File size: 18,595 Bytes
7945a0d |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 |
function Send-AzMonitorCustomLogs
{
<#
.SYNOPSIS
Sends custom logs to a specific table in Azure Monitor.
.DESCRIPTION
Script to send data to a data collection endpoint which is a unique connection point for your subscription.
The payload sent to Azure Monitor must be in JSON format. A data collection rule is needed in your Azure tenant that understands the format of the source data, potentially filters and transforms it for the target table, and then directs it to a specific table in a specific workspace.
You can modify the target table and workspace by modifying the data collection rule without any change to the REST API call or source data.
.PARAMETER LogPath
Path to the log file or folder to read logs from and send them to Azure Monitor.
.PARAMETER appId
Azure Active Directory application to authenticate against the API to send logs to Azure Monitor data collection endpoint.
This script supports the Client Credential Grant Flow.
.PARAMETER appSecret
Secret text to use with the Azure Active Directory application to authenticate against the API for the Client Credential Grant Flow.
.PARAMETER TenantId
ID of Tenant
.PARAMETER DcrImmutableId
Immutable ID of the data collection rule used to process events flowing to an Azure Monitor data table.
.PARAMETER DceURI
Uri of the data collection endpoint used to host the data collection rule.
.PARAMETER TableName
Name of built-in Azure monitor table to send data to.
.PARAMETER StreamName
Name of stream to send data to before being procesed and sent to an Azure Monitor data table.
.PARAMETER TimestampField
Specific field available in your custom log to select as the main timestamp. This will be the TimeGenerated field in your table. By default, this script uses a current timestamp.
.PARAMETER ShowProgressBar
Show a PowerShell progress bar. Disabled by default.
.EXAMPLE
PS> . .\Send-AzMonitorCustomLogs.ps1
PS> Send-AzMonitorCustomLogs -LogPath C:\WinEvents.json -appId 'XXXX' -appSecret 'XXXXXX' -TenantId 'XXXXXX' -DcrImmutableId 'dcr-XXXX' -DceURI 'https://XXXX.westus2-1.ingest.monitor.azure.com' -TableName SecurityEvent -StreamName 'Custom-WindowsEvent' -TimestampField 'TimeCreated'
.EXAMPLE
PS> . .\Send-AzMonitorCustomLogs.ps1
PS> Send-AzMonitorCustomLogs -LogPath C:\WinEvents.json -appId 'XXXX' -appSecret 'XXXXXX' -TenantId 'XXXXXX' -DcrImmutableId 'dcr-XXXX' -DceURI 'https://XXXX.westus2-1.ingest.monitor.azure.com' -TableName SecurityEvent -StreamName 'Custom-WindowsEvent' -TimestampField 'TimeCreated' -Debug
.EXAMPLE
PS> . .\Send-AzMonitorCustomLogs.ps1
PS> Send-AzMonitorCustomLogs -LogPath C:\WinEventsFolder\ -appId 'XXXX' -appSecret 'XXXXXX' -TenantId 'XXXXXX' -DcrImmutableId 'dcr-XXXX' -DceURI 'https://XXXX.westus2-1.ingest.monitor.azure.com' -TableName SecurityEvent -StreamName 'Custom-WindowsEvent' -TimestampField 'TimeCreated' -Debug
.NOTES
# Author: Roberto Rodriguez (@Cyb3rWard0g)
# License: MIT
# Reference:
# https://docs.microsoft.com/en-us/azure/azure-monitor/logs/custom-logs-overview
# https://docs.microsoft.com/en-us/azure/azure-monitor/logs/tutorial-custom-logs-api#send-sample-data
# https://securitytidbits.wordpress.com/2017/04/14/powershell-and-gzip-compression/
# Custom Logs Limit
# Maximum size of API call: 1MB for both compressed and uncompressed data
# Maximum data/minute per DCR: 1 GB for both compressed and uncompressed data. Retry after the duration listed in the Retry-After header in the response.
# Maximum requests/minute per DCR: 6,000. Retry after the duration listed in the Retry-After header in the response.
.LINK
https://github.com/OTRF/Security-Datasets
#>
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[ValidateScript({
foreach ($f in $_)
{
if( -Not ($f | Test-Path) ){
throw "File or folder does not exist"
}
}
return $true
})]
[string[]]$LogPath,
[Parameter(Mandatory=$true)]
[string]$appId,
[Parameter(Mandatory=$true)]
[string]$appSecret,
[Parameter(Mandatory=$true)]
[string]$TenantId,
[Parameter(Mandatory=$true)]
[string]$DcrImmutableId,
[Parameter(Mandatory=$true)]
[string]$DceURI,
[Parameter(Mandatory=$true)]
[ValidateSet("SecurityEvent","WindowsEvent","Syslog")]
[string]$TableName,
[Parameter(Mandatory=$true)]
[string]$StreamName,
[Parameter(Mandatory=$false)]
[string]$TimestampField,
[Parameter(Mandatory=$false)]
[switch]$ShowProgressBar
)
If ($PSBoundParameters['Debug']) {
$DebugPreference = 'Continue'
}
@("
_________ .____________ __ .____ ____
/ _____/ ____ ____ __| _/\_ ___ \ __ __ _______/ |_ ____ _____ | | ____ / ___\ ______
\_____ \ _/ __ \ / \ / __ | / \ \/ | | \/ ___/\ __\/ _ \ / \ | | / _ \ / /_/ >/ ___/
/ \\ ___/ | | \/ /_/ | \ \____| | /\___ \ | | ( <_> )| Y Y \| |___( <_> )\___ / \___ \
/_______ / \___ >|___| /\____ | \______ /|____//____ > |__| \____/ |__|_| /|_______ \\____//_____/ /____ >
\/ \/ \/ \/ \/ \/ \/ \/ \/
___________ _____ _____ .__ __
\__ ___/____ / _ \ ________ __ __ _______ ____ / \ ____ ____ |__|_/ |_ ____ _______
| | / _ \ / /_\ \ \___ /| | \\_ __ \_/ __ \ / \ / \ / _ \ / \ | |\ __\/ _ \\_ __ \
| | ( <_> )/ | \ / / | | / | | \/\ ___/ / Y \( <_> )| | \| | | | ( <_> )| | \/
|____| \____/ \____|__ //_____ \|____/ |__| \___ >\____|__ / \____/ |___| /|__| |__| \____/ |__|
\/ \/ \/ \/ \/ V0.3
Creator: Roberto Rodriguez @Cyb3rWard0g
License: MIT
")
$ErrorActionPreference = "Stop"
# Aggregate files from input paths
$all_datasets = @()
foreach ($file in $LogPath){
if ((Get-Item $file) -is [system.io.fileinfo]){
$all_datasets += (Resolve-Path -Path $file)
}
elseif ((Get-Item $file) -is [System.IO.DirectoryInfo]){
$folderfiles = Get-ChildItem -Path $file -Recurse -Include *.json
$all_datasets += $folderfiles
}
}
write-Host "*******************************************"
Write-Host "[+] Obtaining access token.."
## Obtain a bearer token used to authenticate against the data collection endpoint
$scope = [System.Net.WebUtility]::UrlEncode("https://monitor.azure.com//.default")
$body = "client_id=$appId&scope=$scope&client_secret=$appSecret&grant_type=client_credentials";
$headers = @{"Content-Type" = "application/x-www-form-urlencoded"};
$uri = "https://login.microsoftonline.com/$tenantId/oauth2/v2.0/token"
$bearerToken = (Invoke-RestMethod -Uri $uri -Method "Post" -Body $body -Headers $headers).access_token
Write-Debug $bearerToken
Function Send-DataToDCE($payload, $size){
write-debug "############ Sending Data ############"
write-debug "JSON array size: $($size/1mb) MBs"
# Initialize Headers and URI for POST request to the Data Collection Endpoint (DCE)
$headers = @{"Authorization" = "Bearer $bearerToken"; "Content-Type" = "application/json"}
$uri = "$DceURI/dataCollectionRules/$DcrImmutableId/streams/$StreamName`?api-version=2021-11-01-preview"
# Showing payload for troubleshooting purposes
Write-Debug ($payload | ConvertFrom-Json | ConvertTo-Json)
# Sending data to Data Collection Endpoint (DCE) -> Data Collection Rule (DCR) -> Azure Monitor table
Invoke-RestMethod -Uri $uri -Method "Post" -Body (@($payload | ConvertFrom-Json | ConvertTo-Json)) -Headers $headers | Out-Null
}
# Maximum size of API call: 1MB for both compressed and uncompressed data
$APILimitBytes = 1mb
# Official Azure Monitor Build-Int Table Schemas
$securityEventProperties=@("AccessMask","Account","AccountDomain","AccountExpires","AccountName","AccountSessionIdentifier","AccountType","Activity","AdditionalInfo","AdditionalInfo2","AllowedToDelegateTo","Attributes","AuditPolicyChanges","AuditsDiscarded","AuthenticationLevel","AuthenticationPackageName","AuthenticationProvider","AuthenticationServer","AuthenticationService","AuthenticationType","AzureDeploymentID","CACertificateHash","CalledStationID","CallerProcessId","CallerProcessName","CallingStationID","CAPublicKeyHash","CategoryId","CertificateDatabaseHash","Channel","ClassId","ClassName","ClientAddress","ClientIPAddress","ClientName","CommandLine","CompatibleIds","Computer","DCDNSName","DeviceDescription","DeviceId","DisplayName","Disposition","DomainBehaviorVersion","DomainName","DomainPolicyChanged","DomainSid","EAPType","ElevatedToken","ErrorCode","EventData","EventID","EventSourceName","ExtendedQuarantineState","FailureReason","FileHash","FilePath","FilePathNoUser","Filter","ForceLogoff","Fqbn","FullyQualifiedSubjectMachineName","FullyQualifiedSubjectUserName","GroupMembership","HandleId","HardwareIds","HomeDirectory","HomePath","InterfaceUuid","IpAddress","IpPort","KeyLength","Level","LmPackageName","LocationInformation","LockoutDuration","LockoutObservationWindow","LockoutThreshold","LoggingResult","LogonGuid","LogonHours","LogonID","LogonProcessName","LogonType","LogonTypeName","MachineAccountQuota","MachineInventory","MachineLogon","ManagementGroupName","MandatoryLabel","MaxPasswordAge","MemberName","MemberSid","MinPasswordAge","MinPasswordLength","MixedDomainMode","NASIdentifier","NASIPv4Address","NASIPv6Address","NASPort","NASPortType","NetworkPolicyName","NewDate","NewMaxUsers","NewProcessId","NewProcessName","NewRemark","NewShareFlags","NewTime","NewUacValue","NewValue","NewValueType","ObjectName","ObjectServer","ObjectType","ObjectValueName","OemInformation","OldMaxUsers","OldRemark","OldShareFlags","OldUacValue","OldValue","OldValueType","OperationType","PackageName","ParentProcessName","PasswordHistoryLength","PasswordLastSet","PasswordProperties","PreviousDate","PreviousTime","PrimaryGroupId","PrivateKeyUsageCount","PrivilegeList","Process","ProcessId","ProcessName","ProfilePath","Properties","ProtocolSequence","ProxyPolicyName","QuarantineHelpURL","QuarantineSessionID","QuarantineSessionIdentifier","QuarantineState","QuarantineSystemHealthResult","RelativeTargetName","RemoteIpAddress","RemotePort","Requester","RequestId","RestrictedAdminMode","RowsDeleted","SamAccountName","ScriptPath","SecurityDescriptor","ServiceAccount","ServiceFileName","ServiceName","ServiceStartType","ServiceType","SessionName","ShareLocalPath","ShareName","SidHistory","SourceComputerId","SourceSystem","Status","StorageAccount","SubcategoryGuid","SubcategoryId","Subject","SubjectAccount","SubjectDomainName","SubjectKeyIdentifier","SubjectLogonId","SubjectMachineName","SubjectMachineSID","SubjectUserName","SubjectUserSid","SubStatus","TableId","TargetAccount","TargetDomainName","TargetInfo","TargetLinkedLogonId","TargetLogonGuid","TargetLogonId","TargetOutboundDomainName","TargetOutboundUserName","TargetServerName","TargetSid","TargetUser","TargetUserName","TargetUserSid","TemplateContent","TemplateDSObjectFQDN","TemplateInternalName","TemplateOID","TemplateSchemaVersion","TemplateVersion","TimeGenerated","TokenElevationType","TransmittedServices","Type","UserAccountControl","UserParameters","UserPrincipalName","UserWorkstations","VendorIds","VirtualAccount","Workstation","WorkstationName")
$windowsEventProperties=@("Channel","Computer","EventData","EventID","EventLevel","EventLevelName","EventOriginId","ManagementGroupName","Provider","RawEventData","Task","TimeGenerated","Type")
$syslogProperties=@("Computer","EventTime","Facility","HostIP","HostName","ProcessID","ProcessName","SeverityLevel","SourceSystem","SyslogMessage","TimeGenerated","Type")
foreach ($dataset in $all_datasets){
$total_file_size = (get-item -Path $dataset).Length
$json_records = @()
$json_array_current_size = 0
$event_count = 0
$total_size = 0
# Create ReadLines Iterator and get total number of lines
$readLineIterator = [System.IO.File]::ReadLines($dataset)
$numberOfLines = [Linq.Enumerable]::Count($readLineIterator)
write-Host "*******************************************"
Write-Host "[+] Processing $dataset"
Write-Host "[+] Dataset Size: $($total_file_size/1mb) MBs"
Write-Host "[+] Number of events to process: $numberOfLines"
# Read each JSON object from file
foreach($line in $readLineIterator){
# Increase event number
$event_count += 1
# Update progress bar with current event count
if ($ShowProgressBar){ Write-Progress -Activity "Processing files" -status "Processing $dataset" -percentComplete ($event_count / $numberOfLines * 100) }
write-debug "############ Event $event_count ###############"
if ($TimestampField){
$TimeGenerated= $line | Convertfrom-json | Select-Object -ExpandProperty $TimestampField
}
else {
$TimeGenerated = Get-Date ([datetime]::UtcNow) -Format O
}
# Processing Log entry as a compressed JSON object
$pscustomobject = $line | ConvertFrom-Json
$pscustomobject | Add-Member -MemberType NoteProperty -Name 'TimeGenerated' -Value $TimeGenerated -Force
# Current properties of PSCustomObject
$currentEventProperties=Get-Member -InputObject $pscustomobject -MemberType NoteProperty
if ($TableName -eq 'SecurityEvent') {
# If Hostname is present, rename it to Computer
if ( $pscustomobject.psobject.properties.match('Hostname').Count ) {
$pscustomobject | Add-Member -MemberType NoteProperty -Name 'Computer' -Value $pscustomobject.Hostname -Force
}
# Validate schema
$allowedProperties = Compare-Object -ReferenceObject $securityEventProperties -DifferenceObject $currentEventProperties.name -PassThru -ExcludeDifferent -IncludeEqual
}
elseif ($TableName -eq 'WindowsEvent') {
# If Hostname is present, rename it to Computer
if ( $pscustomobject.psobject.properties.match('Hostname').Count ) {
$pscustomobject | Add-Member -MemberType NoteProperty -Name 'Computer' -Value $pscustomobject.Hostname -Force
}
# Validate EventData
if ( -not $pscustomobject.psobject.properties.match('EventData').Count ) {
$pscustomobject | Add-Member -MemberType NoteProperty -Name 'EventData' -Value $($line | ConvertTo-Json -Compress) -Force
}
# Add Type WindowsEvent
$pscustomobject | Add-Member -MemberType NoteProperty -Name 'Type' -Value 'WindowsEvent' -Force
# Validate schema
$allowedProperties = Compare-Object -ReferenceObject $windowsEventProperties -DifferenceObject $currentEventProperties.name -PassThru -ExcludeDifferent -IncludeEqual
}
else {
# Validate schema
$allowedProperties = Compare-Object -ReferenceObject $syslogProperties -DifferenceObject $currentEventProperties.name -PassThru -ExcludeDifferent -IncludeEqual
}
# Select only fields from the allowedProperties variable
$message = $pscustomobject | Select-Object -Property @($allowedProperties) | ConvertTo-Json -Compress
Write-Debug "Processing log entry: $($message.Length) bytes"
# Getting proposed and current JSON array size
$json_array_current_size = ([System.Text.Encoding]::UTF8.GetBytes(@($json_records | Convertfrom-json | ConvertTo-Json))).Length
$json_array_proposed_size = ([System.Text.Encoding]::UTF8.GetBytes(@(($json_records + $message) | Convertfrom-json | ConvertTo-Json))).Length
Write-Debug "Current size of JSON array: $json_array_current_size bytes"
if ($json_array_proposed_size -le $APILimitBytes){
$json_records += $message
$json_array_current_size = $json_array_proposed_size
write-debug "New size of JSON array: $json_array_current_size bytes"
}
else {
write-debug "Sending current JSON array before processing more log entries.."
Send-DataToDCE -payload $json_records -size $json_array_current_size
# Keeping track of how much data we are sending over
$total_size += $json_array_current_size
# There are more events to process..
write-debug "######## Resetting JSON Array ########"
$json_records = @($message)
$json_array_current_size = ([System.Text.Encoding]::UTF8.GetBytes(@($json_records | Convertfrom-json | ConvertTo-Json))).Length
Write-Debug "Starting JSON array with size: $json_array_current_size bytes"
}
if($event_count -eq $numberOfLines){
write-debug "##### Last log entry in $dataset #######"
Send-DataToDCE -payload $json_records -size $json_array_current_size
# Keeping track of how much data we are sending over
$total_size += $json_array_current_size
}
}
Write-Host "[+] Finished processing dataset"
Write-Host "[+] Number of events processed: $event_count"
Write-Host "[+] Total data sent: $($total_size/1mb) MBs"
write-Host "*******************************************"
}
} |