Cisco Secure Network Analytics

Zeek Configuration Guide 7.5.3

Introduction

Use this guide to configure Cisco Secure Network Analytics (formerly Stealthwatch), v7.5.3 or later, to capture Zeek telemetry.

[info] Data Store is required with Analytics enabled to support detections using Zeek telemetry.

Overview

Zeek is primarily used as a passive network traffic analyzer which allows security teams to analyze network traffic, detect suspicious activity, and investigate potential threats by generating detailed logs of network events, including application-level details, through its protocol parsing capabilities. Zeek provides the following:

Requirements

Make sure Analytics is enabled. Choose Configure > Detection > Analytics from the main menu, then click Analytics On.

The requirements are as follows:

Zeek telemetry is the default for new installations during First Time Setup. If you're upgrading from a previous release, you'll need to configure Zeek telemetry in Advanced Settings.

[info] You don't need to purchase a separate license for Zeek telemetry. For more information about licensing, refer to the Smart Software Licensing Guide 7.5.3.

Performance Estimate

We support 100,000 events (Syslog messages) per second on a hardware platform. For details about resource requirements, refer to the hardware installation guide. For more information about combined telemetry resource requirements, refer to the Virtual Edition Appliance Installation Guide.

There are several factors, such as event rate and number of log types being ingested, that can impact your specific performance. While we do our best to represent the data as fairly and accurately as possible, your environment may experience different limits.

Zeek Logs

We are collecting all Zeek logs via Syslog but currently focusing only on the following for detections:

[info] In some instances, the dce_rpc.log and smb_files.log might be sent to the smb_mappings.log.

All Supported Zeek Logs

The following Zeek log types are supported, stored and available for reporting, within Secure Network Analytics. The log types that are also used for detections are noted in the last column of the table.

Log FileDescriptionUsed for Detections?
capture_lossPacket loss rateNo
connTCP/UDP/ICMP connectionsYes
dce_rpcDistributed Computing Environment/RPCYes
dhcpDHCP (Dynamic Host Configuration Protocol) leasesNo
dnp3DNP3 *Distributed Network Protocol 3) requests and repliesNo
dnsDNS (Domain Name System) activityYes
dpdDPD (Dynamic Protocol Detection)No
filesFile analysis resultsNo
ftpFTP (File Transfer Protocol) activityNo
httpHTTP requests and repliesNo
intelIntelligence data matchesNo
ircIRC (Internet Relay Chat) commands and responsesNo
kerberosKerberosNo
known_certsSSL certificatesNo
known_hostsHosts that have completed TCP (Transmission Control Protocol) handshakesNo
known_servicesServices running on hostsNo
modbusModbus commands and responsesNo
modbus_register_changeTracks changes to Modbus holding registersNo
mysqlMySQLNo
noticeZeek noticesNo
ntlmNTLM (NT LAN Manager)No
ntpNTP (Network Time Protocol)No
ocspOnline Certificate Status Protocol (OCSP)No
pePortable Executable (PE)No
radiusRADIUS authentication attemptsNo
rdpRDP (Remote Desktop Protocol)No
rfbRemote Framebuffer (RFB)No
signaturesSignature matchesNo
sipSIP (Session Initiation Protocol)No
smb_cmdSMB (Server Message Block) commandsNo
smb_filesSMB (Server Message Block) filesYes
smb_mappingSMB (Server Message Block) treesYes
smtpSMTP (Simple Mail Transfer Protocol) transactionsNo
snmpSNMP (Simple Network Management Protocol) messagesNo
socksSOCKS proxy requestsNo
softwareSoftware being used on the networkNo
sshSSH connectionsNo
sslSSL/TLS handshake informationNo
syslogSyslog messagesNo
tracerouteTraceroute detectionNo
tunnelTunneling protocol eventsNo
weirdUnexpected network-level activityNo
x509X.509 certificate informationNo

Format for Zeek Logs

Make sure Zeek logs are configured to be exported by Syslog as JSON in the specified format.

Configuring the Flow Collector to Ingest Zeek Telemetry

These are the two options for configuring Zeek telemetry in Secure Network Analytics:

[info] For more information about configuring Secure Network Analytics, refer to the System Configuration Guide.

Confirm Zeek Telemetry During First Time Setup (Data Store Only)

To enable ingest of Zeek telemetry on a new Flow Collector with Data Store, complete the following steps:

  1. Follow the instructions in the applicable appliance installation guide for your Flow Collector. Then, use the System Configuration Guide for more detailed instructions on appliance configuration of multiple telemetry types.
  2. Access the virtual machine console. Allow the virtual appliance to finish booting up.
  3. Log in through the console.
    • Login: sysadmin
    • Default Password: lan1cope

    [info] You'll typically change the default password when you configure the system for the first time.

4. Review the failed login attempts information. Select OK to continue. (This step refers to a console output showing login information, indicating no failed attempts and the last login time.)

5. Review the First Time Setup introduction. Select OK to continue. (This step refers to a console message welcoming the user to the First Time Setup wizard, estimating completion time.)

6. Select Zeek Logs from the list of telemetry types. Select OK to continue. (This step refers to a console screen listing telemetry types like NetFlow, Firewall Logs, and Zeek Logs, with checkboxes indicating selection status.)

[info] All telemetry types are selected by default in a new deployment. If you're upgrading to v753 from a previous release, refer to Configure Zeek Telemetry in Advanced Settings.

7. Confirm the port for Zeek Logs is 9514, then select OK. (This step refers to a console screen showing configured UDP ports for various telemetry types, confirming 9514 for Zeek Logs.)

We recommend you use Port 9514. Do not use Ports 514, 2030, 2055, 8514, or 8515.

[warning] Make sure your telemetry ports are unique. If you configure duplicate telemetry ports, the ports will be reset to their internal defaults to avoid loss of flow data. For example, if NetFlow and Zeek are exported to the same telemetry port, each device exporting Zeek data will create an exporter on the Flow Collector and exhaust the exporter resources in the Flow Collector engine, resulting in loss of flow data.

8. Click Apply to save your changes.

9. Follow the on-screen prompts to finish the virtual environment and restart the appliance.

Configure Zeek Telemetry in Advanced Settings

To begin ingesting Zeek telemetry on a Flow Collector that has already been configured, complete the following steps:

  1. Log in to your Manager.
  2. From the main menu, select Configure > Global > Central Management.
  3. On the Inventory page, click the [ellipsis icon] for your Flow Collector, then select View Appliance Statistics. The Flow Collector Admin interface opens.
  4. Select Support > Advanced Settings.

[info] If a field is not shown, click the Add New Option field. For more information about editing advanced settings on the Flow Collector, refer to the Advanced Settings Help topic.

5. In the enable_zeek field, set the value to 1 to capture Zeek telemetry. [info] Make sure you've configured Zeek to forward logs in JSON format.

6. Confirm the value is set to 9514 in the zeek_port field.

Verifying Zeek Telemetry

To verify Zeek telemetry is being captured, review the Zeek Log Collection Trend report:

  1. Log in to your Manager.
  2. From the main menu, select Report > Report Builder.
  3. Click Create New Report, then select Zeek Log Collection Trend.
  4. Click Run.
  5. Review the report to confirm that Zeek telemetry is being collected.

Zeek Log Collection Trend Report

The following samples of the Zeek Log Collection Trend Report show Zeek telemetry successfully being captured.

Report Sample 1

This report sample provides a one-hour view.

The report displays a bar chart showing "Event Bytes Per Period" over a one-hour time range. The Y-axis represents event bytes, ranging from 0 to 1.14M. The X-axis shows time intervals from approximately 09:40 PM to 10:39 PM.

Report Sample 2

This report sample provides a 12-hour view.

The report displays a bar chart showing "Event Bytes Per Period" over a 12-hour time range. The Y-axis represents event bytes, ranging from 0 to 117.19K. The X-axis shows time intervals from approximately 02:00 PM to 01:00 AM.

[info] For more information about reports, click the [Help] icon to access the Report Builder Help topic.

Evaluating Zeek Events

There are two additional reports available to help you evaluate Zeek events:

Make sure you have Data Store and Analytics is enabled.

[info] To enable Analytics, choose Configure > Detection > Analytics from the main menu, then click Analytics On.

Zeek Database Ingest Trend Report

To evaluate the Zeek conn.log events being written to your Data Store, do the following:

  1. Log in to your Manager.
  2. From the main menu, select Report > Report Builder.
  3. Click Create New Report, then select Zeek Database Ingest Trend.
  4. Click Run.
  5. Review the report:
    • Is the Data Store receiving Zeek conn.log events?
    • Were there any interruptions?

Report Sample

This sample provides a 12-hour view.

The report displays a bar chart showing "Records Written" as "Event Bytes Per Period" or "Event Count Per Period" over a 12-hour time range. The Y-axis represents records written, ranging from 0 to 14K. The X-axis shows time intervals from approximately 10:00 AM to 09:00 PM.

Zeek Logs Report

Make sure your Flow Collector is configured to receive data from Zeek. For instructions, refer to the System Configuration Guide.

To review the Zeek telemetry logging events for a specific Zeek log type for a Flow Collector, do the following:

You can run up to four Zeek log queries concurrently with additional queries waiting in a queue.

  1. Log in to your Manager.
  2. From the main menu, select Report > Report Builder.
  3. Click Create New Report, then select Zeek Logs.
  4. Specify parameters in the required fields in the General area.
ParameterMore Information
Time RangeIf you choose Custom, select a short time range for maximum performance. If you enter a long time range, the report may take a long time to query the data.
Flow CollectorSelect a Secure Network Analytics Flow Collector in your network.
Max RecordsSelect the maximum number of records. The limit is 10,000 records.
Zeek Log TypeSelect a Zeek Log Type.

[info] Selecting a log other than conn.log in the Zeek Log Type field may cause the report to run long, but it must run to completion.

5. Use the Filter area to specify additional parameters, if needed.

6. Click Run.

Report Sample

Optional parameters were selected when creating this report sample.

The report displays a table of Zeek log entries. Columns include timestamp, UID, ID.orig_h, ID.orig_p, ID.resp_h, ID.resp_p, proto, AA, TC, TY. The table shows sample data for several log entries, with timestamps around 7/16/2025 9:54 PM.

[info] To receive data on this report, you need Secure Network Analytics with a Data Store deployment. For information and instructions, refer to the Appliance Installation Guide (Hardware or Virtual Edition) and the System Configuration Guide.

Contacting Support

If you need technical support, please do one of the following:

Change History

Document VersionPublished DateDescription
1_0August 6, 2025Initial version.
1_1August 19, 2025Added the All Supported Zeek Logs section.
Models: v7.5.3, Secure Network Analytics, Network Analytics, Analytics

File Info : application/pdf, 23 Pages, 1.79MB

PDF preview unavailable. Download the PDF instead.

7 5 3 Zeek Configuration Guide DV 1 1

References

madbuild

Related Documents

Preview Cisco Secure Network Analytics Zeek Configuration Guide v7.5.3
A comprehensive guide to configuring Zeek telemetry with Cisco Secure Network Analytics v7.5.3, covering first-time setup, advanced settings, verification, and troubleshooting.
Preview Cisco Secure Network Analytics Update Guide v7.5.3
Comprehensive guide for updating Cisco Secure Network Analytics (formerly Stealthwatch) appliances to version 7.5.3. Covers prerequisites, download procedures, backup, installation, and troubleshooting for network administrators.
Preview Cisco Secure Network Analytics System Configuration Guide 7.5.3
A comprehensive guide for configuring Cisco Secure Network Analytics (formerly Stealthwatch) version 7.5.3. This document details the setup and management of various appliances, including Managers, Data Nodes, Flow Collectors, Flow Sensors, and UDP Directors, to establish a secure and visible network environment.
Preview Cisco Secure Network Analytics v7.5.3 Release Notes
This document provides detailed release notes for Cisco Secure Network Analytics version 7.5.3, covering new features, improvements, bug fixes, known issues, hardware support, and contact information.
Preview Cisco Secure Network Analytics: Security Events and Alarm Categories 7.5.3 Guide
This document provides a detailed reference for understanding the various security events and alarm categories managed by Cisco Secure Network Analytics, formerly known as Stealthwatch. It serves as a crucial resource for identifying and responding to network threats.
Preview Cisco Secure Network Analytics Virtual Edition Appliance Installation Guide 7.5.3
This guide provides detailed instructions for installing Cisco Secure Network Analytics Virtual Edition appliances, including the Manager, Data Store, Flow Collector, Flow Sensor, and UDP Director. It covers system requirements, installation methods for VMware, KVM, and Nutanix AHV, and configuration steps for optimal network traffic analysis and security.
Preview Cisco Secure Network Analytics Proxy Log Configuration Guide 7.5.3
This guide provides detailed instructions for configuring proxy logs from various proxy servers, including Cisco WSA, Blue Coat, McAfee, and Squid, to send data to Cisco Secure Network Analytics. It covers the setup of the Flow Collector and verification of data flow.
Preview Cisco Secure Network Analytics Virtual Edition Appliance Installation Guide 7.5.2
This guide provides detailed instructions for installing Cisco Secure Network Analytics Virtual Edition appliances, including Manager, Data Store, Flow Collector, Flow Sensor, and UDP Director. It covers system requirements, deployment considerations, and configuration steps for network administrators across VMware, KVM, and Nutanix AHV environments.