Knowledge Base – SGBox Next Generation SIEM & SOAR https://www.sgbox.eu Next Generation SIEM & SOAR Fri, 28 Nov 2025 10:55:27 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://www.sgbox.eu/wp-content/uploads/2025/02/cropped-SGBox-symbol-png-32x32.webp Knowledge Base – SGBox Next Generation SIEM & SOAR https://www.sgbox.eu 32 32 Associate Collector to Tenant https://www.sgbox.eu/en/knowledge-base/associate-collector-to-tenant/ Fri, 28 Nov 2025 10:47:22 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=34848

Associate Collector to Tenant

This operation is needed in order to forward logs to the correct SGBox tenant. It could be done in two ways:

  1.  from the collector with option “Register collector” (https://www.sgbox.eu/en/knowledge-base/the-sgbox-collector-v6/#Register_the_collector). You need insert the “key probe for connection” you choosed when tenant was created (in our example https://www.sgbox.eu/en/knowledge-base/create-new-tenant/ is Key1234)
  2. On SGBox by manually associate the collector to the right tenant.  From SCM > Multitenant  > Manager > Probes. Once identified your probes, select from drop down menu the correct tenant
 
Starting from version 6.2.2, new installations need a collector configured.
If your installation has just one tenant you can avoid deploy the collector VM and use the preconfigured collector: sgboxprobeid
 
Knowledge Base

Identify and assign it to the correct tenant.

 
]]>
Alarm & Incident Management https://www.sgbox.eu/en/knowledge-base/alarm-incident-management/ Tue, 21 Oct 2025 12:01:53 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=34246
Click to open the Alarm & Incident Management User Guide

]]>
6.2.2 https://www.sgbox.eu/en/knowledge-base/6-2-2/ Wed, 15 Oct 2025 13:28:19 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=34168

6.2.2

A new version of SGBox that improve a lot of backend features and performance has been released


SGBOX > SCM > Applications > SGBox Updates
Knowledge Base
]]>
Cato Network – SGBox SIEM Integration Guide https://www.sgbox.eu/en/knowledge-base/elementor-33629/ Fri, 19 Sep 2025 08:36:05 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=33629

Table of Contents

Cato Network – SGBox SIEM Integration Guide

This guide explains how to set up the configuration that allows SGBox to make API calls to the Cato Network service in order to collect events in SIEM and will help you analyze events generated by activities related to Network, Security, Sockets, Cato Clients, and more.

To complete the tasks outlined in this guide, the requirements are:

Generating an API Key

To generate an API key:

  1. In the navigation menu, click Resources > API Keys.
  2. Click New. The Create API Key panel opens.
    1. Knowledge Base
  3. Enter a Key Name.

  4. Select the API Permission for this key.

  5. (Optional) Select a date that the API key Expires at.

  6. (Optional) For additional security, in Allow access from IPs, select Specific IP list, and define the IP addresses or IP range that are allowed to use this API key.

    The default setting is to allow this API key for Any IP address.

  7. Click Apply. The API key is added and a popup window containing the new API key is displayed.

  8. Click copy.png (Copy) and copy the API Key that is generated by the Cato Management Application and save it to a secure location.

    Once you close this window, you can’t access the value for the API key.

  9. Click OK to close the pop-up window.

Enabling eventsFeed for Your Account

Use the API Access Management window to enable your account to send events to the Cato API server. After you enable eventsFeed, wait about 30 minutes for the API server to collect enough events to return data for the query.

To enable eventsFeed for your account:

  1. In the navigation pane, select Administration > API & Integrations and click the Events Integration tab.
  2. Select Enable integration with Cato events. Your account starts sending events to the Cato API server.

EventFeed.png

Obtain Your Account ID from Cato Networks

Account ID Location:

Log in to your Cato Networks Editors Account.

  • The Account ID is found within the Cato Management Application. Specifically by navigating to Account > Account Info.
  • Also it is shown within the URL of the Cato account when logged in.
    • For example, if your Account ID is “1234” then the URL should look like: https://sgbox.catonetworks.com/#!/1234/topology

Configure SGBox Playbooks for Cato Networks

Add Custom Host

You must define a Host in SGBox to make sure that the logs collected from CATO will be written into the SIEM, to achieve or analyze them.

  • Go to SCM > Network > Host list
  • Click the button ➕ New Host
  • Insert “CatoNetwork” in the Host field and Save the new host

Cato Network - SGBox SIEM Integration Guide

Cato Network Package Installation

It is also necessary to install a Cato network package in SGBox to deploy on the SIEM configuration used to obtain or analyze CATO events.

  • Go to SCM > Applications > Packages and download the package named “Cato Network” by click the button Install
  • During the Installation of the package in the field Select the hosts the package will be associated with choose “CatoNetwork” previously defined in the Host list.

Cato Network - SGBox SIEM Integration Guide

  • Click Install to finish the installation

Cato Network PB Configurations

  • Go to SCM > PB > Playbook and edit [Cato] Network Get RawLogs
  • Edit node called [SET] Credentials Parameters and insert API key and Account ID obtained from CATO, save the changes on node by click Save button.

Cato Network - SGBox SIEM Integration Guide 

  • Edit node called [WRITE] RawLog and in the field choose from list choose “CatoNetwork” previously defined in the Host list, save the changes on node by click Save button.

Cato Network - SGBox SIEM Integration Guide

  • To save all changes and exit the [Cato] Network Get RawLogs playbook, click the Save button.

Cato Network - SGBox SIEM Integration Guide 

  • Schedule the [Cato] Network Get RawLogs PB by clicking the button with the clock icon 🕓 , set an appropriate time interval (not less than 5 minutes), save the change, to run Playbook, click the Execute button and choose Background run.

If the API connection between Cato Network and SGBox is working, a Green 🟢 icon will appear on the Status column and in the Host list for CatoNetwork hosts on the Last Log column will start showing the timestamp of the last data received from CATO in SGBox.

Notes, to check the availability of data collected by SGBox you can also refer to the Historical search page: https://www.sgbox.eu/en/knowledge-base/historical-search/

In case the execution of PB gives an error, a Red icon 🔴 will be shown, In this case the advice is to better check the configuration part to make sure that there are no errors in the input of the parameters needed for the API connection, or, In case of further problems you can open a ticket to SGBox Support via ticketing portal: https://sgboxportal.sgbox.it/portal/en/signin

Analyzing collected data 

Go to LM > Configuration > Mapping > edit mapping called [Cato] Network and in the field choose from list choose “CatoNetwork” previously defined in the Host list, save the changes by click OK button, Confirm.

Cato Network - SGBox SIEM Integration Guide

In this way, SGBox will begin to analyze the events it has collected, which will be searchable from the SGBox analysis pages (Class/Pattern analysis, Custom Report List, Dashboard).

]]>
Qualys scan – with Windows authentication https://www.sgbox.eu/en/knowledge-base/qualys-scan-with-windows-authentication/ Thu, 18 Sep 2025 13:34:36 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=33490

Table of Contents

Qualys scan – with Windows authentication

This article describes how to configure Qualys Probe to monitor and perform vulnerability assessments on Windows servers with authentication.

Getting started

Using host authentication (trusted scanning) allows our service to log in to each target system during scanning. For this reason we can perform in depth security assessment and get better visibility into each system’s security posture. Running authenticated scans gives you the most accurate scan results with fewer false positives.

Do I have to use authentication?

For vulnerability scans, authentication is optional but recommended. For compliance scans, authentication is required.

Are my credentials safe?

Credentials are securely handled by the service and are only used for the duration of the scan.

In most cases, we do not modify or write to the device unless the user enables optional scan features Dissolvable Agent and Agentless Tracking and accepts the agreement regarding terms of use.

Dissolvable Agent: When enabled, we write the dissolvable agent file to the device and remove it when the scan is finished.
Agentless Tracking: When enabled, we write a host ID file to the device at the time of the first scan. Note – the Manager primary contact for the subscription can do a cleanup action to remove the host ID file from hosts at any time.
Cleanup Issues: In rare cases, if a scan terminates before cleaning up temporary files or the dissolvable agent, the files may persist. This generally should not occur.

Our security service uses credentials at the scan time to log in with elevated privileges and read security information from the target. Using the information collected, the scanner runs the largest number of security tests, checking the most settings and configurations. You’ll see this information gathered as part of your scan reports.

Which technologies are supported?

For the most current list of supported authentication technologies and the versions that have been certified for VM and PC by record type, please refer to the following article: Authentication Technologies Matrix

What login credentials are required? – Windows Clients and Servers

For VM: Administrator privileges are recommended for the most accurate security assessment and recommended fixes for your system.

For PC/SCA: Administrator privileges (Build-in administrator or ‘Domain Admins’ groups member account) are required. The administrator privileges are required in order for the compliance scan engine to validate settings on the operating system.

Using an account with administrator privileges allows us to collect information based on registry keys, administrative file shares (such as C$) and running services. For VM, it’s possible to use an account with less than administrator rights, however this limits scanning to fewer checks and scans will return less accurate, less complete results.

Windows uses an ACL-based approach. Each object (file, registry key) can have it’s own ACL listing the accounts that have specific types of access (read, write, etc.) to that object. We must have access to a few objects or authentication will fail, including “IPC%$” pipe, the registry API and others. Missing access rights will simply cause the corresponding vulnerability checks (QIDs) and compliance checks (controls) to fail. Most security checks require access to multiple objects and the detailed list can vary depending on operating system version, patch level, configuration settings, etc. The only way to know whether access is sufficient is by running a scan and reviewing the reported access failures.

Windows Domain Controllers

Only Domain Administrator accounts can be used to scan Domain Controllers. We suggest you create a domain account to be used for authentication and add the account to the Domain Administrators Group. There are certain Group Policy settings that we recommend as best practice for scanning Windows systems. See Windows Domain Account Setup to learn more.

If you have any security concerns running scans on Domain Controllers with Domain Administrator privileges, consider using Qualys Cloud Agent. To learn more about Cloud Agent, see the Qualys Cloud Agent Getting Started Guide.

What Authentication Schemes are used?

Our service will attempt to use authentication schemes on the target host from the most secure scheme to the least secure scheme. We support the following authentication schemes, from highest to lowest:

  1. Kerberos with AES-128/256
  2. Kerberos with RC4-128
  3. NTLMv2
  4. NTLMv1 (disabled by default, and you can enable it within a Windows authentication record)

Windows Domain Account Setup

This section describes how to create a domain account for authentication, how to add this account to the Domain Administrators Group, and how to set group policy settings. It is recommended that you verify the functionality of the account before using it for trusted scanning. If possible, configure the user account so that the password does not expire.

Create an Administrator Account

  1. Log into the Domain Controller with an account that has administrator rights.
  2. Open the Active Directory Users and Computers MMC snap-in.
  3. Create a new user called “qualys_scanner” (or something similar). Please do not use “qualys” as this account is reserved for use by Qualys and may get locked out during scanning.
  4. Select the “qualys_scanner” user and go to Properties (Action > Properties).
  5. In the Properties window, go to the “Member Of” tab. Click Add to add the “qualys_scanner” user to the “Domain Admins” group. Click OK to save the change.

Group Policy Settings

Best practice Group Policy settings for authenticated scanning of Windows systems are described below. Please consult your network administrator before making changes to Group Policy as changes may have an adverse impact on your network operations, depending on your network configuration and security policies in place. Note that detailed descriptions for many Group Policy settings listed below is available online when using the Group Policy Editor.

Important! We highly recommended that you discuss making changes to Group Policy with your network administrator before implementation, as your local network configuration may depend on certain settings being in place. Qualys does not verify that these settings are appropriate for your network. If you do make any Group Policy changes, it may take several hours before the changes take effect on the client.

Security Options

Computer Configuration > Windows Settings ?> Security Settings > Local Policies > Security Options

  • Network access: Sharing and security model for local accounts > Classic
  • Accounts: Guest account status > Disabled (recommended)
  • Network access: Let Everyone permissions apply to anonymous users > Disabled (recommended)

System Services

Computer Configuration > Windows Settings > Security Settings > System Services

  • Remote registry > Automatic
  • Server > Automatic 
  • Windows Firewall > Automatic

Administrative Templates

Computer Configuration > Administrator Templates > Network > Network Connections > Windows Firewall > Domain Profile

  • Windows Firewall: Protect all network connections > Disabled (recommended) or Enabled. Your network administrator should decide on the best option for your environment. If Enabled, 3 settings are required (below).
  • Windows Firewall: Allow remote administration exception > Enabled (1)
  • Windows Firewall: Allow file and printer sharing exception >  Enabled (1)
  • Windows Firewall: Allow ICMP exceptions > Enabled (2)

(1) In the “Allows unsolicited messages from” field, enter “*” (do not enter quotes) or the IP address assigned to your scanner appliance(s). (2) This is optional for a vulnerability scan, and required for a compliance scan.

Verify Functionality of the New Account (recommended)

After configuring group policy settings, we recommend you verify the functionality of your new Windows domain account to confirm it is suitable for Windows authenticated scanning.

Select Run from the Start menu and enter cmd.exe and click OK. Use the commands below to test administrative share access and registry access. Variables are enclosed in <>. You need to replace variables with appropriate values. For example replace <USER> with a username like jsmith (i.e. remove the brackets).

Run this command to test administrative share access:

net use Z: \<IP ADDRESS>C$ /PERSISTENT:no /USER:<DOMAIN><USER>

Run this command to test registry access:

runas /USER:<DOMAIN><USER> "cmd /k reg.exe query \<IP
ADDRESS>HKLMSoftware"

Note: There’s a space after “query” and before \<IP ADDRESS

WMI Service Configuration

Some of our compliance checks require secure access to WMI service to successfully perform compliance assessment. For this reason we recommend you to set the WMI service to run securely by increasing the authentication level to Packet Privacy.

We require high authentication level to scan the following namespaces and associated controls:

Namespace: rootcimv2securitymicrosofttpm
CID 11279 – Status of the ‘Trusted Platform Module (TPM)’ (Activated) on Windows
CID 11287 – Status of the ‘Trusted Platform Module (TPM)’ (Enabled) on Windows
CID 11288 – Status of the ‘Trusted Platform Module (TPM)’ (Owned) on Win

Namespace: rootCIMV2TerminalServices
CID 11478 – Current list of Groups and User Accounts granted the Remote Desktop Connection privilege

How to increase WMI authentication level

You need to run the following command on each host that you’ll scan for the above mentioned namespaces and controls.

winmgmt /standalonehost 6

Then restart the Winmgmt service

net stop winmgmt
net start winmgmt

For information on authentication levels see https://msdn.microsoft.com/enus/library/aa393972(v=vs.85).aspx

What happens when high level authentication is not provided?

You may see Insufficient Privileges or WMI query failures when scanning namespaces and controls that require high level authentication.

Sample error from Windows Authentication Report

Knowledge Base

Manage Authentication Records (Steps for authenticated scans)

Once you have created the user on Windows Server for use with Qualys, please open a ticket with SGBox support via the ticketing portal, with the ticket subject Qualys scan – with Windows authentication, Please provide the following information in your ticket:

  1. Username of the account created for Qualys Scan.
  2. Domain name of the server where the account was created for Qualys Scan.
  3. IP address of the server that must be scanned.

Note: You must wait for SGBox Support, once it has received the ticket and taken charge of it, to confirm that it has correctly activated the configuration necessary for the next steps > Configure SGBox for the vulnerability assessments.

Configure SGBox for the vulnerability assessments

If you are already using SGBox to perform vulnerability scans, then simply go to SCM > Network > Assets.

  1. Create a new asset named “Qualys scan – with Windows authentication” (Optional) and group the Windows hosts that will be subject to VA within it.
  2. Assign in to the asset “Network Vulnerability Scanner” module.
  3. Assign in to the asset “User” that must see the asset.
  4. Assign in to the asset the policy named “AuthenticatedScan ALL (default)”.
  5. Save your changes.

Knowledge Base

If this is the first time you are configuring Qualys Probe on SGBox, please follow the guide below for the configuration part: Configure a Qualys probe for SGBox

]]>
Configure login auditing MSSQL (SQL Server Management Studio) https://www.sgbox.eu/en/knowledge-base/configure-login-auditing-mssql-sql-server-management-studio/ Fri, 01 Aug 2025 12:47:33 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=33115

Configure login auditing MSSQL (SQL Server Management Studio)​

This article describes how to configure login auditing in SQL Server on Windows, to monitor SQL Server Database Engine login activity. Login auditing can be configured to write to the error log on the following events.

  • Failed logins
  • Successful logins
  • Both failed and successful logins

Use SQL Server Management Studio to Configure login auditing

  1. In SQL Server Management Studio, connect to an instance of the SQL Server Database Engine with Object Explorer.
  2. In Object Explorer, right-click the server name, and then select Properties.
  3. On the Security page, under Login auditing, select the desired option and close the Server Properties page.
    • Knowledge Base
    • Note You must restart SQL Server before this option will take effect.
  4. In Object Explorer, right-click the server name, and then select Restart.
]]>
Microsoft 365 (Office 365) – SGBox SIEM Integration Guide https://www.sgbox.eu/en/knowledge-base/microsoft-365-office-365-sgbox-siem-integration-guide/ Tue, 29 Jul 2025 07:23:58 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=32653

Microsoft 365 (Office 365) – SGBox SIEM Integration Guide​

This Guide explains how to configure SGBox to make API calls to Microsoft 365 (previously called Office 365) with the purpose of collecting events in SGBox SIEM related to activities managed by Microsoft 365.

Requirements

To complete the tasks outlined in this guide, you’ll need the following:

  • Generate SGBox App in Microsoft 365.
  • Be sure that the SGBox Appliance can communicate with these addresses:
    • https://login.windows.net/
    • https://manage.office.com/api/v1.0/
  • Add a custom Host in SGBox for Microsoft 365.
  • Install and configure the Microsoft 365 API package.
  • Install and configure the Microsoft 365 package.

Generate SGBox App in Microsoft 365

In order to allow SGBox to connect via API to your Azure tenant and retrieve the Audit logs you need to create a new app for SGBox and assign the correct privileges.

For instructions on how to view logs in your Azure tenant and how to configure an external application to retrieve these logs using API calls, please open a ticket with SGBox support via the ticketing portal, with the ticket subject Microsoft 365 (Office 365) Application Configuration.

Add custom Host in SGBox for Microsoft 365

You must define a Host in SGBox to make sure that the logs collected from Microsoft 365 will be written into the SIEM, to achieve or analyze them.

  1. Go to SCM > Network > Host list.
  2. Click the button ➕ New Host.
  3. Insert “Microsoft365” or “Office365” in the Host field and Save the new host

Knowledge Base

Install and configure the Microsoft 365 API package

It is also necessary to install a Microsoft 365 API package in SGBox to deploy on the SIEM configuration used to obtain or analyze Microsoft 365 events.

  1. Go to SCM > Applications > Packages and download the package named Microsoft 365 (Office 365) API by click the button Install.
  2. Click Install to finish the installation.

Knowledge Base

Configure SGBox Playbooks for Microsoft 365

  1. Go to SCM > PB > Playbook and edit [OFFICE 365] Settings and starter.
  2. Edit node called O365 credentials and insert tenant, client_id, client_secret obtained during the step Generate SGBox App in Microsoft 365, save the changes on node by click Save button.
    1. Knowledge Base
  3. On every PB Subflow
    • [OFFICE 365] AzureActiveDirectory Audit
    • [OFFICE 365] DLP
    • [OFFICE 365] Exchange Audit
    • [OFFICE 365] General Audit
    • [OFFICE 365] SharePoint Audit
    • [OFFICE 365] Windows Defender
    • You must edit a node called Write log page and in the field choose from list choose “Microsoft365” previously defined in the Host list, save the changes on the node by clicking the Save button.
    • Knowledge Base
  4. Schedule the [OFFICE 365] Settings and starter PB by clicking the button with the clock icon 🕓 , set an appropriate time interval (not less than 5 minutes), save the change, to run Playbook, click the Execute button and choose Background run.

    If the API connection between Microsoft 365 and SGBox is working, a Green 🟢 icon will appear on the Status column and in the Host list for Microsoft365 host on the Last Log column will start showing the timestamp of the last data received from Microsoft 365 in SGBox.

    Notes, to check the availability of data collected by SGBox you can also refer to the Historical search page.In case the execution of PB gives an error, a Red icon 🔴 will be shown, In this case the advice is to better check the configuration part to make sure that there are no errors in the input of the parameters needed for the API connection, or, In case of further problems you can open a ticket to SGBox Support via ticketing portal

Analyzing collected data

  1. Go to SCM > Applications > Packages and download the package named Microsoft 365 (Office 365) by click the button Install
  2. During the Installation of the package in the field Select the hosts the package will be associated with choose “Microsoft365” previously defined in the Host list.
    1. Knowledge Base
  3. Click Install to finish the installation
  4. Go to LM > Configuration > Mapping > edit mapping called [O365] and in the field choose from list choose “Microsoft365” previously defined in the Host list, save the changes by click OK button, Confirm.
    1. Knowledge Base

 

 

 

 

 

In this way, after few minutes SGBox will begin to analyze the events it has collected, which will be searchable from the SGBox analysis pages (Class/Pattern analysis, Custom Report List, Dashboard).

Troubleshooting

How to debug Office 365 nodes

It is possible to debug the Office 365 PBs to better understand which of the nodes the problem might be, below you can find the steps to debug it.

  1. Connect to the PB > Playbook module and identify the node named [OFFICE 365] Settings and starter.
  2. See the Action column and click the ▶️ (Execute) icon, a pup-up window will open with the option to select LIVE RUN button
    1. Knowledge Base
  3. When the Debug is finished you can see in the Result and the result of the nodes and the API call. Copy the error message shown which is helpful to identify the problem. 
    1. Knowledge Base



]]>
6.2.1 https://www.sgbox.eu/en/knowledge-base/6-2-1/ Wed, 23 Jul 2025 12:30:54 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=32641

6.2.1

A new version of SGBox that improve a lot of backend features and performance has been released


SGBOX > SCM > Applications > SGBox Updates
Knowledge Base
]]>
6.2.0 https://www.sgbox.eu/en/knowledge-base/6-2-0/ Wed, 23 Jul 2025 12:17:08 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=32635

6.2.0

A new version of SGBox that improve a lot of backend features and performance has been released


SGBOX > SCM > Applications > SGBox Updates
Knowledge Base
]]>
6.1.0 https://www.sgbox.eu/en/knowledge-base/6-1-0/ Tue, 24 Jun 2025 07:46:25 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=32285

6.1.0

A new version of SGBox that improve a lot of backend features and performance has been released


SGBOX > SCM > Applications > SGBox Updates
Knowledge Base
]]>