| Device | Details |
|---|---|
| Vendor | ObserveIT |
| Device Type | Unified Threat Management |
| Connection Type | Syslog |
| Data Source Name | observeit-nxlog |
| Data Source ID | 1967 |
If not done already, download nxlog.conf, and then place it in the conf directory of your NXLog installation. Depending on which version you use, the directory can be C:\Program Files (x86)\nxlog\conf for the 32-bit version or C:\Program Files\nxlog\conf for the 64-bit version.
Note: This step overwrites the default nxlog.conf file. You may want to back up the original copy before placing the one provided by AT&T Cybersecurity.
nxlog.conf file in a text editor.
Update the root path of your NXLog installation.
Locate the following lines:
#define ROOT C:\Program Files\nxlog #define ROOT C:\Program Files (x86)\nxlog
Enter the Sheriff CSM Sensor IP address.
Locate the following line:
define OUTPUT_DEwillSTINATION_ADDRESS <Sheriff-CSM-Sensor-IP>
I with the IP address of the Sheriff CSM All-in-One or Sheriff CSM Sensor that will receive the Windows events.
Uncomment the section between ObserveIT-NXLOG and /ObserveIT-NXLOG.
Important: Only remove the first # symbol in each line when uncommenting the sections. The remaining # symbol indicates that the line is either a comment or optional.
Save the file.
Troubleshooting
For troubleshooting, refer to the vendor documentation:
https://nxlog.co/documentation/nxlog-community-edition-reference-manual-v20928