cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

WMI - Tracking logs that show data source sent logs to SIEM

Jump to solution

Is there a Windows Event Number or a method to track when the data source sends logs to the SIEM via WMI? We are using a domain user to connect to the data source. I want to see when the data source communicates with the SIEM to send WMI logs, but from the data source perspective. Thank you in advance!

1 Solution

Accepted Solutions
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 2

Re: WMI - Tracking logs that show data source sent logs to SIEM

Jump to solution

If you are able to see events on the ESM from the datasource when you select the datasource & then do a Event drill down for the last 10 minutes or 1 hour that means we are parsing live logs collected from the WMI DS.

There is also another method by using the Receiver CLI.

On the ERC CLi execute teh following command:

tcpdump -nni eth0 host <WMI IP Address>

If the ERC is in a HA pair, please execute:

tcpdump -nni eth1 host <WMI IP Address>

You will see messages indicating communication between the ERC & the WMI datasource.

You can also go to the location

cd /var/log/data/inline/thirdparty.logs/<vipsid>/wmin/in

Execute 'ls -latr'.

This will show the raw logs being collected.

vipsid can be obtained by executing the below command:

tq | grep <WMI IP address>

 

Regards,

Prashanth B Pillai

McAfee Technical Support

Customer Success Group

View solution in original post

1 Reply
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 2

Re: WMI - Tracking logs that show data source sent logs to SIEM

Jump to solution

If you are able to see events on the ESM from the datasource when you select the datasource & then do a Event drill down for the last 10 minutes or 1 hour that means we are parsing live logs collected from the WMI DS.

There is also another method by using the Receiver CLI.

On the ERC CLi execute teh following command:

tcpdump -nni eth0 host <WMI IP Address>

If the ERC is in a HA pair, please execute:

tcpdump -nni eth1 host <WMI IP Address>

You will see messages indicating communication between the ERC & the WMI datasource.

You can also go to the location

cd /var/log/data/inline/thirdparty.logs/<vipsid>/wmin/in

Execute 'ls -latr'.

This will show the raw logs being collected.

vipsid can be obtained by executing the below command:

tq | grep <WMI IP address>

 

Regards,

Prashanth B Pillai

McAfee Technical Support

Customer Success Group

View solution in original post

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community