmk Event Console events and put into the event archive (if not matching any EC Rule, yet):
To categorize and classify the incoming events, we will create some EC Rules in the next paragraph. Using the message texts from the Event History, you can define the needed Regex patterns for that.
First, create a Rulepack with a suitable name:
Go to the rules of this Rulepack:
There, create a rule to handle all events that are not matching any other rules, yet:
Setup → Events → Event Console rule packs → Add Rule
Here, we need two regular expressions:
The first one is applied to the message text and defines three matching groups using the brackets:
.{3} [0-9]+ [0-9:]{8} [0-9]+\.([0-9]{4}) ([^ ]+) (.*) |
The "Outcome & Action" section can remain unchanged, but in the Counting & Timing, we have two definitions:
The counting is done based on the hostname and the application. Forcing separate events for different match groups makes no sense here because the message text is stored in group 3, and as we all know, these texts sometimes contain IDs, timestamps, and similar unique strings.
As the events that match this rule will be categorized as "unknown", we will only keep them for 4 hours to keep our Event view as small and clean as possible.
In the Rewriting section, we can adjust the message text, application, and other variables that will be shown in the event views:
The message text will be replaced using the groups from above:
Unknown $MATCH_GROUPS_SYSLOG_APPLICATION_1$ event with ID \1: \3
When using the example log entry from our regex101.com excursion, we get:
Unknown Security event with ID 4799: A security-enabled local group membership was enumerated. Subject: Security ID: S-1-5-18 Account Name: DESKTOP-DLP6NNN$ Account Domain: WORKGROUP Logon ID: ...
The application will be replaced also using groups from above:
WinEvtLog_Unknown_$MATCH_GROUPS_SYSLOG_APPLICATION_1$_$MATCH_GROUPS_MESSAGE_1$
When using the example log entry from our regex101.com excursion, we get:
WinEvtLog_Unknown_Security_4799
Using this "unknown" rule, we will catch all so-far not categorized events, adjust their message text and application, and then aggregate ("count") them based on the hostname and that modified application.
Based on the events that are now catched by the "unknown" rule, we can pick single Event IDs and create rules for them to handle them separately. Let's chose this event in the first step:
Unknown Security event with ID 4720: A user account was created. Subject: Security ID: S-1-12-1-123456789012-123456789012-123456789012-123456789012 Account Name: LarsGetwan Account Domain: AzureAD Logon ID: 0x83d81 New Account: Security ID: S-1-5-21-123456789012-123456789012-123456789012-1001 Account Name: eric.clapton Account Domain: DESKTOP-DLP6NNN Attributes: SAM Account Name: eric.clapton Display Name: %%1793 User Principal Name: - Home Directory: %%1793 Home Drive: %%1793 Script Path: %%1793 Profile Path: %%1793 User Workstations: %%1793 Password Last Set: %%1794 Account Expires: %%1794 Primary Group ID: 513 Allowed To Delegate To: - Old UAC Value: 0x0 New UAC Value: 0x15 User Account Control: %%2080 %%2082 %%2084 User Parameters: %%1793 SID History: - Logon Hours: %%1797 Additional Information: Privileges -
Clone the "unknown" rule and modify the following fields:
Using the long message text, we pick out the important information (colored) and create a regular expression pattern, starting with the one we already used in the "unknown" rule:
.{3} [0-9]+ [0-9:]{8} .\.4720 \S+ A user account was created. Subject: Security ID: \S* Account Name: (\S+) Account Domain: \S+ Logon ID: \S+ New Account: Security ID: \S* Account Name: (\S+) Account Domain: .*
Fill in the new pattern in the "Text to match" field:
The counting and timing also will be changed a bit:
For this kind of events, we want separate events if the match groups ("executing user name" and "affected user name") are different.
Also, we don't want to archive these events after few hours, but after 3 days ( => keep over the weekend).
In the rewriting section, the texts are also adjusted to the newly defined event:
We have to create further specific rules as done in the last steps. Here are some things you have to take care of:
After that, your rule pack should look similar to this:
Testing these rules by creating and deleting a user on the monitored host results in the following events:
To get rid of the "unknown" events in-between, we can do two things:
Related articles appear here based on the labels you select. Click to edit the macro and add or change labels.
|