Skip to main content
Skip table of contents

NDR: Integration Guide - Windows Servers

Description

The Windows Server Sensor (agent) runs as a Windows service in a compatible Windows Server system. The Server Sensor observes events within the Windows Server system and sends Interflow data records to the data processor.

The captured events are:

  • Hardware

  • Security

  • System

  • Windows Firewall

  • Windows Defender

  • PowerShell

  • File Integrity Monitoring (if enabled in the Sensor Profile)

The Windows Server Sensor provides the following key capabilities:

  • If the sensor has coverage over the domain controller, Stellar Cyber enriches data with the relationship between users and IP addresses.

  • If the sensor has coverage over the DHCP server, Stellar Cyber sees the relationship between hostnames and IP addresses, and so can track assets when the IP address changes.

  • Windows Server Sensor provides the data foundation for Stellar Cyber's machine learning alerts that use the Windows Events index.

    Although you can also provide coverage of Windows logs using other visibility tools such as the ManageEngine Log Collector or Winlogbeat, the logs provided by these tools are not normalized, enriched, and stored in the Windows Events index used for machine learning alert generation (except for ManageEngine ADAudit Plus logs) and cannot be used for machine learning alert generation.

    In addition, the Windows Server Sensor provides the following advantages over alternative solutions:

    • Windows Server Sensor provides easier deployment and maintenance.

    • Windows Server Sensor provides granular filtering at the edge through the Stellar Cyber user interface.

    • By using the Windows Server Sensor, you do not need to deploy another modular sensor to forward logs from ManageEngine or Winlogbeat.


*** PLEASE PLEASE PLEASE read the instructions and pay attention to any bold, colored, outlined or other text within boxes like this!!! ***

Text that is bold, colored, outlined, or within a box like the above is important. This is done as most of the time it will answer commonly asked questions or is information critical to the configuration. Failure to pay attention to this might result in the configuration not working or other delays in your implementation.


Information

Windows Server Sensor Processes

The Windows Server Sensor launches the following processes:

Name in Task Manager

Name in Services App

Description

aella_conf_win_srv.exe

Windows Agent Sensor Conf

Handles Windows Server Sensor configuration

aella_ctrl_win_srv.exe

Windows Agent Sensor Ctrl

Monitors other services, and can stop or start them based on the configuration

aella_diagnostics_win_srv.exe

Windows Agent Sensor Phonehome

Sends Windows Server Sensor logs to DP

aella_winlog.exe

Windows Agent Sensor Logbeat

Sends Windows events to DP

aella_filebeat.exe

Windows Agent Sensor Filebeat

Sends log files from Windows DHCP server (if installed and running) to DP

aella_fim.exe

Windows Agent Sensor FIM

Provides file integrity monitoring services, as configured in the Sensor Profile

Exclude Server Sensor from AV/EDR Scanning

Stellar Cyber recommends that you prevent potential conflicts by configuring any anti-virus or EDR software installed on the same host as the Server Sensor to exclude the Server Sensor installation directories from scanning. The directories to exclude are as follows:

Server Sensor Type

Folders/Files to Exclude from AV/EDR Scanning

Windows

C:\ProgramData\Stellarcyber

C:\Program Files\Aella

C:\Windows\Stellar_syswatcher.exe (sensors running pre-4.2.2 versions)

Possible False Positives from FireEye PROCGUARD

During installation of the Windows Server Sensor, it is possible that FireEye PROCGUARD may report the following alert – Attempted LSASS access by aella_conf_win_srv.exe detected. After investigation, Stellar Cyber has determined that this is a false positive and that the aella_conf_win_srv.exe service does not interact with C:\\Windows\\system32\\lsass.exe on the host machine.

About Sysmon in this Release

Unlike previous Window Server Sensor releases, releases from 4.2.2 onwards do not download and install the stellar_syswatcher (Microsoft Sysmon64) service due to potential system crashes in certain older operating systems (Windows 2008R2 and 2012, although possibly others).

Note the following:

  • Upgrades of Windows Server Sensors leave the existing version of stellar_syswatcher intact and do not upgrade it. You can continue to use the existing Sysmon service safely.

  • You can install the latest version of Sysmon (v13.31 at this writing) manually if you want the Windows Server Sensor to report Sysmon events to the DP. This is recommend for improving visibility on Windows systems. However, Stellar Cyber strongly recommends that you test your installation in a non-production environment to verify operations before moving to production.

Supported Systems

The Windows Server Sensor is supported on Windows Server 2008 R2 and later. The Server Sensor is only available in 64-bit.

 When the system sleeps, the connection drops, and no data is collected. The connection is re-established when the system wakes. To avoid this, configure Windows to Never sleep.

The host Windows Server into which the Windows Server Sensor is installed must meet the following minimum requirements, regardless of whether it is a physical or virtual server:

Component

Specification

Host CPU

Xeon Core 2 virtual cores (2.0 GHz or more)

Host RAM (GB)

8

Host SSD (GB)

128

OS

Windows Server 2008 R2 (or later)

Update Windows Server Software Before Installing Windows Server Sensor

It's a good idea to use Windows Update to make sure your Windows Server software is up to date before installing the Windows Server Sensor. For example:

  • The Windows Server Sensor software includes the AI_ChainedPackageFile.vc_redist.x64.exe redistributable from Microsoft. Successful installation of this redistributable requires the following prerequisites from Microsoft, installed either in the order below or as part of a standalone package (KB2919355 is a prerequisite of KB2999226).

    1. KB2919355

    2. KB2999226

PowerShell Requirements for 4.3.x Releases

Depending on the Windows Server Sensor version you are installing or upgrading to, PowerShell may or may not be required:

  • Starting with the 4.3.4 release, PowerShell is no longer required for Windows Server Sensor installs or upgrades.

    • You can perform a clean installation of the 4.3.4+ Windows Server Sensor on a target system without PowerShell installed.

    • The 4.3.1, 4.3.2, and 4.3.3 versions are all supported for direct upgrades to 4.3.4+. Each of these versions required PowerShell for its initial installation. You can still upgrade these versions directly to 4.3.4+ even if PowerShell was removed after the 4.3.1/4.3.2/4.3.3 sensor was installed.

    • If you must perform an interim upgrade to a pre-4.3.4 version before upgrading to 4.3.4+, PowerShell must remain installed until the version to which you are upgrading no longer requires it (4.3.4 and later)

  • For all pre-4.3.4 versions, the host Windows Server must be running PowerShell 2.0 or greater. In nearly all cases, a supported Window Server version will already have a version of PowerShell installed by default that meets this requirement. If for some reason, however, your Windows Server is not running PowerShell 2.0 or greater (for example, due to a Windows Group Policy Objects exclusion), the Server Sensor installation will fail with details in the installation logs.


Step 1: Firewall Configuration

The Linux Server Agent requires specific ports & URLs to be open on your firewall for outbound communication:

Port

Protocol

Explanation

53

TCP & UDP

For DNS resolution

123

UDP

For NTP synchronization

6640-6648

TCP

For communicating with the DP

8443

TCP

For software and file downloads from the DP

8888-8889

TCP

Receiver ports for communicating with the data analyzer


Step 2: Server Configuration

Obtaining the Windows Server Sensor Installer

The Server Sensor is distributed as an MSI file.

The software can be downloaded from the production server directly by using the following URL.

Agent Installation

Windows Server Agent Installation

Use the following procedure to install the Windows Server Sensor after you download the msi file:

  • During the installation, a Windows command prompt window may appear. Do not close this window manually – the installation wizard closes it automatically when the installation is complete.

  • To avoid installation issues, complete any pending updates for the host Windows machine before upgrading the Server Sensor.

  1. Open the Downloads folder.

  2. Right-click the msi file.

  3. Select Properties. The Properties window opens.

  4. Click Unblock in the Security section. Some Windows systems automatically block files you download.

  5. Click OK.

  6. Double-click the msi file to open it and start the installation. If you see a dialog box asking you to verify that you want to run this file, click Run.

    image-20240513-140209.png

  7. Choose the path for the agent installation when prompted by the installer.

    The only supported path is C:\Program Files\Aella. An error message occurs if you try to install at a different path.

  8. Use the screen below to configure the following agent options when prompted by the installer. Note that any options you don't specify in the dialog box can be set later on from the Server Sensor CLI:

    • CM Address:

      1. NOAM Console: cm-solutionsgrantedinc.stellarcyber.cloud

      2. EMEA Console: cm-emea-snwl.stellarcyber.cloud

    • Tenant ID: If this sensor is to be assigned to a tenant, you can specify the Tenant's ID here.

    • Primary Aggregator: None

    • Secondary Aggregator: None

      The wizard does not prevent you from specifying a Secondary Aggregator if the Primary Aggregator is left empty. However, a Secondary Aggregator specified without a Primary Aggregator is ignored and not applied to the installation.

      image-20240918-161628.png
  9. The installer installs the Server Sensor. When complete, the Server Sensor is installed as a service.

To verify the installation:

  1. Open the Services app.

  2. Look for Windows Agent Sensor Ctrl.

    image-20240513-140245.png

Configuring the Server Sensor in the CLI

The Server Sensor installation wizard provides you with the ability to configure the IP address of the sensor's CM (Data Processor) and its tenant assignment, if any. If you did not set these options from the installation wizard, you can do so using the Server Sensor's CLI.

To run the Server Sensor's CLI, find the Windows Agent Sensor Command Line Interface entry in the Windows Start Menu. If it does not appear at first, use the Find function.

After starting the Windows Server Sensor CLI, a terminal window appears as below. This window lets you enter CLI commands to the Server Sensor. Enter the show version command to verify the functioning of the sensor.

  • In response, the sensor displays output similar to the following:

    image-20240513-140315.png

Use the CLI to configure the following settings:

  1. If the sensor is to be assigned to a tenant and you didn't specify the ID in the installation wizard, enter the command set tenant_id <tenant-id> where the <tenant-id> is replaced by the tenant ID.

  2. Enter show cm to see if the DP's address is already configured. If it is not, use the set cm <ip-addr> command to specify the IP address the agent uses to reach the management interface of the Data Processor. For a DP cluster, this is the IP address of the DL-master's management interface. For a single DP deployment, this is simply the DP's management IP address. You can supply either an IP address or a DNS name for the <ip-addr>.

  3. If the sensor has coverage over the DHCP server, you can send the DHCP server logs to a device sensor with the log forwarder feature enabled so that they can be used to enrich assets with DHCP data. Use the following command to forward DHCP logs to a specified device sensor:

    set dhcp_log enable ip <sensor ip address>

    For the <sensor ip address>, supply the IP address of a device sensor (Network, Security, or Modular) with the log forwarder feature enabled in its sensor profile.

  4. Verify the data entry with the show version command.

  5. Enter the quit command to close the CLI.


Step 3: Data Verification

Once the agent is installed:

  1. Reply to your ticket with the server’s Hostname and IP address (private) of the server so it can be authorized and have the correct profile applied.


Uninstalling the Server Sensor

Stellar Cyber recommends that you remove the Windows Server Sensor using the Change button in the Programs and Features control panel instead of the Uninstall button.

Using the Change button gives you access to the following additional uninstall options that ensure the program and all its data are removed completely:

  • Remove Data Files

  • Remove Scheduler Task

If you are planning on reinstalling a 4.2.2+ Windows Server Sensor, Stellar Cyber recommends that you leave these items unchecked.

If you want to uninstall completely, you should check these boxes.

During the uninstallation, a Windows command prompt window may appear. Do not close this window manually – it closes automatically when the uninstallation is complete.



Information & Recommendations provided for reference only. By using any information provided, you are agreeing to our Terms and Conditions.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.