I’m trying to use graylog for monitoring file access on file server… For now i can use sidecar to log event id 4663 on my shared folder but here there isn’t the name of user that want to acces but for all only user=administrator. there another way to deatalied monitor of file access inside fileserver ? i’ve try to install auditbeat with sidecar but when start sidecar not auditbeat log are received, if i start auditbeat with passed sidecar conf inside c:.…\graylog\sidecar\generated\winlogbrat.conf auditbeat start but all winlogbeat event go are not registered…
# Needed for Graylog
fields_under_root: true
fields.collector_node_id: ${sidecar.nodeName}
fields.gl2_source_collector: ${sidecar.nodeId}
output.logstash:
hosts: ["172.16.10.200:5044"]
path:
data: C:\Program Files\Graylog\sidecar\cache\winlogbeat\data
logs: C:\Program Files\Graylog\sidecar\logs
tags:
- windows
- auditbeat
auditbeat.modules:
- module: file_integrity
paths:
- C:/windows
- C:/windows/system32
- C:/Program Files
- C:/Program Files (x86)
- C:/Program Files (x86)
- C:/test
- module: system
datasets:
- host # General host information, e.g. uptime, IPs
winlogbeat:
event_logs:
- name: Application
- name: System
- name: Security
winlogbeat.event_logs:
- name: System
level: critical, error, warning
- name: Application
level: critical, error, warning
- name: Security
ignore_older: 2h
processors:
- drop_event.when.not.or:
- equals.winlog.event_id: 1102
- equals.winlog.event_id: 1104
- equals.winlog.event_id: 1108
- equals.winlog.event_id: 4624
- equals.winlog.event_id: 4625
- equals.winlog.event_id: 4648
- equals.winlog.event_id: 4672
- equals.winlog.event_id: 4698
- equals.winlog.event_id: 4700
- equals.winlog.event_id: 4720
- equals.winlog.event_id: 4723
- equals.winlog.event_id: 4725
- equals.winlog.event_id: 4727
- equals.winlog.event_id: 4728
- equals.winlog.event_id: 4731
- equals.winlog.event_id: 4732
- equals.winlog.event_id: 4735
- equals.winlog.event_id: 4740
- equals.winlog.event_id: 4741
- equals.winlog.event_id: 4754
- equals.winlog.event_id: 4756
- equals.winlog.event_id: 4767
- equals.winlog.event_id: 4768
- equals.winlog.event_id: 4771
- equals.winlog.event_id: 4776
- equals.winlog.event_id: 4780
- equals.winlog.event_id: 4782
- equals.winlog.event_id: 4798
- equals.winlog.event_id: 4799