Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Replicate Filters: If you have custom filters in NXLog (e.g., specific regex patterns for parsing logs), you will need to replicate these with Snare Agents.

    • File (im_file) filters are applied within “Log Files Filters” found under “Log sources” in the left hand navigation menu. Regex filters can be applied on both include or exclude policies to filter data.

    • File Activity Monitoring (im_filemon) filters are applied within the policy itself. Filters can be applied by event types, inclusion scopes, utilised permissions, general regex matches and user matches.

    • Registry Activity Monitoring (im_regmon): filters are applied within the policy itself. Filters can be applied by event types, inclusion scopes, utilised permissions, general regex matches and user matches.

    • Windows Event Logs (im_mseventlog & im_msvistalog): filters are applied within the policy itself. The frequency and collected counters are configured here.

    • Windows Performance Counters (im_winperfcount): filters are applied within the policy itself. The frequency and collected counters are configured here.

  2. Define Processing Rules: For advanced log processing like log enrichment, formatting, and transformation, Snare has predefined rules, but more complex parsing may require manual scripting or working with Snare's support team.

c. Log Forwarding

  • NXLog: You may be forwarding logs to external destinations like a SIEM or syslog server using the output directive.

  • Snare: Similarly, Snare allows you to forward logs to multiple destinations in various formats.

...

  1. Define Output Destinations: Configure destinations under the “Destination Configuration” section of the agent GUI. Specifying the address, port, protocol type (TCP, UDP, TLS, TLS_Auth & MTLS) along with an output format. You can also adjust the specified delimiter of formats on a per destination basis too.Test Output Delivery: Run tests to ensure that logs are forwarded correctly to your SIEM, Syslog server, or any other destinationSet the destination IP as the IP of the Snare reflector, the port as 6161, protocol as TCP and format as “Snare”.

  2. Configure Snare Reflector: Create new destinations within the reflector for the specific log types being collected.

Log type

Format in Reflector

Filter regex (include)

Filter comments

Notes

Apache Web Server

Syslog RFC 3164

ApacheLog

Set “Log Type” in log file policy as “Apache”.

Microsoft ADFS

Raw

AD FS/Admin

Microsoft Defender

Raw

Microsoft-Windows-Windows Defender/Operational

Microsoft DHCP

Syslog RFC 3164

MSSQL\$MICROSOFT##WID|MSSQLSERVER

Replace MSSQLSERVER with instance name

Set “Log Type” in log file policy as “DHCP”.

Microsoft DNS Server

Syslog RFC 3164

MSDNSServer

Set “Log Type” in log file policy as “DNS”.

Microsoft Exchange Parser

Syslog RFC 3164

ExchangeLog

“Custom” Log type specified in policy. Set as "ExchangeLog".

Microsoft IIS Server

Syslog RFC 3164

IISWebLog

Set “Log Type” in log file policy as “IIS”.

Microsoft Windows Powershell

Syslog RFC 3164

Microsoft-Windows-PowerShell/Operational

Microsoft Windows Snare Application

Raw

MSWinEventLog

One desitnation and policy required for Security, Application and System

Microsoft Windows Snare Security

Raw

MSWinEventLog

See above

Microsoft Windows Snare System

Raw

MSWinEventLog

See above

Microsoft Windows Sysmon

Raw

Microsoft-Windows-Sysmon/Operational

Microsoft Windows Sysmon

Syslog

Microsoft-Windows-Sysmon/Operational

RADIUS_NPS

Syslog RFC 3164

RadiusLog

“Custom” Log type specified in policy. Set as "RadiusLog".

Windows MSSQL Via Syslog SNARE

Raw

MSSQL\$MICROSOFT##WID|MSSQLSERVER

Replace MSSQLSERVER with instance name

Windows MSSQL Via Syslog SNARE

Syslog RFC 3164

MSSQL\$MICROSOFT##WID|MSSQLSERVER

Replace MSSQLSERVER with instance name


Note: A port for ingestion of each type will need to be created in Securonix first.

  1. Test Output Delivery: Log into Securonix and check that logs are being received under the specified “Activities” using the “Spotter”. Ensuring the necessary ports are open for communication

...

  1. .

...

4. Configuring Management

...

  • Verify that all logs are being collected correctly from the configured sources.

  • Check timestamps, log formatting, and data integrity to ensure nothing is missing or malformed.

b. Test Log

...

  • Ensure that logs are being processed in the same way (filtered, parsed, enriched) as they were in NXLog.

  • Cross-check with previously stored log data to confirm that no useful information is being lost during migration.

...

Forwarding

  • Test that logs are being forwarded to the correct destinations (SIEM, syslog servers, etc.).

  • Check for proper delivery of logs, and monitor for any delivery failures or delays.

...

c. Check agents available in SAM

  • Review “all agents” section in SAM to confirm agents connected, online and have a license issued.

...