Collect Data

Windows Event Log Collection

What’s Collected

The agent monitors these Windows Event Log channels:

  • Application - Application errors, warnings, and information

  • System - System-level events and service state changes

  • Security - Authentication events, access control, and audit logs

  • Windows PowerShell - PowerShell engine activity

  • PowerShell Operational - Detailed PowerShell command execution

What You’ll See

This provides visibility into:

  • User authentication attempts (successful and failed)

  • Service starts, stops, and failures

  • Process creation and termination

  • Application crashes and errors

  • PowerShell script execution and commands

Noise Reduction (Advanced Configuration Only)

The advanced configuration automatically filters out high-volume, low-value events to reduce storage costs:

Filtered Event IDs:

  • 5145 - Network share object access check

  • 5156 - Windows Filtering Platform permitted connection

  • 5447 - Windows Filtering Platform filter change

  • 4656 - Handle to object requested

  • 4658 - Handle to object closed

  • 4663 - Attempt to access object

  • 4660 - Object deleted

  • 4670 - Permissions on object changed

  • 4690 - Duplicate handle to object requested

  • 4703 - Token right adjusted

  • 4907 - Auditing settings changed

  • 5152 - Windows Filtering Platform blocked packet

  • 5157 - Windows Filtering Platform blocked connection

To customize this list:

Add or remove Event IDs in the configuration:

Exec if $EventID in (5145, 5156, YOUR_EVENT_ID) drop();

Configuration Parameters

  • ResolveSID: FALSE - Does not resolve Security Identifiers to usernames (improves performance)

  • ReadFromLast: TRUE - Starts reading from the last known position (avoids duplicates on restart)

  • $ModuleType = ‘event_log’ - Tags events for Logpoint normalization

DHCP Log Collection

Prerequisites

  • DHCP Server role must be installed

  • DHCP logging must be enabled (enabled by default)

What’s Collected

DHCP server logs from:

C:\Windows\System32\dhcp\DhcpSrvLog-*.log

The wildcard * matches log files with different day names (e.g., DhcpSrvLog-Mon.log, DhcpSrvLog-Tue.log)

Parsed Fields

The agent parses these CSV fields from DHCP logs:

  • ID, Date, Time, Description

  • IPAddress, Hostname, MACAddress

  • UserName, TransactionID, QResult

  • ProbationTime, CorrelationID, DHCID

  • VendorClassHex, VendorClassASCII

  • UserClassHex, UserClassASCII

  • RelayAgentInformation, DnsRegError

What You’ll See

  • DHCP lease requests and grants

  • IP address assignments

  • DHCP client information

  • Lease renewals and releases

  • DHCP server activity

When to Use This

Enable DHCP collection on servers running the DHCP Server role to track:

  • Device network connections

  • IP address usage patterns

  • Unauthorized DHCP activity

  • DHCP troubleshooting

DNS Debug Log Collection

Prerequisites

CRITICAL: DNS debug logging must be manually enabled on your DNS server.

To Enable DNS Debug Logging:

  1. Open DNS Manager

  2. Right-click the DNS server

  3. Select Properties → Debug Logging tab

  4. Enable desired logging options

  5. Set log file location to default or specify custom path

What’s Collected

DNS debug logs from:

C:\Windows\System32\dns\dns*.log

Data Validation

The agent validates DNS log entries before forwarding:

  • Drops empty lines

  • Drops lines that don’t start with a date pattern

  • Only forwards properly formatted DNS debug entries

What You’ll See

  • DNS queries and responses

  • Query types and destinations

  • Response codes

  • DNS resolution flows

  • Client IP addresses making queries

When to Use This

Enable DNS collection for:

  • Investigating DNS-based threats (tunneling, DGA domains)

  • Tracking domain resolution patterns

  • Detecting DNS exfiltration

  • Network troubleshooting

  • Compliance and auditing

Performance Note: DNS debug logging can generate high volumes of data. Enable selectively on critical DNS servers.

Registry Monitoring (File Integrity Monitoring)

What’s Monitored

The agent performs continuous FIM-style scanning of critical registry locations to detect:

  • Persistence mechanisms - Malware auto-start locations

  • Execution hijacking - File handler and association tampering

  • Service modifications - Changes to Windows services

  • Policy tampering - Group policy and security policy changes

  • Protocol handler abuse - Custom protocol handler manipulation

Registry Areas Monitored

Category

Example Paths

Purpose

File Execution

HKLM\Software\Classes\batfile\*

HKLM\Software\Classes\cmdfile\*

HKLM\Software\Classes\exefile\*

Detect file association attacks

Monitor command file handlers

Track executable file handlers

Persistence

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\*

HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce\*

HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\*

Catch auto-start malware

Monitor one-time startup items

Track Winlogon changes


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support