When you configure your Microsoft Windows Firewall to send log data to USM Appliance, you can use the Microsoft Windows Firewall plugin to translate raw log data into normalized events for analysis. The table below provides some basic information for the plugin.
Device | Details |
---|---|
Vendor | Microsoft |
Device Type | Firewall |
Connection Type | Syslog |
Data Source Name | windows-fw-nxlog |
Data Source ID | 1918 |
Integrating Windows Firewall and NXLog
Before configuring NXLog
Enable Logging in Windows Firewall
To enable logging in Windows Firewall
- Open Windows Firewall with Advanced Security.
- In the Actions panel, click Properties.
- On the Domain Profile tab, click the Customize button in Logging.
-
In the new window, complete these steps:
- Keep the name as default.
- Increase the Size limit (KB) to 8192.
- Change both Log dropped packets and Log successful connections to Yes.
-
Click OK.
Configure NXLog on Windows
To send log data through NXLog to USM Appliance
-
If not done already, download nxlog.conf, and then place it in the conf directory of your NXLog installation. Depending on which version you use, the directory can be C:\Program Files (x86)\nxlog\conf\ for the 32-bit version or C:\Program Files\nxlog\conf\ for the 64-bit version.
Note: This step overwrites the default nxlog.conf file. You may want to back up the original copy before placing the one provided by AT&T Cybersecurity.
- Open the nxlog.conf file in a text editor.
-
Update the root path of your NXLog installation.
-
Locate the following lines:
#define ROOT C:\Program Files\nxlog
#define ROOT C:\Program Files (x86)\nxlog
- Uncomment the path that matches the NXLog installation on your Windows machine.
-
-
Enter the USM Appliance Sensor IP address.
-
Locate the following line:
define OUTPUT_DESTINATION_ADDRESS <USM-Appliance-Sensor-IP>
- Replace <USM-Appliance-Sensor-IP> with the IP address of the USM Appliance All-in-One or USM Appliance Sensor that will receive the Windows events.
-
-
Uncomment the section between WINDOWS-FW-NXLOG and /WINDOWS-FW-NXLOG.
Important: Only remove the first # symbol in each line when uncommenting the sections. The remaining # symbol indicates that the line is either a comment or optional.
-
In addition, uncomment the following lines, above the DHCP-NXLOG section:
#<Extension json>
# Module xm_json
#</Extension>
- Save the file.
- Start or restart the NXLog service.
Plugin Enablement
For plugin enablement information, see Enable Plugins.
If enabling the plugin on assets, you will find it listed as Microsoft : Windows Firewall : NXLog.
Additional Resources and Troubleshooting
For troubleshooting, refer to the vendor documentation: