Skip to content

Commit de81660

Browse files
committed
Title consistency, subscriptions config description fix and better readability for GPO settings
1 parent 5a0dae0 commit de81660

File tree

4 files changed

+17
-17
lines changed

4 files changed

+17
-17
lines changed

EventSubscriptionsCollections/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@ Make any changes to the `EventCollectorSubscriptions.csv` configuration file. En
1414

1515
Bear in mind, that in some columns of `EventCollectorSubscriptions.csv` files, mainly `AllowedSourceDomainComputers`, `AllowedIssuerCAList` and `AllowedSubjectList`, you can specify several values separated by semicolon `;` symbol, e.g:
1616

17-
| ProviderSymbol | ... | AllowedSourceDomainComputers | AllowedIssuerCAList | AllowedSubjectList |
18-
| ----------------------------- | --- | ------------------------------------- | ---------------------------------------- | -------------------------------------- |
19-
| WEC_DOMAIN_SERVERS_EVENTS | ... | MSK-Domain-Members;SPB-Domain-Members | | |
20-
| WEC_NON_DOMAIN_SERVERS_EVENTS | ... | | 073F4797D54776167C9199B2C36EAA01F1502C3F | \*.security.contoso.com;\*.contoso.com |
17+
| ChannelName | ... | AllowedSourceDomainComputers | AllowedIssuerCAList | AllowedSubjectList |
18+
| ----------------------------- | --- | --------------------------------------- | ----------------------------------------- | ----------------------------------------- |
19+
| WEC-Domain-Servers/Events | ... | MSK-Domain-Members;SPB-Domain-Members | | |
20+
| WEC-NonDomain-Servers/Events | ... | | 073F4797D54776167C9199B2C36EAA01F1502C3F | \*.security.contoso.com;\*.contoso.com |
2121

2222
## Deployment:
2323
Deploy event subscriptions with [`New-WECSubscriptions.ps1`](./New-WECSubscriptions.ps1) script:

GroupPolicyObjects/Windows Event Collector.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
## Configuration
1818

19-
Set the following setting **Computer Configuration -> Administrative Templates -> Windows Components -> Windows Remote Management (WinRM)/WinRM Service -> Allow Remote Server Management through WinRM** to:
19+
Set the following setting `Computer Configuration -> Administrative Templates -> Windows Components -> Windows Remote Management (WinRM)/WinRM Service -> Allow Remote Server Management through WinRM` to:
2020

2121
- **IPV4 filter**: [network ranges]
2222
- **IPv6 filter**: *
@@ -28,13 +28,13 @@ Set the following setting **Computer Configuration -> Administrative Templates -
2828

2929
 
3030

31-
Set the following setting **Computer Configuration -> Policies -> Windows Settings -> Security Settings -> System Services -> Windows Remote Management (WS-Management)** to:
31+
Set the following setting `Computer Configuration -> Policies -> Windows Settings -> Security Settings -> System Services -> Windows Remote Management (WS-Management)` to:
3232

3333
- **Startup Mode**: Automatic
3434

3535
 
3636

37-
Create new service configuration under **Computer Configuration -> Preferences -> Control Panel Settings -> Services** with the following settings:
37+
Create new service configuration under `Computer Configuration -> Preferences -> Control Panel Settings -> Services` with the following settings:
3838

3939
- **Service name**: WinRM
4040
- **Action**: Start service
@@ -45,23 +45,23 @@ Create new service configuration under **Computer Configuration -> Preferences -
4545

4646
## Optional
4747

48-
Set the following setting **Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Polices/User Rights Assignment** to:
48+
Set the following setting `Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Polices/User Rights Assignment` to:
4949

5050
- **Log on as a service**: [objects]
5151

5252
**Note**: **objects** is a list of all domain groups and/or accounts allowed to log on the target server as a service.
5353

5454
 
5555

56-
Set the following setting **Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Restricted Groups** to:
56+
Set the following setting `Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Restricted Groups` to:
5757

5858
- **BUILTIN\Administrators**: [objects]
5959

6060
**Note**: **objects** is a list of all domain groups and/or accounts given the administrator rights on the target server.
6161

6262
 
6363

64-
Create new registry key under **Computer Configuration -> Preferences -> Windows Settings -> Registry** with the following settings:
64+
Create new registry key under `Computer Configuration -> Preferences -> Windows Settings -> Registry` with the following settings:
6565

6666
- **Action**: Update
6767
- **Hive**: HKEY_LOCAL_MACHINE
@@ -72,7 +72,7 @@ Create new registry key under **Computer Configuration -> Preferences -> Windows
7272

7373
 
7474

75-
Create new task under **Computer Configuration -> Preferences -> Control Panel Settings -> Scheduled Tasks** with the following settings:
75+
Create new task under `Computer Configuration -> Preferences -> Control Panel Settings -> Scheduled Tasks` with the following settings:
7676

7777
- **Task type**: Immediate Task (At least Windows 7)
7878
- **Task**:
@@ -86,7 +86,7 @@ Create new task under **Computer Configuration -> Preferences -> Control Panel S
8686

8787
 
8888

89-
Create new task under **Computer Configuration -> Preferences -> Control Panel Settings -> Scheduled Tasks** with the following settings:
89+
Create new task under `Computer Configuration -> Preferences -> Control Panel Settings -> Scheduled Tasks` with the following settings:
9090

9191
- **Task type**: Scheduled Task (At least Windows 7)
9292
- **Action**: Update

GroupPolicyObjects/Windows Event Forwarding.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,29 +13,29 @@
1313

1414
## Configuration
1515

16-
Set the following setting **Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Restricted Groups** to:
16+
Set the following setting `Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Restricted Groups` to:
1717

1818
- **BUILTIN\Event Log Readers**: NT AUTHORITY\NETWORK SERVICE
1919

2020
**Note**: Add to **BUILTIN\Event Log Readers** other groups/users, that should have remote access to local logs.
2121

2222
 
2323

24-
Set the following setting **Computer Configuration -> Administrative Templates -> Windows Components -> Event Log Service -> Security -> Configure log access** to:
24+
Set the following setting `Computer Configuration -> Administrative Templates -> Windows Components -> Event Log Service -> Security -> Configure log access` to:
2525

2626
- **Log Access**: O:BAG:SYD:(A;;0xf0005;;;SY)(A;;0x5;;;BA)(A;;0x1;;;S-1-5-32-573)(A;;0x1;;;S-1-5-20)
2727

2828
 
2929

30-
Set the following setting **Computer Configuration -> Administrative Templates -> Windows Components -> Event Forwarding -> Configure forwarder resource usage** to:
30+
Set the following setting `Computer Configuration -> Administrative Templates -> Windows Components -> Event Forwarding -> Configure forwarder resource usage` to:
3131

3232
- **The maximum forwarding rate ( events/sec ) allowed for the forwarder**: [X]
3333

3434
**Note**: **X** is a number of events/per second sent to the Event Collector per each event source. Value too low would make the collector to fall behind it's event sources, value too high would make the collector's event log to overflood and erase previos events, before you can analyze them or collect them to your SIEM. You should test this setting in your environment and choose the value, that works for you.
3535

3636
 
3737

38-
Set the following setting **Computer Configuration -> Administrative Templates -> Windows Components -> Event Forwarding -> Configure target Subscription Manager** to:
38+
Set the following setting `Computer Configuration -> Administrative Templates -> Windows Components -> Event Forwarding -> Configure target Subscription Manager` to:
3939

4040
- **SubscriptionManagers**: Server=[proto]://[server]:[port]/wsman/SubscriptionManager/WEC,Refresh=[ref]
4141

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Windows Event Collector Guidance
1+
# Windows Event Forwarding Guidance
22
```
33
██╗ ██╗███████╗███████╗ ██████╗ ██╗ ██╗██╗██████╗ █████╗ ███╗ ██╗ ██████╗███████╗
44
██║ ██║██╔════╝██╔════╝ ██╔════╝ ██║ ██║██║██╔══██╗██╔══██╗████╗ ██║██╔════╝██╔════╝

0 commit comments

Comments
 (0)