Microsoft Windows - DHCP
Windows Configuration
The Snare agent currently only supports the DHCP audit txt log output, follow the below steps to configure and output the logs
Click Start > Programs > Administrative Tools > DHCP.
Now that you have the DHCP management console open, right-click on your DHCP server OR IPv4 protocol and select Properties.
Now that you have the properties open for your DHCP server or IPv4 protocol select the General tab and select Enable DHCP audit logging.
Now that you’ve enabled DHCP audit logging select the Advanced tab and record your Audit log file path for future configuration needs.
Click the OK button.
Agent Configuration
Snare can forward log data to Securonix using their pre-configured parsers. This guide outlines the steps to configure the Snare agent, along with links to the Securonix documentation on how to finalise configuration within Securonix itself.
Follow steps outlined here to install the Snare agent. Agent Installation - Snare Windows Agent v5 Documentation - Confluence
To collect the DHCP logs from the newly created log file navigate to “Log Sources > Log Files”
Click “Add”, Select the log type and select “ Microsoft DHCP server logs”
Select “Single Line Only” logs start and end in the txt file.
Paste in the location of the log file e.g. C:\DHCP.txt into the “Log file or Directory Field”
In the “Log File Format” Field input the name of the file e.g. *.log
Once happy click Change configuration and restart the service to save the change.
Once happy and changes applied select “Destination configuration”.
Under the “Network Destinations” section, enter the domain/IP address and port for Snare Reflector, and ensure Format is “Snare” and “Delimiter Character” is “Tab”.
Snare Reflector Configuration
Login to Snare Central. Navigate to the Reflector UI (System->Administrative Tools-> Configure Collector/Reflector) and select “Destinations” on the left hand menu.
Select “Add Destination” at the bottom of the page and create a new destination with the following configuration and select “Update”, the “Proceed with update” and scroll to the top of the window and select “Restart Reflector” to apply the settings.
Configuration option | Value |
---|---|
Hostname | IP/Hostname of the SNYPR instance in Securonix. |
Port | Port associated with the Snare Microsoft Windows parser |
Format | Set the format to “QRadar” |
Protocol | Set the protocol to UDP, TCP or TLS as per the configuration in SNYPR. |
Add Regular Expression | Create a policies with the following regular expression and mode set to “Include” (not including quotes): |
Once applied, return to the Reflector dashboard by selecting “Dashboard” and locate the chart for the destination that was just configured. Ensure the “Status” is “Sending” and that the chart has values.
Once applied, return to the Reflector dashboard by selecting “Dashboard” and locate the chart for the destination that was just configured. Ensure the “Status” is “Sending” and that the chart has values.
Finally, validate the delivery of logs to Securonix using the “Spotter” feature within the Securonix platform.