Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
54 commits
Select commit Hold shift + click to select a range
b73290e
Flatten the EPP documention and prepare the 2509 doc release.
jeremymoskowitz-netwrix Sep 11, 2025
1394c95
Sidebar change for complile.
jeremymoskowitz-netwrix Sep 12, 2025
c324a81
Added link to EPP 2509 release notes.
jeremymoskowitz-netwrix Sep 12, 2025
080ad7f
Fix broken links on the EPP index doc page
bturlea Sep 23, 2025
e893617
Merge branch 'dev' into feature/EPPDocsUpdate
bturlea Sep 23, 2025
d030948
Updated supportability dates
jeremymoskowitz-netwrix Sep 30, 2025
68f62f6
Updated customer first course recommendation
robin-stefani Oct 3, 2025
10283b1
Merge pull request #262 from netwrix/training-oct03
robin-stefani Oct 6, 2025
0eae84b
Delete docs/endpointpolicymanager/REORGANIZATION_NOTES.md
jeremymoskowitz-netwrix Oct 7, 2025
51b42b4
- Clarify .NET 4.8 requirements for upgrading to Netwrix Auditor v10.…
nwx-natew Oct 7, 2025
9da2778
- Clarify licensing format change beginning with Auditor 9.9.
nwx-natew Oct 7, 2025
f17da17
Add Auditor 10.8 to table.
nwx-natew Oct 7, 2025
f446cad
- Fix broken link in Upgrade Paths table to point to new link.
nwx-natew Oct 7, 2025
a4e17a3
Merge pull request #264 from nwx-natew/natew-na-upgrade-increments-2025
zoeycastillo Oct 7, 2025
52507c2
Merge pull request #263 from netwrix/jeremymoskowitz-netwrix-patch-1
bturlea Oct 8, 2025
3954069
Update configuring-the-netwrix-privilege-secure-rds-web-app-launcher.md
pasanillege Oct 9, 2025
ff9725d
Merge pull request #201 from netwrix/feature/EPPDocsUpdate
bturlea Oct 9, 2025
aecf272
Merge pull request #265 from pasanillege/patch-2
zoeycastillo Oct 9, 2025
f9c6972
add-on fixes for linux / privileged
TheNewCat777 Oct 13, 2025
0df25c6
Merge pull request #266 from netwrix/qc/ep/linux_addons_fix
TheNewCat777 Oct 13, 2025
fd3c6aa
404910 (#268)
Mburrofato Oct 14, 2025
4ff4ab1
404910 - Fixing formatting (#269)
Mburrofato Oct 14, 2025
3991ff5
reskin & docs fixes
AndreiSirbu Oct 14, 2025
3a33b68
Format updates in overview documentation.
nwx-natew Oct 14, 2025
9332b7e
Fix some grammatical and wording problems.
nwx-natew Oct 14, 2025
c63b2fc
Merge pull request #271 from netwrix/feature/as_docs_reskin_121158022…
TheNewCat777 Oct 14, 2025
06da9b6
Merge pull request #270 from nwx-natew/natew-na-requirements-corrections
TheNewCat777 Oct 14, 2025
89cf369
Update build-and-deploy.yml
jtviolet Oct 14, 2025
14e9246
Update build-and-deploy.yml
jtviolet Oct 14, 2025
f0a7432
Update build-and-deploy.yml
jtviolet Oct 14, 2025
03e8b85
Update package.json
jtviolet Oct 14, 2025
dfafaec
Update build-and-deploy.yml
jtviolet Oct 14, 2025
66ae1ea
Update build-and-deploy.yml
jtviolet Oct 14, 2025
2cbf744
Update build-and-deploy.yml
jtviolet Oct 14, 2025
1f4d1a7
updated favicon
AndreiSirbu Oct 15, 2025
4367f88
Merge pull request #274 from netwrix/feature/as_docs_reskin_121158022…
james-s-anderson Oct 15, 2025
a69be1a
Merge pull request #275 from netwrix/main
james-s-anderson Oct 15, 2025
cd6bd6e
fixed fonts
AndreiSirbu Oct 15, 2025
256a584
Merge pull request #277 from netwrix/feature/as_reskin
james-s-anderson Oct 15, 2025
c7630ba
"Claude PR Assistant workflow"
jtviolet Oct 15, 2025
1dda465
"Claude Code Review workflow"
jtviolet Oct 15, 2025
8b96017
Merge pull request #279 from netwrix/add-claude-github-actions-176053…
jtviolet Oct 15, 2025
5845ad4
Update-kb.yml
Oct 15, 2025
64eae05
Fixed "Error: Entra ID Replication Always Runs from Scratch Due to Do…
jake-mahon Oct 16, 2025
cba02ce
Merge pull request #281 from netwrix/zoey/kbupdate
jake-mahon Oct 16, 2025
1e9a6f9
Merge branch 'dev' into kb/fix-kA0Qk000000312nKAA
jake-mahon Oct 16, 2025
f4e374e
Merge pull request #282 from netwrix/kb/fix-kA0Qk000000312nKAA
jake-mahon Oct 16, 2025
ee84c9f
Add authentication example script
james-s-anderson Oct 17, 2025
39966e7
Merge pull request #286 from netwrix/changetracker/api-overview-fix
james-s-anderson Oct 17, 2025
75c883c
Resolve merge conflicts between dev and main
jake-mahon Oct 17, 2025
cb8cca0
fixed duplicated code
AndreiSirbu Oct 17, 2025
5606c7b
Merge pull request #287 from netwrix/resolve-pr-267-conflicts
AndreiSirbu Oct 17, 2025
aa445cb
Updated Password Secure additional training list and all customer / p…
robin-stefani Oct 17, 2025
9724261
Merge pull request #289 from netwrix/training-oct17
jake-mahon Oct 17, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@ packages
.env.development.local
.env.test.local
.env.production.local
.idea

# Claude settings
.claude/settings.local.json
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -182,8 +182,12 @@ While the Registry Data Collector typically requires Domain Administrator permis
a domain controller, that level of access is not required to run the 5.Domains > 0.Collection >
AD_DSRM Job. The minimum requirements for running this job are:

- Requires read access to the following Registry key and its children:
- Requires read access to the following Registry key and its children:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg

Alternatively, granting access to the Server Operators group also allows read-only access to the Lsa key, just requiring access added to the winreg key.

**AD_TimeSync Job Permissions**

Expand All @@ -192,7 +196,11 @@ a domain controller, that level of access is not required to run the 5.Domains >
AD_TimeSync Job. The minimum requirements for running this job are:

- Requires Read access to the following Registry keys and its children:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg

Alternatively, granting access to the Network Configuration Operators group also allows read-only access to the W32Time key, just requiring access added to the winreg key.

**AD_DomainInfo Job Permissions**

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -182,8 +182,12 @@ While the Registry Data Collector typically requires Domain Administrator permis
a domain controller, that level of access is not required to run the 5.Domains > 0.Collection >
AD_DSRM Job. The minimum requirements for running this job are:

- Requires read access to the following Registry key and its children:
- Requires read access to the following Registry key and its children:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg

Alternatively, granting access to the Server Operators group also allows read-only access to the Lsa key, just requiring access added to the winreg key.

**AD_TimeSync Job Permissions**

Expand All @@ -192,7 +196,11 @@ a domain controller, that level of access is not required to run the 5.Domains >
AD_TimeSync Job. The minimum requirements for running this job are:

- Requires Read access to the following Registry keys and its children:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg

Alternatively, granting access to the Network Configuration Operators group also allows read-only access to the W32Time key, just requiring access added to the winreg key.

**AD_DomainInfo Job Permissions**

Expand Down
127 changes: 104 additions & 23 deletions docs/auditor/10.8/addon/linux/overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,38 +6,119 @@ sidebar_position: 120

# Linux Generic Syslog

The add-on works in collaboration with Netwrix Auditor, supplying data about activity on your
Linux-based devices. Aggregating data into a single audit trail simplifies analysis, makes activity
monitoring more cost effective, and helps you keep tabs on your IT infrastructure.
The add-on works in collaboration with Netwrix Auditor, supplying data about activity on your Linux-based devices. Aggregating data into a single audit trail simplifies analysis, makes activity monitoring more cost effective, and helps you keep tabs on your IT infrastructure.

Implemented as a service, this add-on facilitates the data transition from Linux-based systems to
Netwrix Auditor. All you have to do is provide connection details and specify parsing rules.
Implemented as a service, this add-on facilitates the data transition from Linux-based systems to Netwrix Auditor. All you have to do is provide connection details and specify parsing rules.

On a high level, the add-on works as follows:

**Step 1 –** The add-on listens to the specified UDP ports and captures designated Syslog messages.
**Step 1** – The add-on listens to the specified UDP ports and captures designated Syslog messages.

**Step 2 –** Out of the box, messages from Red Hat Enterprise Linux 7 and 6, SUSE Linux Enterprise
Server 12, openSUSE42, and Ubuntu 16 are supported. For other distributions, deployment of the
rsyslog package may be required. You can edit the add-on configuration to extend the captured
message list.
**Step 2** – Out of the box, messages from Red Hat Enterprise Linux 6, 7, 8, 9, SUSE Linux Enterprise Server 12, openSUSE 42, and Ubuntu 16 are supported. For other distributions, deployment of the rsyslog package may be required. You can edit the add-on configuration to extend the captured message list.

**Step 3 –** The add-on processes these events into Netwrix Auditor-compatible format (Activity
Records). Each Activity Record contains the user account, action, time, and other details.
**Step 3** – The add-on processes these events into Netwrix Auditor-compatible format (Activity Records). Each Activity Record contains the user account, action, time, and other details.

**Step 4 –** Using the Integration API, the add-on sends the activity records to the Netwrix Auditor
Server, which writes them to the Long-Term Archive and the Audit Database.
**Step 4** – Using the Integration API, the add-on sends the activity records to the Netwrix Auditor Server, which writes them to the Long-Term Archive and the Audit Database.

See the [Integration API](/docs/auditor/10.8/api/overview.md) topic for additional information on the structure
of the Activity Record and the capabilities of the NIntegration API.
See the [Integration API](/docs/auditor/10.8/api/overview.md) topic for additional information on the structure of the Activity Record and the capabilities of the Integration API.

## Prerequisites

Before running the add-on, ensure that all the necessary components and policies are configured as
follows:
Before running the add-on, ensure that all the necessary components and policies are configured as follows:

| On... | Ensure that... |
| ----------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| The Netwrix Auditor Server side | - The Audit Database settings are configured in Auditor Server. - The TCP **9699** port (default Auditor Integration API port) is open for inbound connections. - The user retrieving data from the Audit Database is granted the Contributor role in Auditor. Alternatively, you can grant the Global administrator role or add the user to the Netwrix Auditor Administrators group. In this case, this user will have the most extended permissions in the product. |
| The computer where the add-on will be installed | - The UDP 514 port is open for inbound connections. **CAUTION:** UPD 514 port can only be used by one service, otherwise the following error will occur: [ERROR] Error occurred when starting the syslog udp listener. Only one usage of each socket address (protocol/network address/port) is normally permitted - .Net Framework [3.5 SP1](http://www.microsoft.com/en-us/download/details.aspx?id=22), [4.0](https://www.microsoft.com/en-us/download/details.aspx?id=17851), [4.5](https://www.microsoft.com/en-us/download/details.aspx?id=30653), or [4.6](https://www.microsoft.com/en-us/download/details.aspx?id=48130) is installed. |
| On the target syslog-based platform | Outbound UDP 514 port must be enabled. The **Syslog daemon** must be configured to redirect events. The procedure below explains how to configure redirection. **NOTE:** Red Hat Enterprise Linux 7 and 6, SUSE Linux Enterprise Server 12, openSUSE 42, and Ubuntu 16 are supported out of the box. For other distributions, deployment of the rsyslog package may be required. - On Red Hat Enterprise Linux 7, perform the following steps: **Step 5 –** Open the **/ etc/ rsyslog.conf** file. **Step 6 –** Add the following line: `auth.*;authpriv.* @name:514;RSYSLOG_SyslogProtocol23Format` where **name** is a FQDN, Net BIOSname or IP address of the computer where Netwrix Auditor Server is installed. For example: `auth.*;authpriv.* @172.28.18.25:514;RSYSLOG_SyslogProtocol23Format` **Step 7 –** Launch the **RHEL console** and execute the following command: `service rsyslog restart` - On Ubuntu 16, perform the following steps: **Step 1 –** Navigate to the **/ etc/ rsyslog.d/ 50-default.conf** file. **Step 2 –** Add the following line: `auth.*;authpriv.* @name:514;RSYSLOG_SyslogProtocol23Format` where **name** is a FQDN, Net BIOSname or IP address of the computer where Netwrix Auditor Server is installed. For example: `auth.*;authpriv.* @172.28.18.25:514;RSYSLOG_SyslogProtocol23Format` **Step 3 –** Launch the **UBUNTU console** and execute the following command: `service rsyslog restart` |
### The Netwrix Auditor Server side

- The Audit Database settings are configured in Auditor Server.
- The TCP **9699** port (default Auditor Integration API port) is open for inbound connections.
- The user retrieving data from the Audit Database is granted the Contributor role in Auditor. Alternatively, you can grant the Global administrator role or add the user to the Netwrix Auditor Administrators group. In this case, this user will have the most extended permissions in the product.
- The UDP **514** port is open for inbound connections.

**CAUTION:** UDP 514 port can only be used by one service, otherwise the following error will occur:

```
[ERROR] Error occurred when starting the syslog udp listener. Only one usage of each socket address (protocol/network address/port) is normally permitted
```

- .NET Framework [4.7.2](https://www.microsoft.com/en-us/download/details.aspx?id=48130) is installed.

### On the target syslog-based platform

- Outbound UDP **514** port must be enabled.
- The **Syslog daemon** must be configured to redirect events. The procedure below explains how to configure redirection.

**NOTE:** The deployment of the rsyslog package may be required.

#### Configuration for RHEL 6-8 Linux Server

**Step 1** – Ensure that rsyslog is installed. If not, install it using the following command:

```bash
sudo yum install rsyslog
```

**Step 2** – Open the `/etc/rsyslog.conf` file.

**Step 3** – Add the following line:

```
auth.*;authpriv.* @name:514;RSYSLOG_SyslogProtocol23Format
```

where **name** is a FQDN, NetBIOS name or IP address of the computer where Netwrix Auditor Server is installed.

For example:

```
auth.*;authpriv.* @172.28.18.25:514;RSYSLOG_SyslogProtocol23Format
```

**Step 4** – Save the file and restart the rsyslog service:

```bash
sudo service rsyslog restart
```

To verify the service is running:

```bash
sudo service rsyslog status
```

#### Configuration for Ubuntu and RHEL 9+

**Step 1** – Ensure that rsyslog is installed. If not, install it using the appropriate command:

For Ubuntu/Debian:

```bash
sudo apt-get update
sudo apt-get install rsyslog
```

For RHEL 9+:

```bash
sudo dnf install rsyslog
```

**Step 2** – Navigate to the `/etc/rsyslog.d/50-default.conf` file.

**Step 3** – Add the following line:

```
auth.*;authpriv.* @name:514;RSYSLOG_SyslogProtocol23Format
```

where **name** is a FQDN, NetBIOS name or IP address of the computer where Netwrix Auditor Server is installed.

For example:

```
auth.*;authpriv.* @172.28.18.25:514;RSYSLOG_SyslogProtocol23Format
```

**Step 4** – Save the file and restart the rsyslog service:

```bash
sudo systemctl restart rsyslog
```
Loading
Loading