This is the third tutorial in the “Free SIEM” series.
Today the aim is to set up log forwarding to a central log Server from all our end points with Group Policy, and as an added bonus we are going to forward all Sysmon logs as well.
For the topology we have a Domain Controller (DC), and separate Event Log collector server (EL), and other Windows Desktops on the domain (WD).
First we open Group Policy Management Console on our DC, to create a new GPO for our forwarding rules. For the purpose of this tutorial our test domain is named “glitchcorp.co.uk”, wherever you see this you should replace with your own FQDN.
Our new Policy is named “Event Forwarding”
Go to “Computer Configuration/Policies/Administrative Templates/Windows Components/Event Forwarding” to create our Target Subscription – basically the log server which will be collecting all the forwarded logs (EL). Right-click the highlighted option.
Enable the setting and then copy the highlighted text and add your server details and set the final option (Refresh=) to 60 as shown.
Save the configuration. Now we set permissions for the Security log to ensure it can be read. Go to; “Computer Configuration/Policies/Administrative Templates/Windows Components/Event Log Service/Security” Right-click and “edit”
Enable the setting, but we need to permission string for the “Log Access” box. For this we need to open Powershell.
We use “wevtutil.exe” to get the existing permissions and add the new account to the end. Run the command below then copy the string that is returned. Paste this into your “Log Access” box but at the end add either (A;;0x1;;;NS) or (A;;0x1;;;S-1-5-20). This will give the “NETWORK SERVICE” read access to the logs. (NOTE: Due to the way Sysmon works this will not grant access to Sysmon logs. We will set this in the Registry using a different method)
Save your settings. Next we go to “Computer Configuration/Policies/Windows Settings//Security Settings/Restricted Groups” Right-click and Add Group as shown.
Then add the members as shown. (You only need one entry for the NETWORK SERVICE but I had some issues so added both ways here then saved. If it identifies both without issues, then keep “NT AUTHORITY\NETWORK SERVICE”, and remove the other). Save your settings.
Now we make the Registry change for Sysmon log permissions.
Go to; “Computer Configuration/Preferences/Windows Settings\Registry” and Right-click to add new Registry Item.
Complete as shown. The full path is shown below, and the Value data is the same as we used earlier.
This is the “key path”
This is a reminder of the Powershell query
Paste this into your “Value Data” box but at the end add either (A;;0x1;;;NS) or (A;;0x1;;;S-1-5-20) as before. This will give the “NETWORK SERVICE” read access to the logs. Save your settings.
NOTE: Don’t run the below command. This is just to show basically what the Registry entry is doing, and give you some understanding. You could run this command if you were forwarding logs from a single machine but in a large environment you should use Group Policy to prevent using lot’s of scripts, or running the same thing over and over on each individual machine.
OK so we have now setup the Log forwarding location, and the permissions required, now we need to ensure the required services are running on the source computers on the Domain so they can forward the logs to our collecting server.
Browse to; Computer Configuration/Preferences/Control Panel Settings/Services/
Right-click and select New Service
Complete as shown
Save your settings then do the same for Sysmon.
You should have 2 entries as shown.
Now we need to configure the Firewalls to listen, and allow them to “push” the Event Logs to the EL server.
Go to; “Computer Configuration/Policies/Administrative Templates/Windows Components/Windows Remote Management/WinRM Service” and right-click the highlighted options.
Configure as shown.
Save your settings. Now we go to “Computer Configuration/Policies/Windows Settings/Security Settings/Windows Firewall with Advanced Security”
Right-click “Inbound Rules” New Rule
Complete each box as shown
That’s the GP work completed so let’s open powershell on the DC and update the domain policy. You can also run this command on any endpoints you want to ensure are up to date with these settings reading for testing.
If you want to test that an endpoint is receiving the new policy you can use the command below. You can see under “Applied Group Policy Objects” our “Event Forwarding” policy is there.
NOTE: Each of the endpoints you will be sending logs from may need to have the following command run from an elevated Powershell window “WinRM quickconfig”.
It all depends on what OS you are running, but if it is already running, this command will not do any harm. If running Win 10/Server 2012 R2 it should already be running.
We head over to our EL server now and start to complete the set up on the collector. Run the below from an elevated powershell window.
Then open Event Viewer
Let’s create our first subscription. Right-click and create a new Subscription.
That’s the Sysmon Subscription sorted, now we need one for the other Windows logs.
Right-click and repeat with different settings this time as shown.
Enable both Subscriptions so they have the green tick.
You can right-click each one and check “Runtime status” this will show a list of connected machines.
Now go to “Forwarded Events” and watch all your logs come through. Make sure you are seeing entries for “Sysmon”, “Application”, “Security”, “Setup” and “System”. (Although in my screen shot all you can see is Sysmon lol!)
Congratulations! Yes it’s a bit of a slog but it is worth it. Make sure you come back for part 4.