Device | Details |
---|---|
Vendor | Microsoft |
Device Type | Web server |
Connection Type | Syslog |
Data Source Name | iis-nxlog |
Data Source ID | 1502 |
In the Connections tab, select the server and double-click the Logging icon.
Under Log File, click Select Fields to choose the information you want to log.
Make sure to match the following screenshot because the Windows IIS plugin will look for these fields:
If not done already, download NXLog.conf, and then place it in the conf
directory of your NXLog installation. Depending on which version you use, the directory can be C:\Program Files (x86)\!NXLog\conf
for the 32-bit version or C:\Program Files\NXLog\conf
for the 64-bit version.
Note: This step overwrites the default NXLog.conf file. You may want to back up the original copy before placing the one provided by AT&T Cybersecurity.
NXLog.conf
file in a text editor.
Update the root path of your NXLog installation.
Locate the following lines:
#define ROOT C:\Program Files\!NXLog #define ROOT C:\Program Files (x86)\!NXLog
Enter the Sheriff CSM Sensor (Deputy) IP address.
Locate the following line:
define OUTPUT_DESTINATION_ADDRESS <Sheriff-CSM-Sensor-IP>
<Sheriff-CSM-Sensor-IP>
with the IP address of the Sheriff CSM All-in-One or Sheriff CSM Sensor that will receive the Windows events.
Uncomment the section between IIS-NXLog and /IIS-NXLog.
Important: Only remove the first # symbol in each line when uncommenting the sections. The remaining # symbol indicates that the line is either a comment or optional.
In addition, uncomment the following lines, above the DHCP-NXLog
section:
#<Extension json> # Module xm_json #</Extension>
Save the file.