Can anyone please tell me how to Configure Splunk Enterprise to receive Active Directory/Windows Event Logs from Snare? I know how to configure this using a Splunk Universal Forwarder, but I don't know how can it be done without using a Splunk Forwarder.
Hey,
You can set Snare agents to send to Splunk directly, current agent version only allows one config for output regarding port number for the multiple destinations you can have and have it with the syslog header or default.
While the latest Snare Server allows you to setup a "Reflector" to send the logs to multiple destinations, configured separately with options such as IP, Port, output format (Snare; Syslog 5424 or 3164; Qradar; RSA Envision; Raw), TCP/UDP/TLS, RegEx for Filtering what gets sent or not, and a search/replace option (good to change it from tab delimited to whatever you like).
Then just use the in-built sourcetype "windows_snare_syslog", though you will need to customise this afterwards as all it does is the timestamp format and I haven't seen a recent Splunk app yet for Snare.
Hey,
You can set Snare agents to send to Splunk directly, current agent version only allows one config for output regarding port number for the multiple destinations you can have and have it with the syslog header or default.
While the latest Snare Server allows you to setup a "Reflector" to send the logs to multiple destinations, configured separately with options such as IP, Port, output format (Snare; Syslog 5424 or 3164; Qradar; RSA Envision; Raw), TCP/UDP/TLS, RegEx for Filtering what gets sent or not, and a search/replace option (good to change it from tab delimited to whatever you like).
Then just use the in-built sourcetype "windows_snare_syslog", though you will need to customise this afterwards as all it does is the timestamp format and I haven't seen a recent Splunk app yet for Snare.