Tutorial / Cram Notes

Windows Event Forwarding (WEF) allows for the collection of Windows security events from remote systems to a central server. It relies on WinRM (Windows Remote Management) to transmit event data and does not require agents on the originating systems. WEF can use either a push (source-initiated) or pull (collector-initiated) subscription model.

Push Subscription:

  • Source computers are configured to forward events.
  • Ideal for decentralized environments.

Pull Subscription:

  • A central server collects events from source computers.
  • Best suited for centralized control over the collection.

Configuring Event Collection

To configure event collection, follow these steps:

  1. Enable WinRM: Ensure that Windows Remote Management is enabled on both the collector and the source computers.
  2. Create a Subscription: This can be a Collector Initiated Subscription or Source Computer Initiated Subscription:
    • Collector Initiated Subscription:
      • The collector server pulls events from the source computers.
      • Ideal when configurations need to be centralized.
    • Source Computer Initiated Subscription:
      • The source computers push events to the collector.
      • Preferred when sources are in different domains or when the configuration should be decentralized.
  3. Configure Group Policy: If using a domain-based approach, configure Group Policy Objects to define which events are collected and where they are sent.
  4. Define Event Collection Policy: Determine which events are relevant for collection, typically focusing on high-value logs like security, system, and application logs.
  5. Set Up Filtering: It’s essential to filter events to avoid noise. This can be done through the Event Viewer’s Subscription Properties dialog, where you can select specific event IDs or categories.
  6. Security and Access Control: Control who has access to the event logs. Ensure that only authorized accounts can create subscriptions and access the collected events.

Examples of Events to Collect

Category Event IDs Description
Account Logon 4624, 4625 Successful and failed logon attempts.
Account Management 4720, 4726 User account creation and deletion.
Object Access 4663 Access to an object was requested.
Policy Change 4704, 4902 System audit policy was changed.
Privilege Use 4672 Special privileges assigned to new logon.
Detailed Tracking 4688 A new process has been created.

Best Practices

When designing a security event collection strategy, consider the following best practices:

  • Least Privilege Principle: Only assign permissions necessary to accomplish the task.
  • Regular Updates and Configuration Checks: Periodically review and update event forwarding configurations to ensure they meet current security needs.
  • Performance Considerations: Be aware of the impact on network and system performance and adjust event collection volume and filters accordingly.
  • Event Storage and Retention: Ensure that storage solutions are sufficient for the volume of events collected and that they adhere to data retention policies.
  • Integration with SIEM:
    Integrate collected events with a Security Information and Event Management (SIEM) system like Microsoft Sentinel for enhanced analysis and correlation.

Conclusion

Effectively collecting and managing security event logs is a key part of a security operations analyst’s role. SC-200 candidates must be familiar with the design and configuration of Windows Security event collections, focusing on the appropriate event IDs, employing best practices, and ensuring that their configurations are secure and efficient. By following the outlined process, analysts can enhance threat detection and response capabilities within their organizations.

Practice Test with Explanation

True or False: Windows Event Collector Service must be running in order to collect security events on a Windows Server.

  • Answer: True

The Windows Event Collector Service is responsible for managing the subscriptions to events and the collection of those events from remote computers.

Which log level records the most detailed information in Event Viewer?

  • A. Error
  • B. Warning
  • C. Information
  • D. Verbose

Answer: D) Verbose

The Verbose logging level records detailed information that can be helpful for in-depth troubleshooting.

True or False: Event Channels must be configured on both the forwarder (source) and the collector (destination) computers for successful event collection.

  • Answer: True

Both the source and destination systems need to have appropriate Event Channels configured to facilitate the event collection process.

Which Windows feature can be used to forward security events from multiple computers to a central console?

  • A. Task Scheduler
  • B. Performance Monitor
  • C. Event Viewer
  • D. Windows Event Forwarding

Answer: D) Windows Event Forwarding

Windows Event Forwarding allows the forwarding of security and other event log information to a central server.

How are Windows Event Forwarding subscriptions classified?

  • A. Collector initiated
  • B. Source-initiated
  • C. Both A and B
  • D. Neither A nor B

Answer: C) Both A and B

Windows Event Forwarding subscriptions can be either collector initiated or source initiated.

True or False: The Simple Network Management Protocol (SNMP) is required to configure security event collections on Windows.

  • Answer: False

SNMP is not required for configuring security event collections on Windows, as they use the Windows Remote Management (WinRM) service.

Which format is used by Windows Event Forwarding to transmit collected events?

  • A. XML
  • B. JSON
  • C. CSV
  • D. TXT

Answer: A) XML

Windows Event Forwarding uses the XML format to encode and transmit collected events from the source to the collector.

True or False: Encrypted transmission of event logs can only be configured using HTTPS.

  • Answer: False

Although using HTTPS is one method to encrypt the transmission of event logs, other methods such as Windows Remote Management with Kerberos or NTLM authentication can also provide encrypted communication.

In a source-initiated subscription model, which component determines which events to forward?

  • A. Collector server
  • B. Source computers
  • C. Event Viewer
  • D. Subscription manager

Answer: B) Source computers

In a source-initiated model, the source computers are configured to determine which events to forward, based on the subscription manager’s policy.

Which protocol is used by Windows Event Forwarding?

  • A. TCP
  • B. UDP
  • C. WinRM
  • D. FTP

Answer: C) WinRM

Windows Event Forwarding uses the Windows Remote Management (WinRM) protocol to forward events from the source to the collector.

True or False: Kernel events can be collected via Windows Event Log service collection methods.

  • Answer: True

Windows Event Log service can be configured to collect various types of log data, including kernel events.

Which tool is used to create and manage subscriptions for Windows Event Forwarding?

  • A. Event Viewer
  • B. Event Subscription Tool
  • C. Performance Monitor
  • D. Security and Compliance Toolkit

Answer: A) Event Viewer

Event Viewer has an integrated feature to create and manage subscriptions for Windows Event Forwarding.

Interview Questions

What are Windows Security events?

Windows Security events are system-generated event logs that provide information about user activity, security-related events, and errors or warnings.

What is the Event ID of a successful user logon event in Windows Security event logs?

The Event ID of a successful user logon event in Windows Security event logs is 4624.

How can you collect Windows Security events?

You can collect Windows Security events using the Microsoft Monitoring Agent (MMA) or a Syslog server.

What is the benefit of collecting Windows Security events in Microsoft Sentinel?

Collecting Windows Security events in Microsoft Sentinel can help you detect and respond to security incidents by providing real-time alerts and visibility into user activity and security events.

What are the steps to configure a Windows Security event collection in Microsoft Sentinel?

The steps to configure a Windows Security event collection in Microsoft Sentinel include preparing the environment, configuring the Microsoft Monitoring Agent, and configuring the collection in Microsoft Sentinel.

How can you validate a Windows Security event collection in Microsoft Sentinel?

You can validate a Windows Security event collection in Microsoft Sentinel by checking the event count, ensuring that events are being processed and stored in the Log Analytics workspace, and reviewing the event details in the Log Analytics workspace.

What are some common issues that can occur when collecting Windows Security events?

Some common issues that can occur when collecting Windows Security events include agent connectivity issues, configuration errors, and incorrect data formatting.

How can you troubleshoot Windows Security event collection issues?

You can troubleshoot Windows Security event collection issues by reviewing the agent logs, checking the connectivity of the agent and the destination workspace, and reviewing the Azure Diagnostics logs.

How often are Windows Security events collected by default in Microsoft Sentinel?

Windows Security events are collected by default every 15 minutes in Microsoft Sentinel.

What are some use cases for Windows Security event collection in Microsoft Sentinel?

Some use cases for Windows Security event collection in Microsoft Sentinel include detecting and responding to insider threats, detecting lateral movement in the network, and detecting malware infections.

0 0 votes
Article Rating
Subscribe
Notify of
guest
24 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Hudson Wood
11 months ago

Great post! This really helped me understand how to set up event collections for Windows Security.

Egon Heinen
1 year ago

I’m having trouble configuring the Data Collector Set. Any tips?

Jack Morris
1 year ago

What specific events should I be looking for in Windows Security logs for SC-200?

Simon Caron
1 year ago

Can you collect Windows Security events using Azure Sentinel as well?

Sofia Andrews
1 year ago

The blog post was very insightful, thanks!

Moustapha Doodeman
10 months ago

Didn’t find it useful. Could use more detailed steps.

Jessie Vasquez
1 year ago

Is there any way to automate alert generation for specific security events?

Isaac Singh
1 year ago

What logs are essential to monitor for compliance with SC-200?

24
0
Would love your thoughts, please comment.x
()
x