Skip to main content

Configure Cisco ASA Devices

Netwrix Auditor relies on native logs for collecting audit data. Therefore, successful change and access auditing requires a certain configuration of native audit settings in the audited environment and on the Auditor console computer. Configuring your IT infrastructure may also include enabling certain built-in Windows services, etc. Proper audit configuration is required to ensure audit data integrity, otherwise your change reports may contain warnings, errors or incomplete audit data.

CAUTION: Folder associated with Netwrix Auditor must be excluded from antivirus scanning. See the Antivirus Exclusions for Netwrix Auditor knowledge base article for additional information.

You can configure your IT Infrastructure for monitoring in one of the following ways:

  • Automatically through a monitoring plan – This is a recommended method. If you select to automatically configure audit in the target environment, your current audit settings will be checked on each data collection and adjusted if necessary.

  • Manually – Native audit settings must be adjusted manually to ensure collecting comprehensive and reliable audit data. You can enable Auditor to continually enforce the relevant audit policies or configure them manually:

    • On the Cisco ASA Device:

      • The global configuration mode is selected.

      • The logging enable option is selected on the Cisco ASA device.

      • The logging host parameter is set to the host address of the audited CiscoASA device. And UDP port (for, example 514) is used for sending messages.

        NOTE: Do not select the EMBLEM format logging for the syslog server option.

      • The logging timestamp option enabled.

      • The logging trap option is selected from 1 to 6 inclusive.

To configure your Cisco ASA devices, do the following:

  1. Navigate to your Cisco ASA device terminal through the SSH/Telnet connection (for example, use PuTTY Telnet client).

  2. Access the global configuration mode. For example:

    hostname# configure terminal

    hostname(config)#

  3. Enable logging. For example:

    hostname(config)# logging enable

  4. Set the IP address of the computer that hosts Netwrix Auditor Server as the logging host parameter. And make sure that the UDP port is used for sending syslog messages (e.g., 514 UDP port). For example:

    hostname(config)# logging host <Netwrix Auditor server IP address>

    Do not select the EMBLEM format logging for the syslog server option.

  5. Enable the logging timestamp option. For example:

    hostname(config)# logging timestamp

  6. Set the logging trap option from 1 to 6 inclusive. For example:

    hostname(config)# logging trap 5

  7. Configure the devices to show username for failed logons:

    hostname(config)# no logging hide username

Cisco ASA Devices

Review a full list of object types Netwrix Auditor can collect on Cisco ASA network devices.

Object typeActionsEvent ID
Cisco ASA devices
Authentication- Successful logon- 716038 - 611101 - 113012
- Failed logon- 716039 - 611102 - 113021 - 113020 - 113015 - 109031 - 109025 - 109024 - 109022 - 109017 - 109010 - 109008 - 109006 - 107001 - 107002
Configuration- Modified / Modify (Failed attempt)- 111004 - 111010 - 612001 - 612002 - 612003
- Read / Read (Failed attempt)- 111007
- Removed / Remove (Failed attempt)- 111003 - 112001 - 208005
CPU- Modified / Modify (Failed attempt)- 211003
Device state- Modified / Modify (Failed attempt)- 199009
Environment (IPMI)- Modified / Modify (Failed attempt)- 735002 - 735004 - 735006 - 735007 - 735008 - 735012 - 735014 - 735016 - 735018 - 735019 - 735022 - 735023 - 735025 - 735027 - 735028 - 735029
GroupPolicy- Add / Added (Failed attempt)- 502111
- Removed / Remove (Failed attempt)- 502112
Logon- Successful logon- 605005
- Failed logon- 308001 - 605004
RAM- Modified / Modify (Failed attempt)- 211004
Session- Successful Logon- 716001 - 713228 - 722033 - 722022 - 725001 - 725002 - 725003 - 606001
- Logoff- 725007 - 722023 - 722030 - 722031 - 716002 - 713259 - 606002 - 302014 - 302304 - 302016
- Failed Logon- 722056 - 725006 - 725014
---------
Rule- Activated- 733101
URL- Read / Read (Failed attempt)- 716003 - 716004
User- Add / Added (Failed attempt)- 502101
- Modified / Modify (Failed attempt)- 502103 - 113006 - 113007
- Removed / Remove (Failed attempt)- 502102

Configure Cisco IOS Devices

Netwrix Auditor relies on native logs for collecting audit data. Therefore, successful change and access auditing requires a certain configuration of native audit settings in the audited environment and on the Auditor console computer. Configuring your IT infrastructure may also include enabling certain built-in Windows services, etc. Proper audit configuration is required to ensure audit data integrity, otherwise your change reports may contain warnings, errors or incomplete audit data.

CAUTION: Folder associated with Netwrix Auditor must be excluded from antivirus scanning. See the Antivirus Exclusions for Netwrix Auditor knowledge base article for additional information.

You can configure your IT Infrastructure for monitoring in one of the following ways:

  • Automatically through a monitoring plan – This is a recommended method. If you select to automatically configure audit in the target environment, your current audit settings will be checked on each data collection and adjusted if necessary.

  • Manually – Native audit settings must be adjusted manually to ensure collecting comprehensive and reliable audit data. You can enable Auditor to continually enforce the relevant audit policies or configure them manually:

    • The global configuration mode is selected.
    • The logging timestamp option enabled.
    • The logging trap option is selected from 1 to 6 inclusive.
    • The logging host parameter is set to the host address where the service is going to be installed. And UDP port (for, example 514) is used for sending messages.

To configure your Cisco IOS devices, do the following:

  1. Navigate to your Cisco IOS device terminal through the SSH/Telnet connection (for example, use PuTTY Telnet client).

  2. Access the global configuration mode. For example:

    Router# configure terminal

  3. Enable time stamps in syslog messages:

    Router# service timestamps log datetime localtime show-timezone

  4. Set the logging trap option from 1 to 6 inclusive. For example:

    Router# logging trap 5

  5. Set the IP address of the Netwrix Auditor Server as the logging host parameter. And make sure that the UDP port is used for sending syslog messages (e.g., 514 UDP port). For example:

    Router# logging 192.168.1.5

Cisco IOS Devices

Review a full list of object types Netwrix Auditor can collect on Cisco IOS network devices.

Object typeActionsEvent ID
---------
---------
Cisco IOS
Attribute- Read- INFO: AAA/ATTR
Authentication- Successful logon- IKEv2:
- Failed logon- IKEv2-ERROR:
Configuration- Modified- CONFIG_I
Device state- Modified- UPDOWN - CHANGED
Environment- Modified- FAN_FAULT - OVER_TEMP
Logon- Successful logon- LOGIN_SUCCESS
- Failed logon- LOGIN_FAILED
Session- Successful Logon- IKEv2:
- Logoff- %FW-6-SESS_AUDIT_TRAIL
- Failed Logon- IKEv2-ERROR:

Cisco Meraki Dashboard

Before creating a monitoring plan to audit your Cisco Meraki devices, plan for the account that will be used for data collection. See the Data Collecting Account topic for additional information. You will provide this account in the monitoring plan wizard.

Changes that are collected with the basic authorization:

  • Add/Modify/Remove User
  • Configuration
  • Successful logon
  • Failed logon

Changes that are collected with the API:

  • Add/Modify/Remove User
  • Configuration

Configure Cisco Meraki Dashboard Account

Before you start creating a monitoring plan to audit your Cisco Meraki devices, plan for the data collection should meet the requirements listed below. Then you will provide this account in the item.

For Basic Authorization

Since accounts with multi-factor authentication are not supported, you need to create a special cloud account with read-only permissions and disabled multi-factor authentication.

Follow the steps to configure Cisco Meraki Dashboard item.

Step 1 – Sign in to the Cisco Meraki Dashboard.

Step 2 – Create a dashboard account as described in the following Cisco Meraki article: Getting Started

Step 3 – Make sure that the read-only permissions assigned to the account. For more information about Meraki permissions, refer to the following Cisco Meraki article: Managing Dashboard Administrators and Permissions.

Step 4 – Log in to this account and navigate to My Profile at the top of the dashboard.

Step 5 – Find the section labeled SMS authentication.

Step 6 – Make sure that the SMS authentication parameter is set to OFF. For more information about authentication, refer to the following Cisco Meraki article: Two-Factor Authentication.

NOTE: This account is for Netwrix Auditor purposes. Do not forget to switch back to your account.

To Collect Data via API Key

To work with multi-factor authentication (MFA) accounts, you need to generate an API key during authorization.

Follow the steps to create an API key for the Meraki Dashboard API.

Step 1 – Log in to your Cisco Meraki Dashboard account.

Step 2 – Click on your username in the top-right corner of the dashboard to open the drop-down menu.

Step 3 – Select My profile.

Step 4 – In the My profile page, scroll down to the API access section.

Step 5 – Click on the Generate new API key button. You may be prompted to enter your account password for security verification.

Once generated, the API key will be displayed on the screen. Make sure to copy and save the API key in a secure location, as it won't be displayed again for security reasons.

NOTE: Logons are not collected on the board due to technical limitations from the Meraki API.

Configure Cisco Meraki Devices

To configure Cisco Meraki devices, configure the Syslog server for each of your networks.

Netwrix recommends assigning a unique identificator to each Cisco Meraki device; otherwise, the product may count them as a single anonymous device.

Follow the steps to configure the Syslog server.

Step 1 – Sign in to Cisco Meraki Dashboard.

Step 2 – Navigate to Network wide > Configure > General.

nand_meraki_network

Step 3 – Locate the Reporting section and click Add a syslog server.

nand_meraki_server

Step 4 – In the dialog that opens, complete the following fields:

OptionDescription
Server IPProvide the IP address of the computer that hosts your Netwrix Auditor Server.
PortProvide the port configured in your monitoring plan for Network Devices (514 by default). See theNetwork Devices topic for additional information.
RolesSelect the following roles: - Appliance event log - Switch event log - Wireless event log

Cisco Meraki Devices Configuration

If you need any additional information about the Cisco Meraki devices configuration, refer to Cisco documentation: Syslog Server Overview and Configuration.

Review a full list of object types Netwrix Auditor can collect on Cisco Meraki network devices.

Object typeActionsEvent ID
---------
---------
Cisco Meraki
Authentication- Successful Logon- 716038 - 113012 - client_vpn_connect - authentication on - type=8021x_auth - type=8021x_eap_success - type=splash_auth - type=wpa_auth
- Failed Logon- 113020 - 113015 - type=8021x_eap_failure - type=disassociation
Session- Successful Logon- 716001 - 713228 - 722033 - 722022 - 725001 - 725002 - 725003
- Failed Logon- 716039 - 722056 - 725006 - 725014
- Logoff- 716002 - 713259 - 302014 - 302304 - 302016 - 722023 - 725007 - 722030 - 722031 - 113019 - client_vpn_disconnect - type=8021x_deauth - type=8021x_client_deauth - type=wpa_deauth
Rule- Activated- ids-alerts - security_event ids_alerted - security_event security_filtering_file_scanned - security_event security_filtering_disposition_change - type=device_packet_flood - type=rogue_ssid_detected - type=ssid_spoofing_detected
URL- Read / Failed read- 716003 - 716004

Configure Fortinet FortiGate Devices

Netwrix Auditor relies on native logs for collecting audit data. Therefore, successful change and access auditing requires a certain configuration of native audit settings in the audited environment and on the Auditor console computer. Configuring your IT infrastructure may also include enabling certain built-in Windows services, etc. Proper audit configuration is required to ensure audit data integrity, otherwise your change reports may contain warnings, errors or incomplete audit data.

CAUTION: Folder associated with Netwrix Auditor must be excluded from antivirus scanning. See the Antivirus Exclusions for Netwrix Auditor knowledge base article for additional information.

You can configure your IT Infrastructure for monitoring in one of the following ways:

  • Automatically through a monitoring plan – This is a recommended method. If you select to automatically configure audit in the target environment, your current audit settings will be checked on each data collection and adjusted if necessary.

  • Manually – Native audit settings must be adjusted manually to ensure collecting comprehensive and reliable audit data. You can enable Auditor to continually enforce the relevant audit policies or configure them manually:

    • The target Fortinet Fortigate device must be configured via Command Line Interface (CLI) as described below.

To configure your Fortinet FortiGate devices, enable logging to multiple Syslog servers and configure FortiOS to send log messages to remote syslog servers in CEF format. Do one of the following:

  • To configure Fortinet FortiGate devices via Command Line Interface
  • To configure Fortinet FortiGate devices through the Fortigate Management Console

To configure Fortinet FortiGate devices via Command Line Interface

  1. Log in to the Command Line Interface (CLI).

  2. Enter the following commands:

    config log syslogd setting

    set format cef

    To enable CEF format in some previous FortiOS versions, enter the set csv disable command.

    set csv disable

    set facility <facility_name>

    set port 514

    set reliable disable

    set server <ip_address_of_Receiver>

    set status enable

    end

To configure Fortinet FortiGate devices through the Fortigate Management Console

  1. Open Fortigate Management Console and navigate to Log&Report ® Log Config ® Log Setting.

  2. Select the Syslog checkbox.

  3. Expand the Options section and complete the following fields:

    OptionDescription
    Name/IPEnter the address of your Netwrix Auditor Server.
    PortSet to "514".
    LevelSelect desired logging level.
    FacilityNetwrix recommends using default values.
    Data formatSelect CEF. To enable CEF format in some previous FortiOS versions, unselect the Enable CSV checkbox.
  4. Click Apply.

Fortinet FortiGate Devices

Review a full list of object types Netwrix Auditor can collect on Fortinet FortiGate devices.

Object typeActionsLogID
Authentication- Successful logon- 0100029002 - 0102043039 - 0102043008 - 0102043029 - 0101037138 / act=tunnel-up
- Failed logon- 0100029003 - 0101039426 - 0102043009 - 0102043010 - 0101037121 / XAUTH authentication failed
Configuration- Copied- 0100032211 - 0100032300
- Modified / Modify (Failed attempt)- 0100032102 - 0100032104 - 0100032400 - 0100044544 - 0100044545 - 0100044546 - 0100044547 - 0100032565 - 0100032566 - 0100032567 - 0100032571 - 0100032199 - 0100032202 - 0100032203 - 0100032234 - 0100032235 - 0108035012 - 0100044548
- Read / Read (Failed attempt)- 0100032226 - 0100032228 - 0100032229 - 0100032230
Logon- Successful logon- 0100032001
- Failed logon- 0100032002 - 0100032021
Rule- Activated- 0419016384 - 0419016385 - 0419016386 - 0421016399 - 0211008192 - 0211008194 - 0203008200 - 0212008448 - 0261008450 - 0212008452 - 0212008457 - 0213008704 - 0213008706 - 0263008720 - 0262008960 - 0262008962 - 0262008964 - 0262008966 - 0262008968 - 0262008970 - 0262008972 - 0262008974 - 0211009234 - 0211009236 - 0202009248 - 0954024576 - 0954024579 - 0720018432 - 0720018433 - 0720018434
Session- Logoff- 0100032003 - 0102043040
User- Add / Remove- 0100032129 - 0100032131 - 0100032132
- Modified / Modify (Failed attempt)- 0100032130

Configure HPE Aruba Devices

To configure your HPE Aruba devices, enable logging to multiple Syslog servers and configure logging levels. Do one of the following:

  • To configure HPE Aruba devices via Command Line Interface
  • To configure HPE Aruba devices through the Management Console

To configure HPE Aruba devices via Command Line Interface

  1. Log in to the Command Line Interface (CLI).

  2. Enter the following command to start configuration mode:

    configure terminal

  3. Specify IP address of the computer that hosts your Netwrix Auditor Server to send Syslog messages to:

    logging <ipaddr> severity information

  4. Specify event level for the following categories: security, system, user, wireless, network:

    logging network level information

    logging security level information

    logging system level information

    logging user level information

    logging wireless level information

  5. Apply configuration changes:

    write memory

To configure HPE Aruba devices through the Management Console

  1. Log in to HPE Aruba web interface.

  2. Navigate to Mobility Master and select a device or a group of devices you want to monitor with Netwrix Auditor.

  3. Navigate to Configuration → System → Logging and click + to add a new Syslog Server.

    nand_aruba_logging

  4. In the Add New Syslog Servers dialog, complete the following fields:

    OptionDescription
    IP addressProvide the IP address of the new server.
    CategorySelect None.
    Logging facilityLeave empty.
    Logging levelSelect Informational.
    FormatSelect None.
  5. Click Submit. The new server is added to the Syslog Servers list.

  6. Click Pending Changes on the right.

  7. In the Pending Changes for <X> Managed Controller(s) dialog, select the device you want to apply changes to.

  8. Click Deploy Changes.

  9. If the configuration is correct, you will see the following wizard:

    nand_aruba_status

  10. Navigate to Configuration → System → Logging and expand the Logging Levels.

  11. Select the Informational value for the following parameters:

    • network
    • system
    • wireless
    • security
  12. Deploy pending changes for the logging level: repeat steps 6 - 8.

HPE Aruba Devices

Review a full list of object types Netwrix Auditor can collect on HPE Aruba devices.

Object typeActionsMessage ID
Authentication- Successful logon- 103047 - 103082 - 103085 - 105004 - 133008 - 133005 - 133098
- Failed logon- 522275 - 541003 - 103046 - 103048 - 103067 - 103068 - 103083 - 103084 - 105002 - 105003 - 133009 - 133006 - 133099 - 125021 - 125022 - 125031 - 125033 - 125071
Configuration- Add / Added (Failed attempt) - Removed / Remove (Failed attempt) - Modified / Modify (Failed attempt)- 125012 - (109012 - 124037 - 124036 - 124010 - 325013 - 325014 - 325015 - 325018 - 325019 - 335000 - 335009 - 335016 - 335015 - 335010 - 335013 - 335001 - 305034 - 335002 - 125063 - 125065 - 125067 - 125069 - 125064 - 125066 - 125068 - 125060 - 125061 - 125072 - 133109 - 133022 - 133104 - ECC error detected - Power supply failure
RuleActivated- 127054 - 127033 - 127068 - 127034 - 127006 - 127086 - 127064 - 127073 - 127079 - 127082 - 127084 - 127080 - 127083 - 127081 - 127085 - 127007 - 127074 - 127036 - 127047 - 127066 - 127043 - 127067 - 127087 - 127078 - 127035 - 127032 - 127072 - 127088 - 127109 - 127071 - 127077 - 127065 - 127075 - 127046 - 127044 - 127045 - 127116 - 127117 - 127052 - 127053 - 127069 - 127070 - 127014 - 127015 - 127016 - 127017 - 127029 - 127030 - 127008 - 127009 - 127010 - 127011 - 127028 - 127061 - 127062 - 127063 - 127039 - 127040 - 127041 - 127042
Session- Logoff- 103040 - 103042 - 103056 - 103069
Logon- Logon succeeded- 125023 - 125024 - 125032 - 125070
Role- Add / Added (Failed attempt)- 125011

Configure Juniper Devices

Netwrix Auditor relies on native logs for collecting audit data. Therefore, successful change and access auditing requires a certain configuration of native audit settings in the audited environment and on the Auditor console computer. Configuring your IT infrastructure may also include enabling certain built-in Windows services, etc. Proper audit configuration is required to ensure audit data integrity, otherwise your change reports may contain warnings, errors or incomplete audit data.

CAUTION: Folder associated with Netwrix Auditor must be excluded from antivirus scanning. See the Antivirus Exclusions for Netwrix Auditor knowledge base article for additional information.

You can configure your IT Infrastructure for monitoring in one of the following ways:

  • Automatically through a monitoring plan – This is a recommended method. If you select to automatically configure audit in the target environment, your current audit settings will be checked on each data collection and adjusted if necessary.

  • Manually – Native audit settings must be adjusted manually to ensure collecting comprehensive and reliable audit data. You can enable Auditor to continually enforce the relevant audit policies or configure them manually:

    • The target Juniper device must be configured via JunOS Command Line Interface (CLI) as described below.

To configure you Juniper devices, do the following:

  1. Launch the JunOS Command Line Interface (CLI).

  2. Execute the following commands:

    configure

    set system syslog host <host address> any info

    where <host address> is the IP address of the computer where Netwrix Auditor Server is installed.

    set system syslog host <host address> port <port name>

    where

    <host address> is the IP address of the computer where Netwrix Auditor Server is installed

    AND

    <port number> is the name of the UDP port used to listen to network devices (514 port used by default). Network Devices

    set system syslog time-format <current year>

    commit

Juniper Devices

Review a full list of object types Netwrix Auditor can collect on Juniper network devices.

Object typeActionsEvent ID
Logon- Successful logon- LOGIN_INFORMATION - Accepted keyboard-interactive/pam - WEB_AUTH_SUCCESS - JADE_AUTH_SUCCESS
- Failed logon- LOGIN_FAILED - SSHD_LOGIN_FAILED LIBJNX_LOGIN_ACCOUNT_LOCKED - WEB_AUTH_FAIL JADE_AUTH_FAILURE
Authentication- Successful Logon- FWAUTH_HTTP_USER_AUTH_ACCEPTED - FWAUTH_WEBAUTH_SUCCESS - FWAUTH_FTP_USER_AUTH_ACCEPTED - FWAUTH_TELNET_USER_AUTH_ACCEPTED - DYNAMIC_VPN_AUTH_OK
- Failed logon- FWAUTH_HTTP_USER_AUTH_FAIL - FWAUTH_WEBAUTH_FAIL - FWAUTH_FTP_USER_AUTH_FAIL - FWAUTH_TELNET_USER_AUTH_FAIL - DYNAMIC_VPN_AUTH_FAIL
Configuration- Modified / Modify (Failed attempt)- UI_FACTORY_OPERATION - UI_INITIALSETUP_OPERATION - UI_RESCUE_OPERATION - UI_LOAD_EVENT - UI_CFG_AUDIT_OTHER - UI_CFG_AUDIT_SET: - UI_CFG_AUDIT_NEW - UI_CFG_AUDIT_SET_SECRET - UI_COMMIT: - UI_COMMIT_PROGRESS - UI_COMMIT_COMPLETED - UI_COMMIT_AT_COMPLETED - UI_COMMIT_NOT_CONFIRMED - UI_COMMIT_CONFIRMED_REMINDER - UI_COMMIT_AT_ABORT - UI_COMMIT_AT_FAILED - UI_COMMIT_COMPRESS_FAILED - UI_COMMIT_ROLLBACK_FAILED
Rule- Activated- RT_SCREEN_ICMP - RT_SCREEN_IP - RT_SCREEN_TCP - RT_SCREEN_TCP_DST_IP - RT_SCREEN_TCP_SRC_IP - RT_SCREEN_UDP - AV_VIRUS_DETECTED_MT - ANTISPAM_SPAM_DETECTED_MT - IDP_APPDDOS_APP_ATTACK_EVENT - IDP_APPDDOS_APP_STATE_EVENT - IDP_ATTACK_LOG_EVENT

Configure PaloAlto Devices

Netwrix Auditor relies on native logs for collecting audit data. Therefore, successful change and access auditing requires a certain configuration of native audit settings in the audited environment and on the Auditor console computer. Configuring your IT infrastructure may also include enabling certain built-in Windows services, etc. Proper audit configuration is required to ensure audit data integrity, otherwise your change reports may contain warnings, errors or incomplete audit data.

CAUTION: Folder associated with Netwrix Auditor must be excluded from antivirus scanning. See the Antivirus Exclusions for Netwrix Auditor knowledge base article for additional information.

You can configure your IT Infrastructure for monitoring in one of the following ways:

  • Automatically through a monitoring plan – This is a recommended method. If you select to automatically configure audit in the target environment, your current audit settings will be checked on each data collection and adjusted if necessary.

  • Manually – Native audit settings must be adjusted manually to ensure collecting comprehensive and reliable audit data. You can enable Auditor to continually enforce the relevant audit policies or configure them manually:

    • Create a Syslog Server profile and syslog forwarding for the target PaloAlto device via Web Interface as described below.

To configure your PaloAlto devices, create a Syslog server profile and assign it to the log settings for each log type.

Follow the steps to configure a Syslog server profile.

Step 1 – Connect to your PaloAlto device: launch an Internet browser and enter the IP address of the firewall in the URL field (https://<IP address>).

Step 2 – In the Web Interface, navigate to Device > Server Profiles > Syslog.

Step 3 – Click Add and specify profile name, for example, "SyslogProf1".

Step 4 – Specify syslog server parameters:

ParameterDescription
NameSpecify unique name for a syslog server.
Syslog ServerProvide a server name by entering its FQDN or IPv4 address.
TransportSelect UDP.
PortProvide the name of the UDP port used to listen to network devices (514 port used by default).
FormatSelect IETF.
FacilityNetwrix recommends using default values.

Follow the steps to configure syslog forwarding.

Step 1 – In the Web Interface, navigate to Device > Log Settings.

Step 2 – For System, Config, and User ID logs, click Add and enter unique name of your syslog server.

Step 3 – On the syslog panel, click Add and select the syslog profile you created above.

Step 4 – Click Commit and review the logs on the syslog server.

NOTE: After configuring the monitoring plan, Netwrix Auditor will listen to the logs forwarded by the Palo Alto device.

PaloAlto Devices

Review a full list of object types Netwrix Auditor can collect on PaloAlto network devices.

Object typeActionsEvent ID
Logon- Successful logon- logged in
- Failed logon- failed authentication for user - authentication failed for user
Authentication- Successful Logon- authentication succeeded for user - USERID,login, - globalprotectportal-auth-succ
- Failed Logon- authentication failed for user - globalprotectportal-auth-fail
Configuration- Modified / Modify (Failed attempt)- commit
Environment- Read / Read (Failed attempt)- connect-server-monitor-failure
Session- Logoff- logged out
User- Add / Added (Failed attempt)- config mgt-config users - config shared local-user-database user
- Modified / Modify (Failed attempt)- config mgt-config users - config shared local-user-database user
- Removed / Remove (Failed attempt)- config mgt-config users - config shared local-user-database user

Permissions for Network Devices Auditing

Before you start creating a monitoring plan to audit your network devices, plan for the account that will be used for data collection – it should meet the requirements listed below. Then you will provide this account in the monitoring plan wizard.

For...Requirement
- Cisco ASA - Cisco IOS - Cisco FTD - Fortinet - HPE Aruba - Juniper - Palo Alto - Pulse Secure - SonicWall - HPEYou can use any account (not necessarily the credentials used to connect to the device itself), as long as these credentials do not affect Netwrix Auditor or monitored IT infrastructure. Provide this account in the monitoring plan wizard.
- Cisco MerakiSee the Configure Cisco Meraki Dashboard Account section for additional information.

Configure Pulse Secure Devices

  1. Connect to your Pulse Secure device: launch an Internet browser and enter the IP address or device DNS name in the URL field (https://<IP address / Device DNS name>/admin).

  2. In the Web Interface, navigate to System → Log/Monitoring.

  3. Under Log/Monitoring, expand the User Access link.

  4. Locate the Settings tab.

  5. Under the Select Events to Log, select the following (minimal requirement, select other events if needed):

    • Login/Logout
    • VPN Tunneling

    manual_config_pulse_1

  6. Under the Syslog Servers, complete the following fields:

    OptionDescription
    Server nameIPSpecify the IP address of the computer where resides.
    FacilitySelect desired facility.
    TypeSelect UDP.
    Client CertificateUse default values.
    FilterSelect Standard.
  7. Save your changes.

  8. Switch to the Admin Access tab.

  9. Under the Select Events to Log, select the following (minimal requirement, select other events if needed):

    • Administrator logins
    • Administrator changes
  10. Repeat the step 6 for Syslog Servers configuration.

  11. Save your changes.

  12. Navigate to System → Configuration → Advanced Networking.

  13. Expand the Select the source port to be used for the following features link.

  14. Locate the Syslog parameter and set it to Internal.

    Netwrix Auditor must be accessible from the selected network interface

  15. Save your changes.

  16. Start Netwrix Auditor.

  17. Navigate to your monitoring plan for Network Devices. See Monitoring Plans

  18. Provide the IP address of the interface you specified on the step 14 as the Computer item for your monitoring plan. See Active Directory

Pulse Secure Devices

Review a full list of object types Netwrix Auditor can collect on Pulse Secure network devices.

Object TypeActions
Logon- Successful logon- user authenticated successfully - user logged in successfully - administrative login succeeded - SuperAdmin session created using token for administrative logon recovery - Admin logged in successfully through the local console
- Failed logon- Login/authentication failed - Login attempt from the local console failed
- Logoff- user logged out or session timed out - admin logged out or session timed out - SuperAdmin session finished or timed out - Admin logged off from the local console
Authentication- Successful logon- VPN Tunneling Successful Logon
- Logoff- VPN connection closed
Configuration- Modified- Server shutdown/reboot/restart requested - Platform administrator account added - Console administrator password is disabled or enabled - IKEv2 settings modified - Global SAML Settings modified - SAML Metadata Provider added - SAML Metadata Provider removed - SAML Metadata Provider updated - authentication server added - authentication server deleted - authentication server modified - Sign-in policy created - Sign-in policy deleted - Sign-in policy modified - Sign-in policy multiple user session limit modified - Sign-in policy multiple user session modified - Sign-in policy multiple user session warning notification modified - Updated the order of the sign-in policies - Sign-in policy user access parameters modified - Sign-in page created - Sign-in page deleted - Sign-in page updated - Sign-in notification created - Sign-in notification deleted - Sign-in notification updated - Sign-in SAML modified
User- Added- user account added
- Modified- user account password changed - user account disabled or enabled - user account unlocked - user account modified - admin rights granted - admin rights revoked
- Removed- user account removed
Role- Added- Role is created
- Modified- Role is modified
- Removed- Role is deleted
- Copied- Role is duplicated
Session- Session start- VPN Tunneling Session started
- Session end- VPN Tunneling Session ended
Realm- Added- Realm added
- Modified- IP added to allowed IP list in Realm authentication policy - IP removed from allowed IP list - IP setting reordered - Source IP restriction modified - browser restriction set - Browser restriction modified - browser restriction removed - Browser restriction reordered - Client-side certificate requirement modified - Certificate attribute modified - Password restriction modified - Minimum password length modified - Host Checker restriction is updated - User Limit restriction is modified - Guaranteed minimum number of users is modified - Maximum number of sessions is modified - Maximum number of users is modified - Realm is modified
- Removed- Realm deleted
- Copied- Realm duplicated
- Renamed- Realm renamed

Configure SonicWall Devices

Netwrix Auditor relies on native logs for collecting audit data. Therefore, successful change and access auditing requires a certain configuration of native audit settings in the audited environment and on the Auditor console computer. Configuring your IT infrastructure may also include enabling certain built-in Windows services, etc. Proper audit configuration is required to ensure audit data integrity, otherwise your change reports may contain warnings, errors or incomplete audit data.

CAUTION: Folder associated with Netwrix Auditor must be excluded from antivirus scanning. See the Antivirus Exclusions for Netwrix Auditor knowledge base article for additional information.

You can configure your IT Infrastructure for monitoring in one of the following ways:

  • Automatically through a monitoring plan – This is a recommended method. If you select to automatically configure audit in the target environment, your current audit settings will be checked on each data collection and adjusted if necessary.

  • Manually – Native audit settings must be adjusted manually to ensure collecting comprehensive and reliable audit data. You can enable Auditor to continually enforce the relevant audit policies or configure them manually:

    • Configure log settings, depending on your device type.

To configure your SonicWall devices, do the following:

To configure SonicWall Web Application Firewall

  1. Connect to your SonicWall device. Launch an Internet browser and enter the following in the URL field: https://<IP address>:84443, where IP address is the IP of the device and 84443 is the default connection port.

  2. Log in to the device.

  3. In the Web Interface, navigate to Log → Settings and configure the following:

    ParameterDescription
    - Log Level - Alert Level - Syslog LevelSet to "Info".
    - Enable Audit Log - Send to Syslog Server in Audit Log Settings - Send to Syslog Server in Access Log SettingsSelect these checkboxes.
    Primary Syslog ServerEnter the address of your Netwrix Auditor Server.
    Primary Syslog Server PortProvide the name of the UDP port used to listen to network devices (514 port used by default).
  4. Click Accept.

  5. Navigate to Log → Categories.

  6. Select the following checkboxes:

    • Authentication
    • Authorization & Access
    • System
    • Web Application Firewall
    • Geo IP & Botnet Filter In Log Categories (Standard)
  7. Click Accept.

To configure SonicWall SMA

  1. Connect to your SonicWall device. Launch an Internet browser and enter the following in the URL field: https://<IP address>:8443, where IP address is the IP of the device and 8443 is the default connection port.

  2. Log in to the device.

  3. In the Web Interface, navigate Log → Settings and configure the following:

    ParameterDescription
    - Log Level - Alert Level - Syslog LevelSet to "Info".
    - Enable Audit Log - Send to Syslog Server in Audit Log Settings - Send to Syslog Server in Access Log SettingsSelect these checkboxes.
    Primary Syslog ServerEnter the address of your Netwrix Auditor Server.
    Primary Syslog Server PortProvide the name of the UDP port used to listen to network devices (514 port used by default).
  4. Click Accept.

  5. Navigate to Log → Categories.

  6. Select the following checkboxes:

    • Authentication
    • Authorization & Access
    • System
    • Web Application Firewall
    • Geo IP & Botnet Filter In Log Categories (Standard)
  7. Click Accept.

To configure SonicWall NS series

  1. Connect to your SonicWall device. Launch an Internet browser and enter the following in the URL field: https://<IP address>:443, where IP address is the IP of the device and 443 is the default connection port.
  2. Log in to the device.
  3. In the Web Interface, navigate to Manage → Log Settings → Base Setup.
  4. Select all checkboxes in the Syslog column.
  5. Click Accept.
  6. Navigate to Manage → Log Settings → Syslog.
  7. Set the Syslog Format to Default.
  8. Click Add.
  9. In the dialog appears, select Create new address object option in the Name or IP Address combo box.
  10. Provide name and IP address of the new object.
  11. Click OK.
  12. In the Add Syslog Server dialog, find the IP address you specified on the step 10 in the Name or IP Address list.
  13. Click OK.
  14. Click Save.

SonicWall Devices

Review a full list of object types Netwrix Auditor can collect on SonicWall network devices.

Object typeActionsEvent ID
Logon- Successful logon- User login from an internal zone allowed - User login successful - XAUTH Succeeded with VPN - VPN zone remote user login allowed - WAN zone remote user login allowed - PPP: Authentication successful - Local Authentication Success - RADIUS/LDAP Authentication Success - Successful authentication received for Remotely Triggered - IKEv2 Authentication successful - SSL VPN zone remote user login allowed
- Failed logon- User login denied - User login failed - XAUTH Failed with VPN - L2TP PPP Authentication Failed - check username / password - RADIUS/LDAP reports Authentication Failure - Local Authentication Failure - User login to Administration Portal denied - User login failure rate exceeded - User Name authentication Failure locally - ISAKMP_AUTH_FAILED - Guest service limit reached - Guest login denied - Incorrect authentication received for Remotely Triggered - Authentication Timeout during Remotely Triggered - Problem occurred during user group membership retrieval - An error has occurred while sending your - IPsec Authentication Failed
- Logoff- User logged out - logged out - Guest Session Timeout - Guest Account Timeout - Guest Idle Timeout - Guest traffic quota exceeded
Authentication- Successful Logon- Administrator login allowed - CLI administrator login allowed - VPN zone administrator login allowed - WAN zone administrator login allowed - Configuration mode administration session started - Read-only mode GUI administration session started - Non-config mode GUI administration session started - User login successful - Session Start: - EventMessage: Session Start Success
- Failed Logon- Administrator login denied - CLI administrator login denied due to bad credentials - User login failed - The account has been disabled for - is not permitted for this Web App - Authentication for user - Authentication failed - maximum authentication attempts exceeded for - EventMessage: Session Start Failed
- Logoff- Administrator logged out - CLI administrator logged out - Configuration mode administration session ended - GUI administration session ended - Logged out - Session End: - EventMessage: Session End - Command='Tunnel'
Configuration- Add / Added (Failed attempt)- m=1333 - Scheduled settings generated - A new default Self-Signed certificate was generated successfully - Scheduled Tech Support Report generated - Restarted Tech Support Report generated
- Modified / Modify (Failed attempt)- Mail attachment disabled - Watch and report possible SYN floods - Watch and proxy WAN connections when under attack - Always proxy WAN connections - SYN Flood blacklisting enabled by user - SYN Flood blacklisting disabled by user - Administrator name changed - VPN disabled by administrator - VPN enabled by administrator - WLAN disabled by administrator - WLAN enabled by administrator - WLAN disabled by schedule - WLAN enabled by schedule - is added into Group - is removed from Group - m=1334 - Update administrator/user lockout params - Settings imported - Critical Operating System Update failed - msg="WAF restarted - HTTP(S) Cache settings were updated - database has been updated - Web Server Fingerprint Protection enforced - About to reconfigure service: - Finished applying configuration changes - Started - Start failed - Stopped
- Read / Read (Failed attempt)- m=1203 - m=1204 - Problem loading the URL list - Registration Update Needed, Please restore your existing security service subscriptions - Failed to synchronize license information with Licensing Server - Current settings exported - Error sending - settings sent successfully - Automated scheduled settings successful - Scheduled settings downloaded - Tech Support Report - Tech Support Report sent successfully - Loaded WAF signature database successfully - Error sending - logs sent out successfully
- Remove / Removed (Failed attempt)- Scheduled settings deleted - Oldest scheduled Tech Support Report deleted - has been deleted - Event Logs cleared - Audit Logs cleared - Access Logs cleared - Deleting log files - Deleting core files - Deleting snapshots older
Device state- Modified / Modify (Failed attempt)- Registration Update Needed, Please restore your existing security service subscriptions - Intrusion Prevention (IDP) subscription has expired - Failed to synchronize license information with Licensing Server
Folder- Add / Added (Failed attempt)- Request='GET /cgi-bin/sonicfiles?RacNumber=9&Arg1=
- Read / Read (Failed attempt)- Request='GET /cgi-bin/sonicfiles?RacNumber=16&Arg1=
- Remove / Removed (Failed attempt)- Request='GET /cgi-bin/sonicfiles?RacNumber=13&Arg1=
File- Add / Added (Failed attempt)- Request='GET /cgi-bin/sonicfiles?RacNumber=31&Arg1=
- Read / Read (Failed attempt)- Request='GET /cgi-bin/sonicfiles?RacNumber=25&Arg1=
- Rename / Renamed (Failed attempt)- Request='GET /cgi-bin/sonicfiles?RacNumber=14&Arg1=
- Remove / Removed (Failed attempt)- Request='GET /cgi-bin/sonicfiles?RacNumber=12&Arg1=
Host- Read / Read (Failed attempt)- Received AV Alert - The loaded content URL List has expired - CFS Alert - Mail Filter Alert - Mail attachment deleted - Intrusion Prevention (IDP) subscription has expired - Smurf Amplification attack dropped - TCP Xmas Tree dropped - Source routed IP packet dropped - Mail fragment dropped - PASV response spoof attack dropped - PORT bounce attack dropped - PASV response bounce attack dropped - Spank attack multicast packet dropped - IPS Detection Alert - IPS Prevention Alert - Drop WLAN traffic - IDP Detection Alert - IDP Prevention Alert - Ping of death dropped - IP spoof dropped - Possible SYN flood attack detected - Land attack dropped
Rule- Activated- will be denied - msg="WAF threat detected - Ping of death dropped - IP spoof dropped - Possible SYN flood attack detected - Land attack dropped - Smurf Amplification attack dropped - Possible port scan detected - Probable port scan detected - Probable TCP FIN scan detected - Probable TCP XMAS scan detected - Probable TCP NULL scan detected - Mail attachment deleted - TCP Xmas Tree dropped - Source routed IP packet dropped - Mail fragment dropped - PASV response spoof attack dropped - PORT bounce attack dropped - PASV response bounce attack dropped - Spank attack multicast packet dropped - IPS Detection Alert - IPS Prevention Alert - Drop WLAN traffic - IDP Detection Alert
Session- Add / Added (Failed attempt)- msg="New HTTP Request to - msg="New HTTPS Request to - msg="New HTTP Session for - msg="New HTTPS Session for
- Read / Read (Failed attempt)- msg="WAF threat detected: - will be denied - Access to proxy server denied - Website found in blacklist
- Logoff- Connection Closed
User- Add / Added (Failed attempt)- Guest account
- Modified / Modify (Failed attempt)- Administrator name changed - out user logins allowed - Guest account - User login disabled from - User account
- Remove / Removed (Failed attempt)- Guest account - m=1335