Configure Netgate pfSense Plus to send logs to Arctic Wolf
You can configure pfSense Plus® by Netgate to send the necessary logs to Arctic Wolf® for security monitoring.
These resources are required:
- An activated Arctic Wolf Sensor or Virtual Log Collector (vLC)
-
Access to a device in the same network as the pfSense Plus Security Gateway Appliance
-
Administrator access to the pfSense Plus appliance interface
Configure syslog forwarding
Configure Suricata
Suricata is recommended for full Managed Detection and Response (MDR) functionality, but it is not mandatory. If performance constraints prevent you from enabling Suricata, MDR will continue to operate with limited detection authoring capabilities.
Note: Enabling Suricata may introduce performance overhead, especially in high-throughput and high activity environments. We recommend a very strong understanding of your environments' system capacity and traffic profile before enabling Suricata in production. Make sure to follow best practices for configuring your policies, for example by monitoring your organization's traffic in detect modes to identify critical services that could be affected prior to enabling any blocking.
Configure Syslog-ng
Note: Arctic Wolf observed truncated logs sent from pfSense in some installs that only had the default syslog service. Installing Syslog-ng in addition to configuring syslog with the stated RFC selections helped address the log truncation issues. For more information about other syslog services, message size limits, and syslog transport mapping, see RFC Editor documentation.