Does someone know if it's possible to ingest Windows DNS logs without using NXLog paid version?

Does someone know if it's possible to ingest Windows DNS logs without using NXLog paid version? Even with other tools like filebeat, does the default parser work?

0 10 804
10 REPLIES 10

dont know but i also would really like to get a testimonay from another customer using something besides paid nxlog or cribl

@Drew_Pilarski after some digging, it seems like only NXLog Enterprise can take the logs from the event viewer. Even Beats can't https://github.com/elastic/beats/issues/2073

You can use the Windows DNS log file, but there can be challenges with it, see - https://nxlog.co/news-and-blog/posts/disappearing-dns-debug-log

Otherwise, for high volume then NX Log Enterprise has ETW support

But an alternative, if the DNS servers are VMs, is use a span / packet mirror to a Chronicle Forwarder listening for DNS

WinPacketBeat can be installed on the VMs and works to capture DNS via libpcap (if performance isn't an issue)

Thank you for the information!

What about using MS sysmon and capturing DNS with event ID 22 and send to a windows event collector (wec)?

 

Have you tried it?

I have Ms SYSMON running on a majority of my clients and grabbing it all with WEC, but mine is gong to LogRhythm and not Chronicle SIEM. But in theory it should work as in previous position I did the same with nxlog grabbing sysmon to an ELK stack. 

https://docs.nxlog.co/userguide/integrate/sysmon.html

Now for simplicity, you can just use swiftonsecurity sysmon config. But if you want granular control, I recommend Olaf Hartong's. 

https://github.com/SwiftOnSecurity/sysmon-config

https://github.com/olafhartong/sysmon-modular

Again, I don't know your environment so YMMV,