Client Configuration – SGBox Next Generation SIEM & SOAR https://www.sgbox.eu Next Generation SIEM & SOAR Fri, 22 Nov 2024 16:15:05 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://www.sgbox.eu/wp-content/uploads/2020/09/cropped-Logo-SGBox-Trasparente-NO-SCRITTA-150x150.webp Client Configuration – SGBox Next Generation SIEM & SOAR https://www.sgbox.eu 32 32 syslog configuration on Zyxel Firewalls https://www.sgbox.eu/en/knowledge-base/configure-zyxel-firewalls/ Wed, 24 Jul 2024 13:56:31 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=26712

Syslog configuration on Zyxel Firewalls

Configure Zyxel Firewalls

Configure Zyxel device to forward syslog data to SGBox

  1.  Log into the Zyxel Web Interface.
  2. Navigate to Configuration > Log & Report > Log Settings.
syslog configuration on Zyxel Firewalls
  1. Choose a Remote Server.
  2. Click Active.
  3. Choose Log Format as VRPT/Syslog.
  4. Enter the IP address of the SGBox in Server Address field.
  5. Select Local 7 in Log Facility field.
  6. Select the Categories you want to be logged (normal = default logs, debug = very detailed logs, disable = no logs)
syslog configuration on Zyxel Firewalls
Troubleshooting

Default syslog server port is 514.

]]>
Syslog configuration on MikroTik Firewalls https://www.sgbox.eu/en/knowledge-base/configure-mikrotik-firewalls/ Wed, 24 Jul 2024 13:25:34 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=26698

Syslog configuration on MikroTik Firewalls

Configure MikroTik Firewalls
  1. Connect the Mikrotik device UI.
  2. Navigate to System > Logging page.
  3. Enter the IP address of SGBox in Remote Address field.
  4. Enter 514 in Remote Port field.
  5. Select the BSD Syslog.
  6. Select local0 in Syslog Facility.
  7. Select Info in Syslog Severity.
Syslog configuration on MikroTik Firewalls
NOTE: You must select BSD Syslog to get the syslog with timestamp value.
]]>
Syslog Wildix https://www.sgbox.eu/en/knowledge-base/syslog-wildix/ Mon, 17 Jun 2024 14:55:42 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=25447

Wildix

Syslog Wildix

For more information visit the link: https://wildix.atlassian.net/wiki/spaces/DOC/pages/30286171/How+to+collect+syslog+from+Wildix+devices

]]>
Libra ESVA Syslog configuration https://www.sgbox.eu/en/knowledge-base/libra-esva-syslog-configuration/ Thu, 13 Jun 2024 12:36:37 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=25161

Libra ESVA Syslog configuration

 

Libraesva ESG can export all logs to a remote Syslog Server. To configure it simply select Enable Remote Syslog, and specify your Syslog Server IP Address. You can also improve security using a TLS certificate.

 

Libra ESVA Syslog configuration

NOTE: Libraesva ESG uses standard port UDP 514

For more information visit you can click at this link: https://docs.libraesva.com/document/system/appliance/networking/#Syslog

]]>
Centralizing Windows Logs ( Forwarded Events ) https://www.sgbox.eu/en/knowledge-base/centralizing-windows-logs/ Wed, 05 Jun 2024 15:44:04 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=24816

Centralizing Windows Logs (Forwarded Events)

You can use the tools in this article to centralize your Windows event logs from multiple servers and desktops. By properly administering your logs, you can track the health of your systems, keep your log files secure, and filter contents to find specific information. It is possible for a Windows server to forward its events to a collector server. In this scenario, the collector server becomes a central repository for Windows logs from other servers (called event sources) in the network. The stream of events from a source to a collector is called a subscription. This procedure demonstrates how to set it up. These steps work on Windows Server 2008 R2, Windows Server 2012, and Windows Server 2019. We are using two Active Directory Domain–joined Windows Server 2012 systems. The domain name is mytestdomain.com and both machines are registered with the domain.


Enable the Windows Remote Management Service

Windows Remote Management (WinRM) is a protocol for exchanging information across systems in your infrastructure. You must enable it on each of your source computers to exchange log files.

  • Remotely log into the source computer (MYTESTSQL) as a local or domain administrator.
  • Enable Windows Remote Management Service from a Command Prompt:
winrm quickconfig

If it is already running, a message similar to this example is displayed.

Centralizing Windows Logs ( Forwarded Events )



Configure the Windows Event Collector Service

You must enable the Windows Event Collector Service on your collector server to allow it to receive logs from your sources.

  • Remotely log into the collector computer (MYTESTSERVER) as a local or domain administrator.
  • Configure the Windows Event Collector Service from a Command Prompt:
wecutil qcin

 If prompted like the example, press y

Centralizing Windows Logs ( Forwarded Events )



Configure the Event Log Readers Group

By default, certain logs are restricted to administrators. This may cause problems when receiving logs from other systems. To avoid this, you can grant access to the collector computer by adding it to the Event Log Readers group.

  • Go back to the source computer (MYTESTSQL).
  • Open Server Manager.
  • Open Computer Management.
  • Expand Local Users and Groups node from the Navigation pane and select Groups.
  • Double-click Event Log Readers.
Centralizing Windows Logs ( Forwarded Events )


  • Click Add to open the Select Users, Computers, Service Accounts, or groups dialog
  • Click Object Types.
  • Check Computers and click OK.
 
Centralizing Windows Logs ( Forwarded Events )
 
  • Enter MYTESTSERVER as the object name and click Check Names. If the computer account is found, it is confirmed with an underline.
  • Click OK twice to close the dialog boxes.
 
Centralizing Windows Logs ( Forwarded Events )



Configure Windows Firewall

If the source computer is running Windows Firewall, ensure it allows Remote Event Log Management and Remote Event Monitor traffic.

Centralizing Windows Logs ( Forwarded Events )



Create a Subscription

Subscriptions define the relationship between a collector and a source. You can configure a collector to receive events from any number of sources (a source-initiated subscription), or specify a limited set of sources (a collector-initiated subscription). In this example, we create a collector-initiated subscription since we know which computer logs we want to receive.

  • Start the Event Viewer application on the collector server MYTESTSERVER.
  • Select Subscriptions from the Navigation pane
  • Click Create Subscription in the Actions pane.

 

Centralizing Windows Logs ( Forwarded Events )
 
  • On the Subscription Properties, enter the following as shown in the example:
    Subscription name: MYTESTSQL_EVENTS
    Description: Events from remote source server MYTESTSQL
    Destination log: Forwarded Events
    Select Collector initiated and click Select Computers to open the Computers dialog.
 
Centralizing Windows Logs ( Forwarded Events )
 
  • Click Add Domain Computers.
  • Enter MYTESTSQL as the object name and click Check Names. If the computer is found, it is confirmed with an underline.
  • Click OK.
 
Centralizing Windows Logs ( Forwarded Events )
 
  • Click OK to return to the Subscription Properties.
  • Click Select Events to open the Query Filter and enter the following to set the remote server to forward all application events from the last 24 hours:
    Logged: Last 24 hours
    Check all Event levels
    Select By log
    Event logs: Select Application from the drop-down list
 
Centralizing Windows Logs ( Forwarded Events )
 
  • Click OK to return to the Subscription Properties.
  • Click Advanced to open the Advanced Subscription Settings and enter the following:
    Select Machine Account
    Select Minimize Latency
    Protocol: HTTP
    Port: 5985
 
Centralizing Windows Logs ( Forwarded Events )
 
  • Click OK to return to the Subscription Properties.
  • Click OK to close.
 

The Subscription node in the collector computer event viewer now shows the new subscription.

Centralizing Windows Logs ( Forwarded Events )

Verify Events on Collector Computer

Select Forwarded Events from the Navigation pane on the collector computer.

Centralizing Windows Logs ( Forwarded Events )

The Computer column in the Details pane indicates the events are from the remote computer MYTESTSQL.MYTESTDOMAIN.COM. You can enable or disable the collector subscription by right-clicking on the subscription and choosing Disable. The status of the subscription is then shown as disabled in the main window. An active collector subscription does not mean it is succeeding. To see if the collector can connect to the source, right-click on the subscription and select Runtime Status. In this example, the collector can’t connect to the source. By default, it retries every five minutes.

Centralizing Windows Logs ( Forwarded Events )


If all is OK, Subscription Runtime Status shows a green tick with an active status.

Centralizing Windows Logs ( Forwarded Events )



Create a Custom View (Optional)

Once the events are forwarded, you can create custom views to see the consolidated events. For example, you might create a custom view for error events. This example creates a custom view for SQL Server–related messages. A collector computer may host thousands of records from dozens of servers. Using a custom view enables you to create order from an overload of information. 

]]>
Syslog configuration on SonicWall https://www.sgbox.eu/en/knowledge-base/syslog-configuration-on-sonicwall/ Fri, 24 May 2024 09:19:09 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=23107

Syslog configuration on SonicWall

This article explain how to configure SonicWall to send log to SGBox using syslog protocol.

Requirements

  • Must have GMS server or On-Prem Analytics server installed and configured.
  • Have an Address Object Created on the Firewall for SonicWall Analytics system.

From SGBox WebUI downlaod Fortigate Firewall Package: SCM > Application > Pacakges

Syslog configuration on SonicWall
]]>
SGBox Agent https://www.sgbox.eu/en/knowledge-base/sgbox-agent/ Thu, 22 Jun 2023 14:31:33 +0000 https://www.sgbox.it/sgbox/EN/?post_type=epkb_post_type_1&p=8838 Installation and Configuration

Requirements

To execeute correctly the Agent, the following software is required:

  • .NET Framework 4.0
  • Internet Explorer dll framework
  • Outgoing open port 443

Antivirus Consideration

We reported that some antivirus can interfere with the normal operation of the Agent (We have especially reported many cases with Sophos). Please be sure to insert an exception

  • Sophos

Preliminary Information

  • Agent Buffer: in case of the sgbox is offline, the agent will act as Buffer to store the logs until connection with the appliance is restored. The buffer store depend on the free disk space remaining.
  • Port used: the port used to communicate is the 443.
  • Communication type: SGBox Agent will communicate trough the Internet Explorer DCOM API.

Download

To install the agent you must to download the agent from the dedicated download section on SGBox Portal

Note, to download SGAgent, it is required to login or sign up on our portal and go to the Download SGBox Software section.

Installation Configuration

Extract the downloaded archive and run the setup

SGBox Agent

Click on “Next/Avanti” to continue with the installation

SGBox Agent

Browse the folder where you want install the agent

SGBox Agent

Edit the field “Server ip” with the IP or FQDN of your SGBox

SGBox Agent

You will be asked to confirm the data entered, click “Next/Avanti” to proceed with the installation.

SGBox Agent

Click on “Yes” to start with the installation

SGBox Agent

Click on “Close/Chiudi” to finish the installation

SGBox Agent

If the installation is correctly terminated a new service named “SGBoxTask Service” will be created

SGBox Agent

Log Retreive Configurations

Capture Logs from Standard Windows Event View

This section explain how to create a new configuration and command. A new command could be added in a same way to an existing configuration.

Log in to SGBox web interface. Go to LM > Configuration > Agents
SGBox Agent

Click on CLICK HERE TO CREATE NEW CONFIGURATION if you want create a new configuration or click on existing configuration if you want to edit it.
SGBox Agent

Enter o modify a name for the configuration and select GetEventLog to retrieve new information from Event Viewer.
SGBox Agent

Enter details of your command:

  • Name: a descriptive name of your command.
  • Description: brief description of your command ( not mandatory).
  • Frequency: how frequent these information will be sent to SGBox.
  • Log Name: the registry name. If it not present look the this section
  • Select o specify the Event ID. You can Select All events or -1 to tell the agent to send all events from the specified register.

SGBox Agent

You can add more commands to your configuration.
SGBox Agent

Drag & Drop your configuration to the target host and Save Changes.
SGBox Agent

Capture Logs from Operational (Application) Windows Event View

This section explain how to create a new configuration and command from a custom registry log. We’ll take the Terminal Service Registry as example. Here the details of the logs we want retrieve:
SGBox Agent

Se the previous section to specify a new command from a basic registry:
https://www.sgbox.it/sgbox/EN/knowledge-base/create-a-new-command/

Fist of all we need to find the exact name of the registry: Right click > Properties
SGBox Agent

SGBox Agent

A new command could be added in a same way to an existing configuration.

Log in to SGBox web interface. Go to LM > Configuration > Agents
SGBox Agent

Click on CLICK HERE TO CREATE NEW CONFIGURATION if you want create a new configuration or click on existing  configuration if you want to edit it.
SGBox Agent

Enter o modify a name for the configuration and select GetEventLog to retrieve new information from Event Viewer.

SGBox Agent

Enter details of your command:

  • Name: a descriptive name of your command.
  • Description: brief description of your command ( not mandatory).
  • Frequency: how frequent these information will be sent toSGBox.
  • Log Name: select ADD NEW
  • New Log Name: the registry name taken before.
  • Select o specify the Event ID. You can Select All events or -1 to tell the agent to send all events from the specified register.

SGBox Agent

You can add more commands to your configuration.
SGBox Agent

Drag & Drop your configuration to the target host and Save Changes.

Capture Logs from File/Folders (TailFolder method)

This section explain how to create a new configuration and the related command in order to retrieve logs from a specific folder.

Requirements

  • SGBox 5.0.2 or SGBox 4.2.7 is required.
  • At least SGAgent 3.2.7433.19116 is required .

Log in to SGBox web interface. Go to LM > Configuration > Agents
SGBox Agent

Click on CLICK HERE TO CREATE NEW CONFIGURATION if you want create a new configuration or click on existing  configuration if you want to edit it.
Enter a name and select TailFolder as command.
SGBox Agent

A new windows appears. Enter details of your command:

  • Name: a descriptive name of your command.
  • Description: brief description of your command ( not mandatory).
  • Frequency: how frequent these information will be sent to SGBox.
  • Directory Path: where how logs are located
  • File Name: Logs file name, also star expression could be used.
  • List Subdirectories: Use this flag if you want to look also logs located in the subdirectories.
  • Timestamp Pattern: a regex to find the correct timestamp of the logs.
  • Timestamp Format: Specify logs timestamp format.
  • Timezone: You can specify if the Timestamp is in Localtime or UTC.

SGBox Agent

ATTENTION: if the folder you are trying to monitor is inside C:/Windows/System32/ you need to use C:/Windows/sysnative/

Your command has been created. If you want you can add more commands to your configuration.
SGBox Agent
Click on Save Changes to save your configuration.

Drag & Drop your configuration to the target host and Save Changes.
SGBox Agent

When everything is configured you can see your logs in historical search
SGBox Agent

SGBox Agent

Configure File Integrity Monitoring

File Integrity Monitoring is new feature introduced with the last SGAgent version and it’s used to monitor files and shared folders. Using this feature you can monitor when a specific file is read, modified or deleted.

!Attention: File Integrity Monitoring is not File Auditing, you are not able to see the user that execute the action.

Requirements

  • SGBox 5.1.3 or higher.
  • SGAgent 3.4 or higher.

The FIM package can be installed from SCM>Applications>Packages: Click to install to download and install the package, then click on Run and select the hosts you want to monitor.
SGBox Agent

Go on LM>Configurations>Agents

In our example we create a specific configuration for this feature, but you can also create a new command on a existing configuration and modify it.
Click on “New Configuration” to create a new configuration and select CheckFolder.

SGBox Agent

A new window will appear to enter the command’s details:
SGBox Agent

    • Name: a descriptive name of your command.
    • Description: a short description of your command (not mandatory).
    • Frequency: how often this information will be sent to SGBox (60 sec suggested).
    • Directory Path: where the files or folders are located.
    • File Name: Name of the file (you can also use the star expression).
    • Check Subdirectories: Use this flag if you want to look at files located in sub directories as well.
    • File Integrity: Select the monitor mode* you want to use
    • Exclude files: you can specify some files to exclude for the monitor (not mandatory, regex supported)

Monitor Mode

  • Monitor Only: check the integrity when the PC and agent are running.
  • Monitor and store integrity: Store the integrity in a internal DB. Even if some operations on files are performed when the S.O or Agent are not running, the agent can identify them. Store large directories can seriously impact performance.

Click OK to save the command.
Click “Save Changes” to save your configuration.
SGBox Agent

Drag and drop your configuration to target host and click again on “Save Changes“.
SGBox Agent

When everything is set up you can see your logs in the historical search or from the “File Integrity Monitoring” dashboards.

FIM is very useful if you want to store critical configurations or backups.  It’s no suggested monitor all the C: storage. Here some interested folder to monitor:

C:\inetpub\wwwroot C:\Windows\Boot C:\Windows\System32\drivers\etc

Strict TLS connection with a Personal Certificate

Starting from version 3.7. it is possible configure the SGAgent to check the SGBox/Collector certificate before sending information.

Requirements:

  • SGAgent version 3.7
  • SGBox must have a valid certificate. Look this section.

After installed go in the installation directory. Default path is C:Files(x86)Agent** Open the file SGBoxTask.exe.config** as Administrator with a text editor like Notepad.

add the following entry after the connection strings: key=”IgnoreCertificate” value=”False”
SGBox Agent

Save the configuration and restart the SGBoxTask Service service.

Check the file SGBoxTaskLog.txt to verify that everything is ok.
Here an example of error:

220330 14.51.05 0000008 *** Error The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel. System at System.Net.HttpWebRequest.GetRequestStream(TransportContext& context) at System.Net.HttpWebRequest.GetRequestStream() at SGBoxTask.Utils.Internet.GenerateCommandRequest(String uri, String ApplicationId, String login, String password)

Here an example when it works:

220330 14.54.20 0000004 Starting ServiceSGBoxTask 220330 14.54.20 0000006 Starting Main 220330 14.54.20 0000006 Params 0A002700000D https://sgbox192.sgbox.it/sgbox/LM/dataxchange/cmd.php https://sgbox192.sgbox.it/sgbox/LM/dataxchange/send.php 220330 14.54.20 0000006 SleepTime 10 msec 220330 14.54.20 0000006 RandomStartTimer 2 sec RandomMinStartTimer 1 220330 14.54.20 0000006 Enable TLS 1, 1.1, 1.2 220330 14.54.20 0000006 Starting StartSendPacket 220330 14.54.20 0000006 Starting StartGetCommand

Uninstall

Prerequisites

Before Uninstall the Agent be sure that (for all users connected to the server):

  • All mmc.exe instance are closed
  • All services panel (services.msc) are closed
  • The Task Manager (and Process Explorer) is temporary closed
  • All Event Viewer instance are closed

To uninstall the Agent, you must go to “Add/Remove Programs”, then select the “SGBox Agent” and select “Uninstall”.

Reinstall Note: It is recommended, in case of agent reinstall, to full restart the machine before proceeding with the new install.

Manual Full Remove

To Full remove the Agent if anything goes wrong, you must check and remove these items:

  • Service: Stop and remove the service, you can use this Powershell command:
    get-service SGBoxTask | stop-service then on a cmd window sc delete SGBoxTask
  • Registry: Find and delete this Regsitry Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SGBoxTask
  • Folders: Full Remove this Folder: C:\Program Files (x86)\SGBox Agent

Update Agent

To update the Agent you must completely uninstall the old version (we recommend also to reboot the machine if possible), then install the new version with the specific installer.

Silent/Unattended Mode

Install

In order to distribuite SGAgent in silent mode you have to type the follwing command:

SetupSGBox.msi /q ServerIP="192.168.xxx.xxx"

SGBox Agent

Uninstall

In order to uninstall SGAgent in silent mode you have to type following command:

msiexec /q /x {C09891C0-0E34-4873-A869-F9DC136E67C2}

SGBox Agent

Troubleshooting

The Agent is composed by:

  • A service: named SGBoxTask, must be set on automatic start and running
  • Default Installation folder: C:\Program Files (x86)\SGBox Agent – Main files and folders
  • SGBoxTask.exe: is the main executable file and service
  • SGBoxTaskLog.txt: the main log file of agent itself
  • SGBoxAgent.exe.config: configuration file for the agent
  • C:\programdata\SGBoxTask\Packet: the folder where packet ready to be send, or cached are stored

How to analyze Agent log

The main log file is: SGBoxTaskLog.txt If you have any sort of problem related to the agent, you can send this file to assistance to check the stream.

Some useful rows to check the correct comunication are:

  • Row with the command: GetCommand, the agent is checking the command to execute coming from LM -> Configuration -> Agents
  • Detected OLD Reqest xxx: SGAgent has identified a cached command that is not used and has been marked as inactive. It’s informational
  • Read Json … : the Json command received from SGBox – Sending File … : a final packet has been sended to SGBox

Check Service

To check the service is running you can from a CMD execute this command:

sc query SGBoxTask

If status equal to Running the service si correctly running, otherwise must be started or check the whole configuration.

Reconfigure IP on change appliance IP

Attention: this procedure is valid only on change IP and not when you are migrating to new appliance istance or a new major version

To change the query IP point for the agent go to the configuration file SGBoxTask.exe.config in the default folder and change these rows:

  • <add key="SGCommandUrl" value="https://<ip_to_change>/sgbox/LM/dataxchange/cmd.php" />
  • <add key="SGResponseUrl" value="https://<ip_to_change>/sgbox/LM/dataxchange/send.php" />

SGBoxTask.exe.config Definition

  • <CommandDelay>: Time interval in seconds between the request of new command configuration coming from SGBox
  • <MaxLogFileSize>: Max size of the log file SGBoxTaskLog.txt
  • <LogLevel>: SGagent log verbosity level for SGBoxTaskLog.txt
  • <SGCommandUrl>: Complete Url interrogation for command list coming from SGBox
  • <SGResponseUrl>: Complete Url where log is sended to SGBox
  • <PageSize>: Max size in bytes of the file sended to SGBox each time
  • <SleepTime>: Milliseconds of delay before send the file to SGBox
  • <MaxPacketFolderSize>: Max size of the whole log waiting to be sended (or cached)

Network Connectivity Checklist

If the agent is unable to communicate with the Appliance/Collector, please check these actions to be sure that the communication over network is correct:

  • Check that machine firewall does not block the requests
  • Check that Antivirus installed does not block the requests
  • Check that network device between machine and main gateway does not block or drop requests
  • Check that no GPO configuration can collide with the agent requests
  • Check that the machine is enabled with communication with at least SSL 1.3

]]>
Network Requirements https://www.sgbox.eu/en/knowledge-base/network-requirements/ Tue, 30 May 2023 15:16:23 +0000 http://10.253.1.91/?post_type=epkb_post_type_1&p=8649 On-Premise

The SGBox appliance must be able to communicate via HTTPS with the following address:

SGBox – Piattaforma Next Generation SIEM & SOAR

The connection is required to access updates (available in the applications section of the SCM module). The appliance/collector operating system also uses HTTP/HTTPS protocols to access Ubuntu repositories (*.ubuntu.com).

The appliance syslog server is configured to receive logs via UDP (port 514). SSH (port 22/tcp) traffic must be allowed to access the command-line interface (CLI) (both manifold and appliance).
The virtual collector (if used) and the SGBox agent for Windows (SGAgent) communicate with the appliance via HTTPS (TLS). OpenVAS (installed on the manifold and used by the SGBox NVS module) uses the Greenbone Community Feed (GCF) to keep network vulnerability tests (NVTs) up to date. The frequency of updates is daily and the synchronization activity is based on rsync. The collector must be able to access the following address via rsync protocol (port 873/tcp):

From To Port Mode
Client (User) Main Appliance – WebUI 443/tcp HTTPS
Client (User) Main Appliance – CLI 22/tcp SSH
Client (User) Collector – CLI 22/tcp SSH
SGAgent Main appliance / collector 443/tcp HTTPS
Data source Collector / Appliance 514/udp Syslog
Data source Collector / Appliance 514/tcp Syslog
Main Appliance/Collector apps.sgbox.it 80/tcp
443/tcp
HTTP/S
Main Appliance/Collector *.ubuntu.com 80/tcp
443/tcp
HTTP/S
Collector feed.community.greenbone.net 873/tcp rsync
Main Appliance No Syslog datasources eg. 1433/tcp, 1521/tcp, 443/tcp DB, other
Main Appliance Active Directory (LDAP) 389/tcp, 636/tcp LDAP/LDAPS
Client (User) Collector (OpenVAS) 4000/tcp OpenVAS console HTTPS
Appliance Appliance 4000/tcp HTTPS

Network Requirements

On-Cloud

The main difference from on-premise is that only the collector must communicate with our cloud on port 443/tcp (HTTPS).

]]>
Syslog configuration on OpenSuse https://www.sgbox.eu/en/knowledge-base/syslog-configuration-on-opensuse/ Wed, 15 Mar 2023 14:56:15 +0000 http://10.253.1.91/?post_type=epkb_post_type_1&p=8504 On linux environment is not necessary to install a specific agent to send log to SGBox. The syslog protocol will be used.

ifup eth0
ip a add 192.168.1.200/24 dev eth0
ip route add default via 192.168.1.254

If not already present, install rsyslog packet.

zypper refresh
zypper update
zypper install vim
zypper install rsyslog
systemctl start rsyslog
systemctl enable rsyslog

Edit “rsyslog.conf” file

vi /etc/rsyslog.conf

Add the following row after $IncludeConfig /etc/rsyslog.d/*.conf in order to send only all logs. Is possible use the IP or the hostname of SGBox

*.* @SGBox-IP

Restart rsyslog deamon to load the new configuration and start to send logs

systemctl restart rsyslog

Logs, by default, are stored in /var/log/messages

]]>
Input Logs Methods https://www.sgbox.eu/en/knowledge-base/input-logs-methods/ Mon, 13 Mar 2023 10:46:00 +0000 http://10.253.1.91/?post_type=epkb_post_type_1&p=8401
Below there is the principal methods to send data to the Appliance or Collector
Supported System Method Link
✔ Windows (.NET 4.0+) Windows Agent Windows Agent Guide
✔ (Recommended) Any system that support syslog protocol RFC5424 / RFC3164 via UDP/TCP Syslog / rSyslog Syslog configuration example
✔ Any Unix system with installed rSyslog rSyslog read files rSyslog Read Custom Files
✔ Application Databases (no Collector compatibility) read table on DB MySQLOracleDBMSSQL
✔ (Legacy) Any system that send files trought sFTP (no Collector compatibility) passive sFTP Import Directory Directory Import – SGBox
]]>