You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
the same string which defines the Event Collector URL, separated by a comma. For example if we want to configure a refresh rate of 60 seconds we would set the GPO-value to:
In step 1 we already warned about the impact of enabling PowerShell Remoting. To reduce the
345
348
attack surface we configure the `Allow remote server management through WinRM` option. This
346
-
option allows one to specify from which IP-addresses to accept WS-Management traffic. In our
347
-
environment we only want to accept traffic from the local network which has the `10.0.10.0/24`
348
-
subnet configured. Inside the `IPv4 filter` option we specify `10.0.10.1-10.0.10.254` as value.
349
-
It's not possible to specify networks in CDIR-format. Multiple IP-ranges can be specified
350
-
by separating each range by a comma (`,`). Using the `IPv6 filter` option allowed ranges can
351
-
be specified for WS-Management traffic using IPv6. In our case we don't use IPv6 so we leave
352
-
this option empty. This results in denying any WS-Management traffic over IPv6.
349
+
option specifies on which IP-addresses to listen for WS-Management traffic.
350
+
351
+
[IMPORTANT]
352
+
.Source address filtering
353
+
Note that the aforementioned option doesn't specify which IP-addresses are allowed to connect to a specific
354
+
WinRM instance. Firewall rules are required to limit the source IP-addresses that can connect to the WinRM instance.
355
+
356
+
You must specify a range of IP-addresses, even if you want to listen for WS-Management traffic on just one IP-address. In our case the IP-address of our Event Collector is `10.0.10.100`.
357
+
This results in the following range: `10.0.10.100-10.0.10.101`. Multiple ranges can be
358
+
specified by separating each range using a comma (`,`).
359
+
360
+
The `IPv6 filter` works in much the same way allowing you to specify on which IPv6-addresses we want to listen for WS-Management traffic. In our case we don't use IPv6
361
+
so we leave this option empty. This results in not listening for WS-Management traffic over IPv6.
353
362
354
363
=== Step 4: Configure Forwarded Events Log
355
364
Eventually we configure the Event Collector to store the forwarded events into the `Forwarded
@@ -450,7 +459,10 @@ On each client we recommend the following maximum log sizes for specific Windows
450
459
* **System** - 1048576 KB (1 GB)
451
460
452
461
Compared to the default maximum log sizes this allows for extended log retention on the
453
-
client systems. The image below shows the GPO-settings which should be configured.
462
+
client systems. The image below shows the GPO-settings which should be configured. For
463
+
readability we only include the `Computer Configuration` part of the GPO. All of the
464
+
configuration activities during this step take place inside this aforementioned part
465
+
of the GPO.
454
466
Furthermore, this GPO should be scoped on the computer accounts from which you want
455
467
to receive events.
456
468
@@ -623,5 +635,27 @@ When importing the subscription in step 8 the error below is generated.
623
635
Failed to open subscription. Error = 0x6ba.
624
636
The RPC server is unavailable.
625
637
```
626
-
This error is caused due to the fact that the Event Collector service isn't active on the
638
+
This error could be caused due to the fact that the Event Collector service isn't active on the
627
639
Event Collector. Make sure the Event Collector service is started and execute step 8 again.
640
+
Another possibility could be that the Event Collector's IP-address on which you want to accept
641
+
forwarded events isn't listening on WS-Management traffic. This can be determined by executing the
642
+
command below on the Event Collector.
643
+
```
644
+
winrm e winrm/config/listener
645
+
```
646
+
This results in an output similar to the example output below.
647
+
```
648
+
Listener [Source="GPO"]
649
+
Address = *
650
+
Transport = HTTP
651
+
Port = 5985
652
+
Hostname
653
+
Enabled = true
654
+
URLPrefix = wsman
655
+
CertificateThumbprint
656
+
ListeningOn = 10.0.10.101
657
+
```
658
+
In our case the `ListeningOn` attribute is equal to `10.0.10.101`. If the IP-address on which you want
659
+
to receive forwarded events isn't listed under this attribute or the value is equal to `null` please review
660
+
step 3 again. The ranges configured under the `Allow remote server management through WinRM` option should
661
+
include the IP-address which you want to use for event collection.
Copy file name to clipboardexpand all lines: WindowsEventLogging.adoc
+1-1
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ endif::[]
12
12
:toc-title:
13
13
14
14
== Overview
15
-
The table below provides an overview of the events further described in section Recommended Configurations. From left to right the table contains the event category, a short summary of what the category entails and an estimate of the volume you can expect during collection.
15
+
The table below provides an overview of the events further described in section <<Recommendations>>. From left to right the table contains the event category, a short summary of what the category entails and an estimate of the volume you can expect during collection.
0 commit comments