Windows Event Logs
Configure Windows on-premises servers to forward security events to Radiant.
In this guide, you will send Windows Event logs to Radiant Security with the use of an intermediary agent for additional security.
Prerequisites
Supported data feeds
The following types of data feeds are supported for event collection:
DHCP Events
DNS Events
Windows Application Events
Windows Forwarded Events
Windows Security Events
Windows Setup Events
Windows System Events
Add the data connector in Radiant Security
Log in to Radiant Security.
From the navigation menu, click Settings > Data Connectors and click + Add Connector.
Search for and select the Windows Agent option and then click Data Feeds.
Select the Data Feeds you have, then click Credentials.
Under Credential Name, give the credential an identifiable name (e.g.
Windows Agent Credentials).In the Connector tag field, optionally enter any value.
Click Add Connector.
Important note: Windows servers provide application, security, system, and setup events, but they do not generate alerts. If you haven’t connected an alert source yet, it’s critical to onboard one. This allows Radiant to ingest and triage alerts in context with the event logs collected from your Windows servers.
Configure Windows Events forwarding
We will provide you with an installation package to deploy on all Windows servers you want to monitor.
For monitoring to work, each server must be configured to generate the necessary security logs. Follow the steps below to adjust the Local Security Policy and make sure all required events are being recorded.
Steps (to be done on each Windows server or workstation):
Open the Local Security Policy with
Win + Rand type secpol.mscNavigate to Computer Configuration > Windows Settings > Security Settings > Local Policies > Audit Policy and set the following:
On
Audit account logon eventsenableSuccessandFailureOn
Audit account managementenableSuccessandFailureOn
Audit logon eventsenableSuccessandFailureOn
Audit privilege useenableSuccessandFailureOn
Audit process trackingenableSuccessandFailureOn
Audit policy changeenableSuccessandFailure
Navigate to Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies and set the following:
Under
Detailed Tracking, setAudit Process Creationto bothSuccessandFailureUnder
Object Access, set the following:Set
Audit File SystemtoSuccessandFailureSet
Audit RegistrytoSuccessandFailure
Now, to enable the Windows PowerShell logging, navigate to
Computer Configuration>Administrative Templates>Windows Components>Windows PowerShellUnder
Module Logging:Set to
EnabledIn
Module Namesenter*as the value to audit all modules
Set
PowerShell Script Block LoggingtoEnabled
Navigate to
Computer Configuration>Preferences>Windows Settings>Registry
Add new registry key (
New>Registry Item).Enter the following details:
Hive==HKEY_LOCAL_MACHINEKey Path==SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\WINEVT\\ Channels\\Microsoft-Windows-PowerShell\\OperationalValue Name==MaxSizeValue Type==REG_DWORDValue Data==153616384Set as
Decimal
Click
Apply.
Last updated