Before you get started
Before beginning the integration, you will need to deploy a log collector within the same network as the devices you're deploying Winlogbeat to.
To initiate the collector deployment process, please reach out to our Technical Support team, who'll provide you with a deployment pack that includes all the software and scripts needed to configure this. This pack will also contain a folder called winlogbeat, which is needed to complete the steps included in this guide.
If you already have a log collector deployed, please follow the steps outlined below.
Installing Winlogbeat
Extract the winlogbeat folder from the deployment pack to a location on your Windows server
In PowerShell, navigate to the winlogbeat folder and run the following command to start the installation:
.\winlogbeat-install.ps1If script execution is disabled on your system, run the command below to change the execution policy and allow the script to run:
Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope ProcessWinlogbeat will then be downloaded, installed and configured.
Confirming log flow
Once the above steps are complete, your device will now ship logs to our SIEM platform via your collector. You can confirm logs are successfully reaching our SIEM by either.
Navigating to the Log Search feature in Defense.com by browsing to SIEM > Log Search and then filtering the logs by
type:"winlogbeat"Reaching out to our Technical Support team, who'll be able to check and confirm this for you
And that's it! You've successfully installed Winlogbeat🎉
