Windows Event Log Ingestion (WELI)

Introduction

Windows Event Log Ingestion (WELI) allows for Vectra to ingest Microsoft Windows security event logs to drive Privileged Access Analytics (PAA) and Kerberoasting Detections. This feature can be used to complement the coverage from network traffic and will also provide Host-ID information for IP to Host mappings observed in the event logs. Vectra ingests two Windows security event id’s: 4768 (Ticket Granting Ticket) and 4769 (Ticket Granting Service). Further, only successful events are ingested. Any other windows security event IDs sent to the Vectra Brain will be discarded.

Make sure that Security Audit Logging is enabled on every domain Controller. Follow Microsoft documentation.arrow-up-right

Both events are under Account Logon:

  • Event 4768 - Audit Kerberos Authentication Service

  • Event 4769 - Audit Kerberos Service Ticket Operations

Differences between WELI and SIEM Event Forwarding

Vectra has historically had two different options that could ingest Microsoft Windows security event log data:

  • SIEM Event Forwarding - details available here.

    • Vectra plans to deprecate the Kerberos event ingestion functionality of this feature and rename it to "DHCP Log Ingestion" in a future release.

    • This feature should only be used for DHCP log ingestion to provide naming artifacts to be used by Vectra's automated Host ID. It is primarily used when not all DHCP messages are being captured by Sensors in network traffic.

    • With the existing implementation, Windows Security Event Log data was limited to ingesting only Kerberos event 4768 and this data was only used by this feature to provide naming artifacts used by Vectra's automated Host ID capability. The data did not help to feed Kerberos learnings that were used by Vectra's Privileged Access Analytics AI models.

  • Windows Event Log Ingestion (WELI) - details are available in the article you are currently reading.

    • This feature ingests Windows security event logs only (no DHCP) and helps to provide naming artifacts to be used by Vectra's automated Host ID and also helps to feed Kerberos learnings used by Vectra's PAA Detections.

  • Please only use SIEM Event Forwarding to feed DHCP log data into Vectra as we are actively working to migrate any customers still using this feature for Kerberos 4768 messages to move to WELI.

  • Please use WELI for any forwarding of Windows Security Event Log Kerberos messages to your Vectra platform.

  • Enabling both of these integrations is considered a best practice.

Frequently Asked Questions (FAQ)

Is it ok to have both Windows Event Log Ingestion + capture the Kerberos traffic from the network with a Sensor?

  • Yes, this is an accepted configuration.

  • Generally, if Vectra observes the kerberos traffic via the network there is no need to also consume the Windows Event Logs. Typically customers will enable Windows Event Log Ingestion for network segments that do not have visibility for network traffic but which they still want some measure of coverage for the Domain Controllers and user identity.

Are there differences between detections generated by Windows Event Logs vs. Network Traffic?

  • There should not be differences in which detections will be generated; however, depending on the Windows Environment, certain attributes may be represented in a different way depending on if the datasource was Windows Event Logs or Kerberos network traffic. For instance, sometimes, the Windows Event Logs will display the UUID object name of a service rather than the user friendly service name, which the detection will reflect.

Is Windows Event Log Ingestion only used for detections?

  • No, Windows Event Log Ingestion is used for the following:

    • Providing metadata that can feed detection models.

    • Producing metadata for use in Recall, Stream, or Respond UX features such as Advanced Investigation.

    • Providing data to HostID to help with automated naming of host entities.

Supported Transfer Types

  • Kafka

    • Using SASL Plain authentication with either Plaintext or SSL as a protocol

  • Raw TCP

    • With XML as a data format and listening on your Brain at port 4637

  • Syslog

    • Using TCP and listening on your Brain at port 4638

    • Supported formats are:

      • Snare

      • IETF RFC 5424

      • ISC

Additional Guidance for Specific Log Sources

  • NXLog

  • Splunk

    • The Splunk Universal Forwarder should be installed on your domain controller(s).

    • Logs can be forwarded as XML or in Splunk's legacy text based format but XML is the preferred format.

      • Splunk's legacy text format is multiline. Customers may be using the older format because it is legacy and they may have developed queries around it. You can't use both XML and text on the same source without some tricky configuration and we do not want Splunk to index the data twice. XML is preferred as it consumes less Splunk license and is not based on the OS language.

    • See the following Vectra Support KBs for Splunk WELI integration advice.

How can I configure WELI to accept data from my source?

WELI is configured in Settings > External Connectors > Windows Event Log Ingestion:

  • First toggle the setting to on after selecting to edit the configuration of the feature.

  • After toggling WELI on, you must the choose a type of transport (Kafka, Raw TCP, or Syslog).

  • Different transport types have different options.

  • Fill in the blanks and make sure to enter the Server IP/Hostname and Port if required for your selected transport so that your Vectra platform knows where to expect communications from.

  • Multiple sources can be configured if required in your environment.

  • Click "Save"

How can I validate successful parsing of WELI data?

There are several ways to validate that data is being successfully processed by WELI:

Once the system has begun to process data (this could take several minutes), statistics will be shown under the WELI setting:

For Recall or Stream customers, the metadata_kerberos_txn-* can be examined to see messages being successfully parsed shortly after ingestion. Looking for a data_source of "log" (pointed to with a green arrow in the below diagram) shows successful message parsing via WELI. If you see a data_source of "network" that indicates kerberos messages that were seen in network traffic captured by your sensors.

Vectra support personnel also have the ability via remote support to run a CLI command to see additional statistics and optionally some recent events that were captured to aid in diagnosis if you are having difficulty with the feature.

Example Parseable Messages

This is not an exhaustive list but provides examples for several formats that parse successfully:

Snare

IETF RFC 5424

ISC

Last updated

Was this helpful?