-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Winlogbeat] Add Powershell logging module #16262
Comments
Pinging @elastic/siem (Team:SIEM) |
PowerShell module logging has been working well for me, and for parsing on 4103 and 800 you can pull apart the param fields, I'm currently doing this with a dissect parser. example:
If you added an enhancement here, I'd recommend doing the key-value extraction more efficiently (if possible) and adding in an option to tail powershell transcript directories as a separate module. Also please don't forget about "Windows PowerShell" event code 400 and 800, they are absolute gold.
|
Thanks for the reminder. I had those two IDs in my notes about creating this issue but forgot to add them. We'll make sure to take a look at that log as well. The same dissect approach for those is probably what I'd use.
These are text files, right? That would take some effort to do in Winlogbeat. We'd need a mashup of Filebeat + Winlogbeat. |
Yes these are text files that are dropped in directories based on date. Really a filebeat agent is better for this so I'd exclude it for winlogbeat, I just wanted to mention it since it is in the link you had above and frequently talked about. |
Initial support for event ids: 400, 403, 600, 800, 4103, 4014, 4105, 4106 Add fields documentation Add powershell module dashboard Closes elastic#16262
Initial support for event ids: 400, 403, 600, 800, 4103, 4014, 4105, 4106 Add fields documentation Add powershell module dashboard Closes #16262
Initial support for event ids: 400, 403, 600, 800, 4103, 4014, 4105, 4106 Add fields documentation Add powershell module dashboard Closes elastic#16262 (cherry picked from commit f4019d5)
Thanks for your work. For clarification for others - do the event ID's have to be hardcoded in the winlogbeat.yml for this to be picked up, or will simply ingesting the PowerShell log perform this work? Also, what if the events are forwarded to a non-standard log like "Forwarded Events." Basically my question is, how does it know to perform these actions? What's the criteria? |
In that case you can apply the
The |
Add a new Winlogbeat module to collect logs from PowerShell. This will collect information about the scripts and modules that are being executed.
References:
Module Checklist
The text was updated successfully, but these errors were encountered: