SIEM Foundations: Connecting the SIEM to a Windows Domain Controller for Asset Import

Version 4

    Contents

     

    Overview

    One of the most relevant forms of event context in a SIEM is that of user identity and the most common sources for this context in an enterprise is typically the Active Directory database maintained by a Windows Domain Controller. By connecting the DC to the SIEM, operators can issue filtered queries against specific domain users and/or groups as well as include user and group context within a correlation rule. Examples of this will be provided in a later section of this document.

     

    Connecting to Windows

    To connect the SIEM to a Windows DC, the following steps must be taken.

    1. Click on the Asset Manager icon from the Quick Launch menu. The Asset manager window will open.
      System-Properties-Buttonwindows.png
    2. Select the Asset Sources tab.
    3. Select the ESM object from the list of available devices. It is from this device that the Active Directory connection will be made.
    4. Click the Add button.
      Asset-Manager---Asset-Sourcescircle.png
    5. Enter a Name for the Domain Controller.
    6. Enter the IP Address of the Domain Controller.
    7. Enter an authorized Username in the format user@domain.tld.  Thie ESM will use this account to connect to AD.  The SIEM user user must have read permissions on the AD tree.
    8. Enter the Password used by this user to authenticate.
    9. Enter the appropriate Search Base that will be used to enumerate the domain groups and users. Example: dc=domain,dc=tld.
    10. Configure the retrieval interval and time. The default settings will query the Active Directory once daily at midnight.
      Asset-Manager---Add-AD circles.png
    11. Click the Connect button to test the connection to the Domain Controller.
    12. If the connection test is successful, a dialog box will open to confirm. Click OK.
      Test-Connection---Success.png
    13. If the connection to the Domain Controller is unsuccessful, a dialog box will open indicating that the connection test failed. If this happens, confirm the IP address of the Domain controller, the port number across which the LDAP query will occur (default 389), the username (in the correct username@domain.tld format), the password and the Search Base. Determine from the customer if TLS is required to connect to this Domain Controller and, if so, enable it using the check box provided on the Asset Data Source form.
      Test-Connection---Failed.png
    14. Once the connection test to the Domain Controller is successful, click OK.
    15. Click the Write button in the bottom left of the Asset Sources window. The Writing changes to device window will open.
      Writing-Asset-Changes.png
    16. After the changes have been successfully written to the device, click Close.
    17. Select the newly created Active Directory Domain Controller from the list of available asset sources.
      Asset-Manager---Asset-Sources---DC.png
    18. Click the Retrieve button.
    19. A Dialog box will open indicating that the Active Directory user and group data is being retrieved. Depending on the size of the customer Active Directory, this process may take several minutes or longer to complete.
      Retrieving-AD-Data.png
    20. When the Active Directory data retrieval has successfully completed, a dialog box will open. Click OK.
      Asset-Sources-Retrieved-Successfully.png
    21. Close the Asset Manager window.

     

    Verifying Success

    To confirm the successful retrieval of Active Directory user and group information, follow these steps.

    1. Scroll down the list of objects in the Filter Panel to the Source User form field.
      Filter-Panel---Source-Usercircle.png
    2. Click the Filter icon beside the Source User field. Filter-Icon.pngThe Filter Variables window will open.  You should see the domain from which you retrieved user and group information.
    3. Expand the domain object to display the groups enumerated from the Active Directory.
    4. Expand the group Administrators.Builtin to see a list of Active Directory administrators.
      Filter-Variables---ADcircle.png

    Now that the Active Directory user and groups have been enumerated into the SIEM, their values can be used in future filter queries, correlation rules and reports.

     

     

    « previousoutlinenext »