NetWitness Platform provides several ways to collect logs from Microsoft Windows machines. Each method has advantages and disadvantages, as well as different methods of configuration.
Basically, NetWitness Platform provides the following ways to collect Windows logs:
The following table describes details for each option: use these details to help determine how you choose to collect Windows Logs in your environment.
Method | Requires installing an agent | Uses Encrypted Transport | Method of transport | Provided by RSA | Ability to process local files in addition to Windows Event Logs | Requires payment | Custom event logs | Notes |
---|---|---|---|---|---|---|---|---|
NWE Agent | Yes | Configurable to use TLS Syslog | Syslog/TLS Syslog | Yes | Yes | No | Yes | Host Telemetry Data is also collected |
WinRM | No | Yes | HTTP/HTTPS | Yes | No | No | Yes | |
Snare | Yes | Configurable to use TLS Syslog | Syslog/TLS Syslog | No | Yes | Yes | Yes |
Snare was free for a long period. After they began to charge, NXLog stepped in and now integrates very similarly with NetWitness. |
NXLog | Yes | Configurable to use TLS Syslog | Syslog/TLS Syslog | No | Yes | No Cost for basic functionality | Yes | |
Event Reporter | Yes | Configurable to use TLS Syslog | Syslog/TLS Syslog | No | Yes | Yes | Yes | |
Legacy Collector | Not on Target Machines | Uses Encrypted Transport | WMI/SMB | Yes | No | No | Yes, Limited |
For the details on how to configure and collect logs using each of these methods, please see the individual guide for that method: