3. How to Configure Event Forwarding in Workgroup Environments
Typically, event forwarding is required only in large environments that use AD DS domains.
However, you can also configure event forwarding in workgroup environments. The process is very similar to that used in AD DS
environments, with the following exceptions:
Tip:
For the exam, remember that you must configure the
TrustedHosts
parameter on the collecting computer, not the forwarding computer. This
is counterintuitive and might be hard to remember.
4. How to Troubleshoot Event Forwarding
If event forwarding doesn't seem to function properly, follow these steps to troubleshoot
the problem:
- Verify that you have waited long enough for the event to be forwarded. Forwarding events using the Normal setting can take up to 15 minutes. The delay might be longer if either the forwarding or the collection computer has restarted recently because the Windows Remote Management service is set to start automatically, but with a delay so that it doesn't affect startup performance. The 15-minute counter doesn't start until after the Windows Remote Management service has started.
- Verify that the subscription is Active. On the collecting computer, browse to Event Viewer\Subscriptions. The subscription status should be Active. If it is not, right-click the subscription and then click Runtime Status. Event Viewer displays the Subscription Runtime Status dialog box with an error code.
- Verify that the forwarding computer has the Windows Remote Management listener properly configured. From an elevated command prompt, run the following command: winrm enumerate winrm/config/Listener.If the Windows Remote Management listener isn't configured, there is no output. If the Windows Remote Management listener is configured properly for HTTP, the output resembles the following:
Listener Address = * Transport = HTTP Port = 80 Hostname Enabled = true URLPrefix = wsman CertificateThumbprint ListeningOn = 127.0.0.1, 192.168.1.214, ::1, fe80::100:7f:ffe%9, fe80::5efe:192.168.1.214%10
If the Windows Remote Management listener is configured properly for HTTPS, the output resembles the following (note that the host name must match the name the event collector uses to identify the computer):Listener Address = * Transport = HTTPS Port = 443 Hostname = win7.nwtraders.msft Enabled = true URLPrefix = wsman CertificateThumbprint = 52 31 db a8 45 50 1f 29 d9 3e 16 f0 da 82 ae 94 18 8f 61 5e ListeningOn = 127.0.0.1, 192.168.1.214, ::1, fe80::100:7f:ffe%9, fe80::5efe:192.168.1.214%10
- Verify that the collecting computer can connect to Windows Remote Management on the forwarding computer. From an elevated command prompt on the collecting computer, run the following command: winrm id -remote:
. .For example, if the forwarding computer is named win7.nwtraders.msft, you would run the following command: winrm id -remote:win7.nwtraders.msft.The result would be as follows:IdentifyResponse ProtocolVersion = http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd ProductVender = Microsoft Corporation ProductVersion = OS: 6.0.6000 SP: 0.0 Stack: 1.0
- Verify that the user account you configured the subscription to use has privileges on the forwarding computer. If necessary, enable failure security auditing on the remote computer , wait for events to be forwarded, and then examine the Security event log for logon failures. In addition, you can configure the subscription temporarily to use a Domain Admin account—if the subscription works with the Domain Admin account, the source of your problem is definitely related to authentication. Troubleshoot the authentication problem and reconfigure the subscription to use the original user account.
- If the subscription is configured to use Machine Account authentication, verify that the collecting computer's account is a member of the forwarding computer's Event Log Readers local group. If the subscription is configured to use a different user account, that account must be in the forwarding computer's Event Log Readers local group.
- Verify that the forwarding computer and the collecting computer are both connected to Private or Domain networks, rather than to Public networks. To verify the network profile, right-click the network icon in the system tray and then click Open Network And Sharing Center. In the Network And Sharing Center, the profile type appears after the network name. If it shows Public Network, click Customize and change the profile type to Work Network, which uses the private network profile.
- Verify that a network firewall is not blocking traffic by testing connectivity. Because the forwarding computer must have HTTP (and possibly HTTPS) available, you can attempt to connect to it from the collecting computer by using Windows Internet Explorer—simply type http://computername (or https://computername if you are using HTTPS) in the Address bar. If the firewall on the forwarding computer is configured correctly, you receive an HTTP 404 error and Internet Explorer displays the message, "The webpage cannot be found." If Internet Explorer displays the message, "Internet Explorer cannot display the webpage," the firewall exception on the forwarding computer has not been enabled.
- The new custom view appears and shows the matching events. If any events have appeared since you created the event forwarder, they should have been forwarded. If there are no new events, the problem is with your forwarding criteria. Try creating a custom view that matches the events that you want to forward and then importing that into a new subscription.
4.1. PRACTICE: Forward Events Between Computers
4.1.1. PRACTICE: Forward Events Between Computers
EXERCISE 2 Configuring a Computer to Forward Events
In this exercise, you configure a computer running Windows 7 to forward events to the
collecting computer. To complete this exercise, you must have completed Exercise 1.
- Click the Windows Firewall link.
- Click the Advanced Settings link.
- Select the Inbound Rules node.
- Now you need to grant the collecting computer permission to read this computer's event log. If you skipped this step, you would need to configure the subscription to use an administrative user account. To grant access to the collecting computer account, perform these steps:
- Click Start, right-click Computer, and then click Manage.
- Double-click Event Log Readers.
EXERCISE 3 Configuring an Event Subscription
In this exercise, you create an event subscription to gather events from the forwarding
computer. To complete this exercise, you must have completed Exercises 1 and 2.
- Click Start, right-click Computer, and then click Manage.
- In the Subscription Name box, type Windows Defender Warnings And Errors.
- Click Select Events. In the Query Filter dialog box, select the Error, Critical, Warning, and Information check boxes. Click By Source. Then, click the Event Sources list and select Windows Defender (as shown in Figure 4). Click OK.
Figure 4. Configuring the Query Filter to forward important Windows Defender events
- Click Advanced to open the Advanced Subscription Settings dialog box. Note that it is configured to use the Machine Account by default. This works because we have added this computer's domain account to the forwarding computer's Event Log Readers local group. Also, note that the subscription is configured by default to use Normal Event Delivery Optimization using the HTTP protocol. Click OK.
No comments:
Post a Comment