Device | Details |
---|---|
Vendor | Microsoft |
Device Type | Server |
Connection Type | Syslog |
Data Source Name | winftp-nxlog |
Data Source ID | 1916 |
Open IIS Manager.
Under Log File, click Select W3C Fields, and then select the information you want to log.
Make sure to select the items checked in the screenshot below and click OK.
Select UTF8 under Encoding and Daily under Schedule.
Click Apply.
If not done already, download nxlog.conf, and then place it in the conf
directory of your NXLog installation. Depending on which version you use, the directory can be C:\Program Files (x86)\nxlog\conf
for the 32-bit version or C:\Program Files\nxlog\conf for the 64-bit version.
Note: This step overwrites the default nxlog.conf
file. You may want to back up the original copy before placing the one provided by AT&T Cybersecurity.
nxlog.conf
file in a text editor.
Update the root path of your NXLog installation.
Locate the following lines:
#define ROOT C:\Program Files\nxlog #define ROOT C:\Program Files (x86)\nxlog
Enter the Sheriff CSM Sensor (Deputy) IP address.
Locate the following line:
define OUTPUT_DESTINATION_ADDRESS <gap Sheriff-CSM-Sensor-IP>
<Sheriff-CSM-Sensor-IP>
with the IP address of the Sheriff CSM All-in-One or Sheriff CSM Sensor that will receive the Windows events.
Uncomment the section between FTP-NXLOG and /FTP-NXLOG.
Important: Only remove the first # symbol in each line when uncommenting the sections. The remaining # symbol indicates that the line is either a comment or optional.
In addition, uncomment the following lines, above the DHCP-NXLOG section:
#<Extension json> # Module xm_json #</Extension>
Save the file.