Deploy a log forwarder to ingest Syslog and CEF logs to Microsoft Sentinel


This article references CentOS, a Linux distribution that has reached End Of Life (EOL) status. Please consider your use and planning accordingly. For more information, see the CentOS End Of Life guidance.

To ingest Syslog and CEF logs into Microsoft Sentinel, particularly from devices and appliances onto which you can't install the Log Analytics agent directly, you'll need to designate and configure a Linux machine that will collect the logs from your devices and forward them to your Microsoft Sentinel workspace. This machine can be a physical or virtual machine in your on-premises environment, an Azure VM, or a VM in another cloud.

This machine has two components that take part in this process:

  • A syslog daemon, either rsyslog or syslog-ng, that collects the logs.
  • The Log Analytics Agent (also known as the OMS Agent), that forwards the logs to Microsoft Sentinel.

Using the link provided below, you will run a script on the designated machine that performs the following tasks:

  • Installs the Log Analytics agent for Linux (also known as the OMS agent) and configures it for the following purposes:

    • listening for CEF messages from the built-in Linux Syslog daemon on TCP port 25226
    • sending the messages securely over TLS to your Microsoft Sentinel workspace, where they are parsed and enriched
  • Configures the built-in Linux Syslog daemon (rsyslog.d/syslog-ng) for the following purposes:

    • listening for Syslog messages from your security solutions on TCP port 514
    • forwarding only the messages it identifies as CEF to the Log Analytics agent on localhost using TCP port 25226


The Log Analytics agent will be retired on 31 August, 2024. If you are using the Log Analytics agent in your Microsoft Sentinel deployment, we recommend that you start planning your migration to the AMA. For more information, see AMA migration for Microsoft Sentinel.

For information about deploying Syslog and/or CEF logs with the Azure Monitor Agent, review the options for streaming logs in the CEF and Syslog format to Microsoft Sentinel.


Each data connector has its own set of prerequisites. Prerequisites might include that you must have specific permissions on your Azure workspace, subscription, or policy. Or, you must meet other requirements for the partner data source you're connecting to.

Prerequisites for each data connector are listed on the relevant data connector page in Microsoft Sentinel.

Install the product solution from the Content Hub in Microsoft Sentinel. If the product isn't listed, install the solution for Common Event Format. For more information, see Discover and manage Microsoft Sentinel out-of-the-box content.


Operating system versions may have different support dates and lifecycles. We recommend that you check the official documentation of each distribution for the most accurate and up-to-date support and end of life dates.

Your machine must meet the following requirements:

  • Hardware (physical/virtual)

    • Your Linux machine must have a minimum of 4 CPU cores and 8 GB RAM.


      • A single log forwarder machine with the above hardware configuration and using the rsyslog daemon has a supported capacity of up to 8500 events per second (EPS) collected.
  • Operating system

    • Amazon Linux 2 (64-bit only)
    • Oracle Linux 7, 8 (64-bit/32-bit)
    • Red Hat Enterprise Linux (RHEL) Server 7 and 8 (not 6), including minor versions (64-bit/32-bit)
    • Debian GNU/Linux 8 and 9 (64-bit/32-bit)
    • Ubuntu Linux 20.04 LTS (64-bit only)
    • SUSE Linux Enterprise Server 12, 15 (64-bit only)
    • CentOS distributions are no longer supported, as they have reached End Of Life (EOL) status. See note at the beginning of this article.
  • Daemon versions

    • Rsyslog: v8
    • Syslog-ng: 2.1 - 3.22.1
  • Packages

    • You must have Python 2.7 or 3 installed on the Linux machine.
      Use the python --version or python3 --version command to check.
    • You must have the GNU Wget package.
  • Syslog RFC support

    • Syslog RFC 3164
    • Syslog RFC 5424
  • Configuration

    • You must have elevated permissions (sudo) on your designated Linux machine.
    • The Linux machine must not be connected to any Azure workspaces before you install the Log Analytics agent.
  • Data

    • You may need your Microsoft Sentinel workspace's Workspace ID and Workspace Primary Key at some point in this process. You can find them in the workspace settings, under Agents management.

Security considerations

Make sure to configure the machine's security according to your organization's security policy. For example, you can configure your network to align with your corporate network security policy and change the ports and protocols in the daemon to align with your requirements. You can use the following instructions to improve your machine security configuration:  Secure VM in Azure, Best practices for Network security.

If your devices are sending Syslog and CEF logs over TLS (because, for example, your log forwarder is in the cloud), you will need to configure the Syslog daemon (rsyslog or syslog-ng) to communicate in TLS. See the following documentation for details:

Run the deployment script

  1. In Microsoft Sentinel, select Data connectors.

  2. Select the connector for your product from the connectors gallery. If your product isn't listed, select Common Event Format (CEF).

  3. In the details pane for the connector, select Open connector page.

  4. On the connector page, in the instructions under 1.2 Install the CEF collector on the Linux machine, copy the link provided under Run the following script to install and apply the CEF collector.
    If you don't have access to that page, copy the link from the text below (copying and pasting the Workspace ID and Primary Key from above in place of the placeholders):

    sudo wget -O python [WorkspaceID] [Workspace Primary Key]
  5. Paste the link or the text into the command line on your log forwarder, and run it.

  6. While the script is running, check to make sure you don't get any error or warning messages.

  7. Configure your device to send CEF messages.


    Using the same machine to forward both plain Syslog and CEF messages

    If you plan to use this log forwarder machine to forward Syslog messages as well as CEF, then in order to avoid the duplication of events to the Syslog and CommonSecurityLog tables:

    1. On each source machine that sends logs to the forwarder in CEF format, you must edit the Syslog configuration file to remove the facilities that are being used to send CEF messages. This way, the facilities that are sent in CEF won't also be sent in Syslog. See Configure Syslog on Linux agent for detailed instructions on how to do this.

    2. You must run the following command on those machines to disable the synchronization of the agent with the Syslog configuration in Microsoft Sentinel. This ensures that the configuration change you made in the previous step does not get overwritten.
      sudo su omsagent -c 'python /opt/microsoft/omsconfig/Scripts/ --disable'

Deployment script explained

The following is a command-by-command description of the actions of the deployment script.

Choose a syslog daemon to see the appropriate description.

  1. Downloading and installing the Log Analytics agent:

    • Downloads the installation script for the Log Analytics (OMS) Linux agent.

      wget -O
    • Installs the Log Analytics agent.

      sh -w [workspaceID] -s [Primary Key] -d
  2. Setting the Log Analytics agent configuration to listen on port 25226 and forward CEF messages to Microsoft Sentinel:

    • Downloads the configuration from the Log Analytics agent GitHub repository.

      wget -O /etc/opt/microsoft/omsagent/[workspaceID]/conf/omsagent.d/security_events.conf

  3. Configuring the Syslog daemon:

    • Opens port 514 for TCP communication using the syslog configuration file /etc/rsyslog.conf.

    • Configures the daemon to forward CEF messages to the Log Analytics agent on TCP port 25226, by inserting a special configuration file security-config-omsagent.conf into the syslog daemon directory /etc/rsyslog.d/.

      Contents of the security-config-omsagent.conf file:

      if $rawmsg contains "CEF:" or $rawmsg contains "ASA-" then @@ 
  4. Restarting the Syslog daemon and the Log Analytics agent:

    • Restarts the rsyslog daemon.

      service rsyslog restart
    • Restarts the Log Analytics agent.

      /opt/microsoft/omsagent/bin/service_control restart [workspaceID]
  5. Verifying the mapping of the Computer field as expected:

    • Ensures that the Computer field in the syslog source is properly mapped in the Log Analytics agent, using the following command:

      grep -i "'Host' => record\['host'\]"  /opt/microsoft/omsagent/plugin/filter_syslog_security.rb
    • If there is an issue with the mapping, the script will produce an error message directing you to manually run the following command (applying the Workspace ID in place of the placeholder). The command will ensure the correct mapping and restart the agent.

      sudo sed -i -e "/'Severity' => tags\[tags.size - 1\]/ a \ \t 'Host' => record['host']" -e "s/'Severity' => tags\[tags.size - 1\]/&,/" /opt/microsoft/omsagent/plugin/filter_syslog_security.rb && sudo /opt/microsoft/omsagent/bin/service_control restart [workspaceID]

Next steps

In this document, you learned how to deploy the Log Analytics agent to connect CEF appliances to Microsoft Sentinel. To learn more about Microsoft Sentinel, see the following articles: