Syslog Alerts

Some organizations use SIEM (Security Information and Event Management) to gather logs on potential threats and security incidents. Tenable Identity Exposure can push security information related to Active Directory to the SIEM Syslog servers to improve their alerting mechanisms.

Manage Syslog alerts

Add an alert

Edit an alert

Delete an alert

Map Syslog data to a Tenable Identity Exposure alert

This procedure explains how to map Syslog data from your SIEM to Tenable Identity Exposure attack alerts.

Example:

Copy
<116>feb  04 10:31:01 qradar.alsid.app TenableAD[4]: "2" "1337" "Alsid Forest" "alsid.corp" "DC Sync" "medium" "LABFAB-TOOLS" "10.200.200.5" "LABFAB-DC" "10.200.200.4" "user"="dcadmin" "dc_name"="LABFAB-DC"

Each Syslog event from Tenable follows a standard format where specific fields are enclosed in quotation marks ("). These fields represent different event attributes such as alert ID, domain, threat type, risk level, hostnames, IP addresses, and more.

Part # Field Value Description
1 feb 04 10:31:01 Timestamp (Event time)
2 "2" Severity Level
3 "1337" Alert ID
4 "Alsid Forest" Forest Name
5 "alsid.corp" Domain Name
6 "DC Sync" Attack / Tenable Codename
7 "medium" Risk Level
8 "LABFAB-TOOLS" Source Hostname
9 "10.200.200.5" Source IP Address
10 "LABFAB-DC" Destination Hostname (Target DC)
11 "10.200.200.4" Destination IP Address
12 "user"="dcadmin" Account Used in Attack
13 "dc_name"="LABFAB-DC" Domain Controller Name

To map Syslog data to attack information:

  1. Filter by Attack Codename: select events with the value "DC Sync" (Part 6 – Attack Codename).

  2. Filter by Date: narrow events to the timestamp feb 04 10:31:01 (Part 1 – Timestamp).

  3. Match Exact Timestamp: verify that the event timestamp matches feb 04 10:31:01 (Part 1 – Timestamp).

  4. Verify Source and Destination: ensure the attack details match:

    • Source: "LABFAB-TOOLS" "10.200.200.5" (Parts 8 & 9)

    • Destination: "LABFAB-DC" "10.200.200.4" (Parts 10 & 11)

See also