Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ossec windows agent support for Windows event trace logs (.etl ) format #665

Open
chintanhshah opened this issue Sep 14, 2015 · 11 comments
Open

Comments

@chintanhshah
Copy link

Refer to the thread opend in Ossec -list .

https://groups.google.com/forum/#!topic/ossec-list/o1SXX5Wk0A0

All issues has been discussed in this thread ..

@drewbeebe
Copy link

Requesting a bump in priority for this, if it hasn't been previously handled.

I would like to monitor DNS requests (to a Windows Server 2012 DNS server) and process them through CDB Malware Domain matching and Windows Server 2012 DNS requests are only logged using the .etl format.

Some Microsoft coding documentation regarding Event Trace Log format refers to the following functions (hope this helps!)

OpenTrace Function
TRACEHANDLE OpenTrace(
Inout PEVENT_TRACE_LOGFILE Logfile
);

ProcessTrace Function
ULONG ProcessTrace(
In PTRACEHANDLE HandleArray,
In ULONG HandleCount,
In LPFILETIME StartTime,
In LPFILETIME EndTime
);

CloseTrace Function
ULONG CloseTrace(
In TRACEHANDLE TraceHandle
);

@ddpbsd
Copy link
Member

ddpbsd commented Oct 6, 2016

On Thu, Oct 6, 2016 at 10:42 AM, drewbeebe notifications@github.com wrote:

Requesting a bump in priority for this, if it hasn't been previously handled.

You can submit a pull request on github: https://github.com/ossec/ossec-hids
So far no one has seemed very interested in the feature.

I would like to monitor DNS requests (to a Windows Server 2012 DNS server) and process them through CDB Malware Domain matching and Windows Server 2012 DNS requests are only logged using the .etl format.

Some Microsoft coding documentation regarding Event Trace Log format refers to the following functions (hope this helps!)

OpenTrace Function
TRACEHANDLE OpenTrace(
Inout PEVENT_TRACE_LOGFILE Logfile
);

ProcessTrace Function
ULONG ProcessTrace(
In PTRACEHANDLE HandleArray,
In ULONG HandleCount,
In LPFILETIME StartTime,
In LPFILETIME EndTime
);

CloseTrace Function
ULONG CloseTrace(
In TRACEHANDLE TraceHandle
);


You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.

@elvarb
Copy link

elvarb commented Oct 6, 2016

@drewbeebe check out packetbeat from elastic, it can monitor Dns

@gcrow
Copy link

gcrow commented Nov 29, 2016

Also looking to read ETL natively in ossec. Suspect it will get more popular as 2016 natively outputs DNS logs in this format, and 2012R2 does with a hotfix.

@LFBernardo
Copy link

This may become more prevalent shortly as monitoring DNS has become a necessity for large environments. Proven data ex-filtration by DNS etc might speed this up.

@drewbeebe
Copy link

drewbeebe commented Sep 13, 2017 via email

@ddpbsd
Copy link
Member

ddpbsd commented Sep 14, 2017

Unfortunately there isn't a lot of interest in working on the Windows agent at the moment. We'd love for some volunteers to jump in though!

@drewbeebe
Copy link

drewbeebe commented Sep 14, 2017 via email

@ddpbsd
Copy link
Member

ddpbsd commented Sep 14, 2017

I'm not aware of any primers or anything, but you'd need to know a bit of C for the Windows platform.

@awiddersheim
Copy link
Member

awiddersheim commented Sep 14, 2017

You can read the existing event log and event channel code. Might be of some help getting an idea of what the work is like:

https://github.com/ossec/ossec-hids/blob/master/src/logcollector/read_win_event_channel.c
https://github.com/ossec/ossec-hids/blob/master/src/logcollector/read_win_el.c

@ddpbsd
Copy link
Member

ddpbsd commented Sep 14, 2017

I haven't downloaded it yet, but this looks promising:
https://msdn.microsoft.com/en-us/library/aa363805(v=vs.85).aspx

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants