NXLog was recently interviewed in the special SIEM edition of Enterprise Security Magazine. Read the rest of the interview to level up and learn more about why the choice of log collector is important, regardless of the SIEM used.
New post published on the OVH website sharing their insights. "Sending Windows Logs with NXLog to Logs Data Platform in 15 minutes or less". Great feedback also - "one of the leader of the log management tools. Its configuration is fairly simple and can get you started in a few minutes."
NXLog mentioned as a suggested agent for host-based logging in this talk "Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK Framework". View the entire video and read the PDF. Read more about integrating with Elasticsearch and Kibana here.
Three newly updated articles from Nagios within the last 1-2 months on configuring NXLog with Nagios Log Server. "Sending NXLogs with SSL/TLS" (last update March 2019), "Configuring NXLog To Send Additional Log Files" (last update Feb 2019) and "Configuring NXLog To Send Multi-Line Log Files" (last update on Feb 2019). Feel free to reach out to our Community Forum for help!
Interesting post by Logmatic aimed at Golang developers working with logging libraries. NXLog recommended as log collector for Windows, but you can also use NXLog to replace Rsyslog.
Logging and log analysis are essential to securing infrastructure, particularly when we consider common vulnerabilities. This article, based on writer's lightning talk Let's use centralized log collection to make incident response teams happy at FOSDEM'19, aims to raise awareness about the security concerns around insufficient logging, offer a way to avoid the risk, and advocate for more secure practices.
Infomentum shares how they have solved the challenge of centralized logging with NXLog Community Edition. "One of the challenges we faced was shipping Windows Server logs from a logfile onto Logstash’s syslog listener, and we found a tool that does exactly that - nxlog-ce-2.9.1716".
"Digital threats have undergone massive change in recent years. Because of this, it’s critical to develop an incident response plan that allows you to ward off cyber attacks. Many programs on the market can help you do this, but a few of the top are Elasticsearch, NXLog, and Kibana." - suggests an article on Security Boulevard.
"Not sure what SIEM you're using, but check out greylog with nxlog clients. Pretty good stuff." - says Reddit member while discussing about Powershell Best practice Security.
Another topic on Reddit discusses Windows file auditing and reporting. "Is there a way to export or create a report from the Windows Security log about the kind of activity a user has been having on a network share?" Yes, as one user suggests - try combo of Graylog + NXLog.
NXLog integration docs with Graylog can be found here under NXLog User Guide.
The blog post written by Rapid7 is a step-by-step walkthrough of using NXLog to transform an ingress authentication log into UEF.
Can you make this happen for free? No doubt. As one Reddit member says - "Our org for $0 yearly does the following. Dump every log using NXLog to Graylog."
With nxlog as log forwarder to graylog. You can specify in nxlog config which events you want to be forwarder.
Why not nxlog for the log server as well? It’s beautiful. Highly recommended - easy XML config, decent documentation, good info and example config around. I’ve used external scripts, kvp parsing, json formatting, GELF to graylog, all works great.