Agentless Windows event log collection instead of using Elastic Agent? #13839
Replies: 2 comments
-
One common way to handle this would be to use Windows Event Forwarding (WEF) to consolidate all the relevant eventlogs to one Windows system, then put the agent on that system only. |
Beta Was this translation helpful? Give feedback.
-
My itch with @defensivedepth 's implied approach is that it's not compatible (or at least automaintainable) with multiple logs. We utilize https://github.com/palantir/windows-event-forwarding where different logs are forwarded to different log files on the WEF server, and that requires having an integration per log-file/endpoint (WEC-Authentication, WEC-Account-Management, etc) in addition to ingest pipeline for the 'custom' Windows event log integration to utilize the elastic maintained parsers. And oddly, the Elastic 'forwarded events' pipeline does not appear to support Applocker redirection/pipeline, so I accounted for that in my custom pipeline below, which I use for the scenario described above. Applocker events go through the applocker pipelines, and the rest are handled by the normal forwarded pipeline, but any time fleet gets upgraded, I need to go in and update the versionnumbers.
|
Beta Was this translation helpful? Give feedback.
-
I've been using the Elastic Agent with success, but I'm now working in a new client's network who does not wish to install an Agent on their hosts. Is there an 'agentless' method of Windows log collection that SO works with? Ideally this would be done by having ForwardSensors do the polling of the Windows hosts and forward that back to the SearchManager.
Beta Was this translation helpful? Give feedback.
All reactions