Collect ManageEngine AD360 logs

Supported in:

This document explains how you can ingest ManageEngine AD360 logs to Google Security Operations using Bindplane. The parser first cleans up and prepares the incoming log data and then uses a series of grok patterns to extract relevant fields based on specific event types and message formats. After extraction, the code maps the extracted fields to the Unified Data Model (UDM), handles specific data transformations, and enriches the data with additional context like geolocation and security severity.

Before you begin

Make sure you have the following prerequisites:

  • Google SecOps instance
  • Windows 2016 or later, or a Linux host with systemd
  • If running behind a proxy, firewall ports are open
  • Privileged access to ManageEngine AD360

Get Google SecOps ingestion authentication file

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Collection Agents.
  3. Download the Ingestion Authentication File. Save the file securely on the system where Bindplane will be installed.

Get Google SecOps customer ID

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Profile.
  3. Copy and save the Customer IDfrom the Organization Detailssection.

Install the Bindplane agent

Install the Bindplane agent on your Windows or Linux operating system according to the following instructions.

Windows installation

  1. Open the Command Promptor PowerShellas an administrator.
  2. Run the following command:

      msiexec 
      
     / 
     i 
      
     "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" 
      
     / 
     quiet 
     
    

Linux installation

  1. Open a terminal with root or sudo privileges.
  2. Run the following command:

     sudo  
    sh  
    -c  
     " 
     $( 
    curl  
    -fsSlL  
    https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh ) 
     " 
      
    install_unix.sh 
    

Additional installation resources

For additional installation options, consult the installation guide .

Configure the Bindplane agent to ingest Syslog and send to Google SecOps

  1. Access the configuration file:
    • Locate the config.yaml file. Typically, it's in the /etc/bindplane-agent/ directory on Linux or in the installation directory on Windows.
    • Open the file using a text editor (for example, nano , vi , or Notepad).
  2. Edit the config.yaml file as follows:

      receivers 
     : 
      
     udplog 
     : 
      
     # Replace the port and IP address as required 
      
     listen_address 
     : 
      
     "0.0.0.0:514" 
     exporters 
     : 
      
     chronicle/chronicle_w_labels 
     : 
      
     compression 
     : 
      
     gzip 
      
     # Adjust the path to the credentials file you downloaded in Step 1 
      
     creds_file_path 
     : 
      
     '/path/to/ingestion-authentication-file.json' 
      
     # Replace with your actual customer ID from Step 2 
      
     customer_id 
     : 
      
    < customer_id 
    >  
     endpoint 
     : 
      
     malachiteingestion-pa.googleapis.com 
      
     # Add optional ingestion labels for better organization 
      
     ingestion_labels 
     : 
      
     log_type 
     : 
      
     'MANAGE_ENGINE_AD360' 
      
     raw_log_field 
     : 
      
     body 
     service 
     : 
      
     pipelines 
     : 
      
     logs/source0__chronicle_w_labels-0 
     : 
      
     receivers 
     : 
      
     - 
      
     udplog 
      
     exporters 
     : 
      
     - 
      
     chronicle/chronicle_w_labels 
     
    
    • Replace the port and IP address as required in your infrastructure.
    • Replace <customer_id> with the actual customer ID.
    • Update /path/to/ingestion-authentication-file.json to the path where the authentication file was saved in the Get Google SecOps ingestion authentication file section.

Restart the Bindplane agent to apply the changes

  • To restart the Bindplane agent in Linux, run the following command:

     sudo  
    systemctl  
    restart  
    bindplane-agent 
    
  • To restart the Bindplane agent in Windows, you can either use the Servicesconsole or enter the following command:

     net stop BindPlaneAgent && net start BindPlaneAgent 
    

Configure ManageEngine AD360 Syslog Export

  1. Sign in to the AD360web UI.
  2. Go to Admin > Administration > SIEM Integration.
  3. Click the Configure Nowlink beside the ADSelfServicecomponent.
  4. Provide the following configuration details:
    • Server Type: Select Syslog.
    • Server Name/IP: Enter the Bindplane agent IP Address.
    • Port: Enter the Bindplane agent port number.
    • Protocol: Select UDP.
    • Syslog Standard: Select RFC5 424.
    • Click the Advancedlist.
    • Severity: Select Informational.
  5. Click Configureto save.

UDM mapping table

Log Field UDM Mapping Logic
AccessControlRuleName
security_result.rule_name Value taken from the field AccessControlRuleName if exists, else from the field rule_name
ACPolicy
security_result.rule_labels.value Value taken from the field ACPolicy
action
security_result.action_details Directly mapped to UDM
action_id
security_result.detection_fields.value Value taken from the field action_id
application_protocol
network.application_protocol Directly mapped to UDM
bytes
network.sent_bytes Directly mapped to UDM
client_ip
principal.ip Directly mapped to UDM
ConnectionID
network.session_id Value taken from the field connection_id if exists, else from the field ConnectionID , else from the field ses
destination_ip
target.ip Directly mapped to UDM
destination_port
target.port Directly mapped to UDM
DeviceUUID
target.asset_id Value taken from the field DeviceUUID if exists, else from the field distinguished_name_device_id
distinguished_name_device_id
target.asset_id Value taken from the field DeviceUUID if exists, else from the field distinguished_name_device_id
distinguished_name_user
target.user.userid Directly mapped to UDM
DST
target.ip Value taken from the field DST if exists, else from the field DstIP
DPT
target.port Value taken from the field DPT if exists, else from the field DstPort , else from the field destination_port
DstIP
target.ip Value taken from the field DST if exists, else from the field DstIP
DstPort
target.port Value taken from the field DPT if exists, else from the field DstPort , else from the field destination_port
EgressInterface
additional.fields.value.string_value Directly mapped to UDM
EgressZone
target.location.name Directly mapped to UDM
EventPriority
security_result.severity Mapped to different severity levels based on the value of EventPriority field.
exe
principal.process.command_line Directly mapped to UDM
geoip.city_name
principal.location.city Directly mapped to UDM
geoip.country_name
principal.location.country_or_region Directly mapped to UDM
geoip.latitude
principal.location.region_latitude Directly mapped to UDM
geoip.longitude
principal.location.region_longitude Directly mapped to UDM
http_status
network.http.response_code Directly mapped to UDM
id
metadata.product_log_id Directly mapped to UDM
IngressInterface
additional.fields.value.string_value Directly mapped to UDM
IngressZone
principal.location.name Directly mapped to UDM
LEN
additional.fields.value.string_value Directly mapped to UDM
message_number
Not Mapped
NAPPolicy
security_result.rule_labels.value Value taken from the field NAPPolicy
network_direction
network.direction Directly mapped to UDM
OUT
additional.fields.value.string_value Directly mapped to UDM
pid
target.process.pid Directly mapped to UDM
ppid
target.process.parent_process.pid Directly mapped to UDM
PREC
additional.fields.value.string_value Directly mapped to UDM
principal_hostname
principal.hostname Directly mapped to UDM
product_event_type
metadata.product_event_type Directly mapped to UDM
protocol
network.ip_protocol Used to populate the PROTO field and then mapped to UDM using a lookup table.
PROTO
network.ip_protocol Mapped to UDM using a lookup table based on the protocol number.
request_method
network.http.method Directly mapped to UDM
rule_name
security_result.rule_name Value taken from the field AccessControlRuleName if exists, else from the field rule_name
ses
network.session_id Value taken from the field connection_id if exists, else from the field ConnectionID , else from the field ses
source_ip
principal.ip Directly mapped to UDM
source_port
principal.port Directly mapped to UDM
SPT
principal.port Value taken from the field SPT if exists, else from the field SrcPort , else from the field source_port
SRC
principal.ip Value taken from the field SRC if exists, else from the field SrcIP , else from the field client_ip
SrcIP
principal.ip Value taken from the field SRC if exists, else from the field SrcIP , else from the field client_ip
SrcPort
principal.port Value taken from the field SPT if exists, else from the field SrcPort , else from the field source_port
timestamp
metadata.event_timestamp Directly mapped to UDM
TOS
additional.fields.value.string_value Directly mapped to UDM
TTL
additional.fields.value.string_value Directly mapped to UDM
URL
target.url Directly mapped to UDM
user_agent
network.http.user_agent Directly mapped to UDM
WINDOW
additional.fields.value.string_value Directly mapped to UDM
metadata.vendor_name Value is hardcoded to MANAGE_ENGINE_AD360
metadata.product_name Value is hardcoded to MANAGE_ENGINE_AD360
metadata.log_type Value is hardcoded to MANAGE_ENGINE_AD360
metadata.event_type Value set to NETWORK_CONNECTION if both SRC and DST fields are present, else set to STATUS_UPDATE if either SRC or principal_hostname is present. If none of these conditions are met, it defaults to GENERIC_EVENT .

Need more help? Get answers from Community members and Google SecOps professionals.

Design a Mobile Site
View Site in Mobile | Classic
Share by: