Skip to main content

Working with Collected Data

To leverage data collected with the add-on, you can do the following in Netwrix Auditor:

  • Search for required data. For that, start Netwrix Auditor client and navigate to Search. After specifying the criteria you need, click Search. You will get a list of activity records with detailed information on who did what in the reported time period.

You might want to apply a filter to narrow down your search results to the Netwrix API data source only.

Qumulo screen

  • Also, you can click Tools in the upper-right corner and select the command you need. For example:
    • If you want to periodically receive the report on the results of search with the specified criteria, click Subscribe. Then specify how you want the report to be delivered – as an email or as a file stored to the file share.
    • To create an alert on the specific occurrences, click Create alert.
    • To export filtered data to PDF or CSV, click Export data.
  • You can also configure and receive alerts on the events you are interested in.

Deployment Scenarios

The Add-On can run on any computer in your environment. For example, you can run the add-on on the computer where Auditor is installed, or on a remote server. Depending on the deployment scenario you choose, you will need to define a different set of parameters

Netwrix suggests the following scenarios:

ScenarioExample: Parameters updated in default settings.xml
The add-on runs on the Netwrix Auditor Server with the current user credentials.<Address>172.28.4.15</Address> <Address>172.28.3.18</Address>
The add-on runs on the Netwrix Auditor Server with the explicitly specified user credentials.<NetwrixAuditorUserName>SecurityOfficer </NetwrixAuditorUserName> <NetwrixAuditorPassword>NetwrixUser </NetwrixAuditorPassword> <Address>172.28.4.15</Address>
The add-on runs on a remote computer. Data is written to a remote Netwrix Auditor repository with the current user credentials. <NetwrixAuditorEndpoint> https://172.28.6.19:9699/netwrix/api/v1/activity_records</NetwrixAuditorEndpoint> <Address>172.28.4.15</Address>
The add-on runs on a remote computer. Data is written to a remote Netwrix Auditor repository with the explicitly specified user credentials. <NetwrixAuditorEndpoint> https://172.28.6.19:9699/netwrix/api/v1/activity_records</NetwrixAuditorEndpoint> <NetwrixAuditorUserName>NetwrixUser </NetwrixAuditorUserName> <NetwrixAuditorPassword>NetwrixIsCool </NetwrixAuditorPassword> <Address>172.28.4.15</Address>

For security reasons, Netwrix recommends running the script with current user credentials (skipping user credentials). Create a special user account with permissions to both Auditor data and event log and use it for running the script.

Monitoring Scope

Review a full list of all events Netwrix Auditor can collect on Qumulo Cluster.

EventDescription
fs_create_directoryA new directory was created.
fs_create_fileA new file was created.
fs_create_hard_linkA new hard link was created.
fs_createA filetype other than one of the types captured above was created.
fs_deleteAn entity (file, link, directory) was deleted from the file storage.
fs_renameAn entity (file, link, directory) from the file storage was renamed.
fs_read_dataRead operation was performed.
fs_write_dataWrite operation was performed.
fs_write_metadataWrite operation was performed (metadata was written).
nfs_create_exportCreated NFS Export that the client will mount to.
nfs_delete_exportRemoved NFS Export that the client will mount to.
nfs_modify_exportModified NFS Export that the client will mount to.
nfs_mountMount to NFS share.
replication_create_source_relationshipA replication object was created.
replication_delete_source_relationshipA replication object was deleted.
replication_modify_source_relationshipA replication object was modified.
smb_create_shareA new SMB file share was created.
smb_delete_shareAn SMB file share was deleted.
smb_modify_shareAn SMB file share was modified.
snapshot_create_snapshotA snapshot was created.
snapshot_delete_snapshotA snapshot was deleted.
snapshot_modify_snapshotA snapshot was modified.

Qumulo

Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security analytics to detect anomalies in user behavior and investigate threat patterns before a data breach occurs.

Qumulo Hybrid Cloud File Storage delivers real-time visibility, scale, and control of data across on-prem and cloud. Qumulo customers understand storage at a granular level; programmatically configure and manage usage, capacity, and performance; and are continuously delighted with new capabilities, 100% usable capacity and direct access to experts. More information at www.qumulo.com.

To control who does what in the IT infrastructure that includes Qumulo Hybrid Cloud File Storage, organizations need to monitor file-related activity. A typical case is when a user has renamed a directory at the top level, and other users are unable to locate their files anymore. Thus, IT specialists require a way to monitor, search and get notifications on certain file activity so that they can take corrective measures.

For that purpose, you can use a specially designed Netwrix Auditor add-on for Qumulo. It works in collaboration with Netwrix Auditor, supplying data about file operations on your Qumulo Cluster to Netwrix database. Aggregating data into a single audit trail simplifies analysis, makes activity monitoring more cost-effective, and helps you keep tabs on your IT infrastructure.

Major benefits:

  • Gain a high-level view of the data you store
  • Detect unauthorized activity that might threaten your data

How it Works

The add-on is implemented as a Syslog service that collects activity data from Qumulo Cluster and sends it to Auditor using the Integration API.

diagram_thumb_0_0

On a high level, the solution works as follows:

  1. An IT administrator configures the Integration API settings to enable data collection and storage to the Netwrix database for further reporting, search, etc.

    It is recommended to create a dedicated monitoring plan in Netwrix Auditor and add a dedicated item of Integration type to it — then you will be able to filter data in reports and search results by monitoring plan/item name.

  2. On the Qumulo side, the IT administrator prepares Syslog configuration settings.

  3. Then the administrator opens the settings.xml configuration file and specifies the necessary parameters for add-on operation, including Qumulo Cluster as the source of Syslog messages, Auditor settings, etc. The add-on will operate as a Syslog listener for the Qumulo Cluster.

  4. The add-on starts collecting and forwarding activity data: it listens to the specified TCP port and captures the designated Syslog messages. Data communication is performed using the TCP version of Syslog protocol.

  5. The add-on processes these Syslog messages into Auditor-compatible format (Activity Records). Each Activity Record contains the "Who-What-When-Where-Action" information (that is, initiator's account, time, action, and other details).

  6. Using the Integration API, the add-on sends the activity records to Auditor Server that writes them to the Netwrix_Auditor_API database (SQL server database) and file-based Long-Term Archive. Data is sent periodically, by default every 5 seconds. For more information on the Activity Record structure and capabilities of the Integration API, refer to the Integration API topic.

  7. Users open Auditor Client to work with collected data:

    • Search for file changes using certain criteria
    • Export data to PDF or CSV files
    • Save search results as reports
    • Subscribe to search results
    • Configure and receive alerts

Add-on Delivery Package

The add=on delivery package is a ZIP archive that includes the following files:

File nameDescription
install.cmdCommand file that installs and enables Netwrix Syslog service.
settings.xmlContains parameters for the add-on service operation.
SyslogService.exeThe Syslog service – main add-on component, implemented as a Syslog service.
SyslogService.exe.configAdd-on configuration data.

You will also need the qumulo.xml file that contains rules for processing Qumulo events. This file is shipped separately.

Prerequisites

Before running the add-on, ensure that all the necessary components and policies are configured as follows:

WherePrerequisite to check
The Auditor Server side- Auditor version is 9.96 or higher. - Integration API settings and Netwrix_Auditor_API database are configured properly. See Configure Integration API and Audit Database. - The TCP 9699 port must be open on Windows firewall for inbound connections. - User account under which data will be written to Netwrix_Auditor_API database requires the Contributor role in Netwrix Auditor. See Role-Based Access and Delegation. Alternatively, you can grant it the Global administrator role, or add that account to the Netwrix Auditor Administrators group.
The machine where the add-on will be installed- The TCP 9905 port must be open on Windows firewall for inbound connections. - .NET Framework 4.5 or later must be installed.
Qumulo ClusterQumulo core version 3.0.5.

Accounts and rights

It is recommended to create a dedicated account for running install.cmd and SyslogService.exe. The service will connect to Auditor Server using this account, so at least the Contributor role in Auditor is required for it. See Role-Based Access and Delegation for more information.

Considerations and limitations

  • For events received with NFS3 protocol, the posix uid will be displayed instead of the initiator's account name in the "Who" field of the Auditor search results and activity summaries.
  • If the initiator's account name could not be resolved, then Windows SID or Qumulo auth ID will be displayed in the the "Who" field of the search results and activity summaries.
  • Currently, not every detail about permission and attribute changes may be provided by Qumulo Cluster, so they cannot be reported by Auditor.
  • If the monitoring plan name in the add-on configuration parameter is specified incorrectly, this may lead to temp files generation and, therefore, to inefficient disk space usage.

Compatibility Notice

(Undefined variable: Add-on.Addon_Qumulo) is compatible with Qumulo core 3.0.5 and with Netwrix Auditor 9.96 and later.

Add-On Parameters

To configure the add-on parameters, you need to edit the settings.xml file in the add-on folder. You must define connection details: Netwrix Auditor Server host, user credentials, etc.

Most parameters are optional, the service uses the default values unless parameters are explicitly defined (<parameter>\*\*\_value_\*\*</parameter>). You can skip or define parameters depending on your execution scenario and security policies.

Parameters in settings.xml can be grouped as follows:

  • General parameters that affect add- on execution. They are listed in the table below.
  • Settings for a certain event source (within the Source section) that can override general settings.
  • Internal parameters that should not be modified in most cases. They are listed in .
ParameterDefault valueDescription
General parameters
ListenTcpPort9905Specify TCP port for listening incoming syslog events.
NetwrixAuditorEndpointhttps://localhost: 9699/netwrix/api/ v1/activity_recordsNetwrix Auditor Server IP address and port number followed by endpoint for posting Activity Records. Assumes that the add-on runs on the computer hosting Auditor Server and uses default port 9699. If you want to run the add-on on another machine, provide a name of the computer where Auditor Server resides (e.g., 172.28.6.15, EnterpriseNAServer, WKS.enterprise.local). To specify a non-default port, provide a server name followed by the port number (e.g., WKS.enterprise.local:9999). Do not modify the endpoint part (/netwrix/api . . . . )
NetwrixAuditor CertificateThumbprintNOCHECKNetwrix Auditor Certificate Thumbprint Property. Possible values: - Empty—Check Netwrix Auditor certificate via Windows Certificate Store. - AB:BB:CC.—Check Netwrix Auditor Server certificate thumbprint identifier. - NOCHECK—Do not check Netwrix Auditor certificate. Make sure to select this parameter if you plan to specify servers by their IP.
NetwrixAuditorUserNameCurrent user credentialsUnless specified, the add-on runs with the current user credentials. If you want the add-on to use another account to connect to Auditor Server, specify the account name in the DOMAIN\username format. The account must be assigned the Contributor role in Netwrix Auditor.
NetwrixAuditorUserPasswordCurrent user credentialsUnless specified, the service runs with the current user credentials. Provide a different password if necessary.
NetwrixAuditorDateTimeFormatyyyy-MM-ddTHH:mm:ssZNetwrix Auditor time format. By default, set to zero offset.
NetwrixAuditorPlanUnless specified, data is written to Netwrix_Auditor_API database and is not associated with a specific monitoring plan. Specify a name of associated monitoring plan in Auditor. In this case, data will be written to a database linked to this plan. If you select a plan name in the add-on, make sure a dedicated plan is created in Auditor, the Netwrix API data source is added to the plan and enabled for monitoring. Otherwise, the add-on will not be able to write data to the Audit Database.
NetwrixAuditorPlanItemUnless specified, data is not associated with a specific plan and, thus, cannot be filtered by item name. Specify an item name. Make sure to create a dedicated item in Netwrix Auditor in advance.
EventStorePathSelect where to store temporary files of syslog messages before the add-on sends them to Netwrix Auditor Server. Netwrix recommends not to store these files out of the service directory.
LogLevelerrorSpecify logging level: - none - info - warning - error (used by default) - debug
WriteCriticalIssues ToEventLog0Instructs the add-on to write important events (like service start or critical issue) not only to its own log but also to Netwrix event log. - 1=yes - 0=no (default)
Parameters within SourceList You can specify parsing rules for each specific event source and define parameters to override general settings, such as time zone, default plan name, etc.
NetwrixAuditorPlanWhen specified, overrides the general settings.
NetwrixAuditorPlanItemWhen specified, overrides the general settings.
DefaultTsTimezoneDefine the time zone of syslog events. By default, set to zero offset (UTC).
AppNameRegExpDefine a custom regular expression pattern to retrieve the application name from your syslog messages. Unless specified, RFC 3164/5424 format is used. If you provide a pattern for application name, this name will be used to determine what rule file will be used to parse syslog messages. The pattern you provide here must match the application name in your custom rule file.
AppNameGroupIDDefine application name value by Group ID only if messages are not formatted in accordance with RFC 3164/5424. Otherwise, leave the default value.
RuleFileList PathFilequmulo.xmlSpecify paths to XML file(s) with regular expression parsing rules. You can create a custom file or use rules provided out of the box. Currently, the qumulo.xml rules file is provided by Qumulo. You can specify several rule files. The service will check if the AppName parameter in the first rule file matches the AppNameRegExp and AppNameGroupID regular expression in this file. If not, the service will proceed to the next rule file.
AcceptList AddressSpecify a list of IP addresses of syslog events sources. The service will collect and process events from these sources only. Events collected from any other source will be ignored. The Address parameter may be followed by optional attributes that override parameters specified above: - naplan—A name of associated monitoring plan - naplanitem—A name of associated item - tstimezone—Timezone for Qumulo Cluster For example: <Address naplan="NFSmonitoring" naplanitem="NFS" tstimezone="GMT StandardTime">172.28.3.15 </Address>

After you modify parameters in the settings.xml file, remember to save the changes and then restart (Undefined variable: Add-on.Addon_Qumulo) service (SyslogService.exe) for them to take effect.

Add-on Internal Parameters

Internal parameters listed in the table below are intended for performance tuning. In most cases the default values should be used.

ParameterDefault valueDescription
EventsFromMemoryFirst1Instructs the add-on to save events to temporary storage only if there is no free space in queues: - 1=yes - 0=no
ConcurrentSend-1Specifies number of threads for concurrent forwarding of events to Auditor. Default value is -1 (switch off concurrent forwarding).
ListenTcpAddress0.0.0.0Defines destination IP address. In case of multiple network cards, you can specify certain IP address here to listen to its messages only.
SenderSleepTime30Specifies retry interval in seconds to send messages to Auditor (30 - 3600 seconds).
TaskLimit8Specifies number of threads and queues for concurrent handling of events.
QueueSizeLimit1000Specifies maximum number of events to keep in queue before saving to temporary storage or sending to Netwrix API.
QueueTimeLimit5Specifies the length of timeout before events from queue (not full) are saved to temporary storage or sent to Netwrix API: - From 5 to 300 — timeout in seconds. - -1 — disable timeout.

Maintenance and Troubleshooting

(Undefined variable: Add-on.Addon_Qumulo) operations are logged into the SyslogService.txt file. This file is located in the same folder as SyslogService.exe.

To change the add-on logging level, use the LogLevel parameter in the settings.xml file.

  • It is recommended that before the first run you set this parameter to debug. This will facilitate operations tracking and possible problem solving.
  • After that it is strongly recommended to re-set this parameter to error (default value) to prevent the uncontrolled log growth.

If you cannot see collected data in Netwrix Auditor, check the following:

  1. Service account has sufficient rights to access Netwrix Auditor.
  2. In Netwrix Auditor settings, go to the Integrations section and make sure the Leverage Integration API is switched to ON. Check the communication port number – default is 9699.
  3. If you configured a dedicated monitoring plan, make sure data source monitoring is enabled.
  4. Verify the parameters you provided in settings.xml.

Configure Core Audit for Qumulo File Servers

To configure your Qumulo file servers for auditing, you need to connect your device to Active Directory or LDAP (local names are supported) and then configure Remote Syslog Address and port number via Web UI.

To configure Core Audit for Qumulo file servers

  1. Log in to the Web UI.

  2. Navigate to Cluster and click Audit.

  3. Under the Configuration, provide the following:

    • Remote Syslog Address – Provide the IP address or the computer listened by Syslog. It should be a third-party Syslog forward service or the machine where Netwrix Auditor is installed.
    • Port Number – use the default value (514).

    qumulo_web_ui

When you see the green line “Connected”, the environment is ready.

For detailed information about Qumulo Web UI. refer to the following Qumulo how-to article: Qumulo Core Audit Logging.

Qumulo

Netwrix Auditor relies on native logs for collecting audit data. Therefore, successful change and access auditing requires a certain configuration of native audit settings in the audited environment and on the Auditor console computer. Configuring your IT infrastructure may also include enabling certain built-in Windows services, etc. Proper audit configuration is required to ensure audit data integrity, otherwise your change reports may contain warnings, errors or incomplete audit data.

CAUTION: Folder associated with Netwrix Auditor must be excluded from antivirus scanning. See the Antivirus Exclusions for Netwrix Auditor knowledge base article for additional information.

You can configure your IT Infrastructure for monitoring in one of the following ways:

  • Automatically through a monitoring plan – This is a recommended method. If you select to automatically configure audit in the target environment, your current audit settings will be checked on each data collection and adjusted if necessary.

  • Manually – Native audit settings must be adjusted manually to ensure collecting comprehensive and reliable audit data. You can enable Auditor to continually enforce the relevant audit policies or configure them manually:

Review a full list of object types Netwrix Auditor can collect on Qumulo network devices.

ActionFileFolderShare
Added++-
Add (failed attempt)++-
Modified++-
Modify (failed attempt)---
Moved++-
Move (failed attempt)---
Read++-
Read (failed attempt)---
Renamed++-
Rename (failed attempt)---
Removed++-
Remove (failed attempt)---
Copied---

NOTE: For Qumulo system Auditor displays the actual time when the event occurred. The 'When' column shows the time when the syslog message arrived.

If an object has been moved between file shares, the product reports the following actions:

  • Read + Removed for the initial object;

  • Added + Modified for the object to a new location.

Permissions for Qumulo Auditing

Before you start creating a monitoring plan to audit your Qumulo or Synology file servers, plan for the account that will be used for data collection – it should meet the requirements listed below. Then you will provide this account in the monitoring plan wizard (or monitored item settings).

Starting with version 9.96, you can use group Managed Service Accounts (gMSA) as data collecting accounts.

See the Use Group Managed Service Account (gMSA) topic and the Group Managed Service Accounts Overview Microsoft article for additional information.

These group Managed Service Accounts should meet the related requirements, as listed below.

On the target server:

  1. The account requires Read share permission on the audited shared folders.
  2. The account requires Read NTFS permission on all objects in the audited folders.