Open jamiehynds opened 2 years ago
Pinging @elastic/security-external-integrations (Team:Security-External Integrations)
The original issue (16334) was from two years ago. Is there hope that these events will be added (or can we add them ourselves)? This lack of capabilities is driving users in my org to splunk.
@webmstr improved coverage for Windows Events is certainly something we have planned, however it will likely be an ongoing effort given the scope of events we have to cover.
Are there any particular Event ID's or even categories that you'd like to see supported in the short-term?
@jamiehynds There were a few that the Windows admins wanted. We've started adding them ourselves, since Elastic has had more than two years (just as measured from the ticket date). It would have been nice to leave some doc behind when abdicating responsibikity for your own product, but we figured it out. BTW, they told me that "it worked in Splunk", so good luck with that, too.
Winlogbeat captures many of these events, though they are not 100% mapped to ECS fields much of the critical data is. For instance, the fact that an event ID was thrown is enough to begin an investigation, if all of the fields are not there then they are captured in the original message or in fields labeled winlog.event_data.field_name. Why can they not be ingested now, by the system integration? And prettified as an ongoing project, that's exactly what I assumed was being done.
@BLKingLLC Yes, events that are not noted above as supported should still be ingested, just without ECS field use. The winlog.event_id
will correspond to the Windows event ID and the remainder of the winlog
group will hold the information from the original XML.
Is there a similar list of event IDs or channels not in the Security Channel being targeted for mappings as well?
Some examples: Microsoft-Windows-AppLocker/EXE and DLL Microsoft-Windows-AppLocker/MSI and Script Microsoft-Windows-AppLocker/Packaged app-Deployment Microsoft-Windows-AppLocker/Packaged app-Execution Microsoft-Windows-PrintService/Operational Microsoft-Windows-Windows Defender/Operational Microsoft-Windows-Windows Firewall With Advanced Security/Firewall Microsoft-Windows-WindowsUpdateClient/Operational Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational
Today we map these ourselves and enrich accordingly. It would be nice to have coverage across more events than the Security, Application, System, Forwarded, Powershell and Sysmon channels.
5136-5145 would be great to have improved mappings. I was surprised to see that 5136 for example, was not in the System Dashboard for "Users Changed". This is an active directory change to the user which is different that 4738 (user account was changed), but a change non-the-less.
Maybe an entirely new dashboard for Active Directory monitoring needs to be created? Especially if the new Active Directory integration is being built?
While our Windows Security pipeline provides coverage for a broad range of Event ID's, we still have significant gaps in our coverage. Windows Event IDs have around 85% coverage of Windows Specific techniques in MITRE ATT&CK, our current gaps are causing blindspots for users when leveraging Windows Events for threat detection. Our goal is to support all Windows Security events within the Ultimate Windows Security reference here.
All Windows event IDs can be collected today. This is a task to add mappings (copy data into ECS fields) that are specific to the context of each event ID. Events are not always consistent in how fields are used so we like to evaluate each event ID to ensure the data is mapped to ECS field correctly.