Tenable Identity Exposure Log Files

If you still do not see Indicators of Attack alerts after you validate the GPO and WMI Consumer, you can review Tenable Identity Exposure's internal logs.

Ceti Log

  • Check for the following error message in the CETI Log:

Copy
[2022-02-22 22:23:27:570 UTC WARNING] Some domain controllers are not generating IOA events: 'CORP-DC'. {SourceContext="DirectoryEventToCetiAdObjectMessageMapper", DirectoryId=2, Dns="corp.bank.com", Host="10.10.20.10", Source=SYSVOL, Version="3.11.5"}
  • If you see this message, verify that the GPO settings and WMI consumer are running on the domain controller (DC) listed in the above error message.

Audit settings

  • If you see an error similar to the following one: "Tenable Identity Exposure requires the Audit Policy…”, check your existing GPOs to ensure that you did not set the required audit policies to “No Auditing."

  • If you get an error that states "RSOP...":

  • Check the audit policies and look at the transcript file in the SYSVOL folder to see if you encountered any issues during the installation.

Cygni Log

Cygni logs the attack and lists the specific .gz file that Tenable Identity Exposure called to generate the alert.

Electra Log

You should see the following entry:

Copy

[2022-03-15T14:04:39.151Z] INFO: server/4016 on WIN-UQRSCEN0CI3: Message received from MQ: attack-alert (namespace=electra)

[2022-03-15T14:04:39.151Z]  INFO: server/4016 on WIN-UQRSCEN0CI3: Message received from MQ: attack-alert (namespace=electra)
[2022-03-15T14:04:39.168Z]  INFO: server/4016 on WIN-UQRSCEN0CI3: Sending ws message to listeners. alertIoA (namespace=electra)

Eridanis Log

You should see the following entry:

Copy
022-03-15T14:04:39.150Z]  INFO: server/4988 on WIN-UQRSCEN0CI3: KAPTEYN get /attack-alerts/2010 200 122 - 7ms (namespace=hapi)
[2022-03-15T14:04:39.165Z]  INFO: server/4988 on WIN-UQRSCEN0CI3: notifyAttackAndAttackAlertCreation success { attackId: 2011 } (namespace=eridanis)
[2022-03-15T14:04:39.170Z]  INFO: server/4988 on WIN-UQRSCEN0CI3: KAPTEYN get /attack-alerts/2011 200 122 - 6ms (namespace=hapi)