Secrets from the Deep – The DNS Analytical Log – Part 1

This post has been republished via RSS; it originally appeared at: New blog articles in Microsoft Tech Community.

 

Hi Team, it's Eric Jansen again, here in part one of a series of discussions revolving around the extremely exciting topic of the DNS Analytical Log.  Alright, maybe it's not that exciting, so crack open your favorite energy drink and let's chat.  Today I'll be talking about something that I've seen a number of requests for from our internal discussion groups that support engineers have posted asking on behalf of their customers.  In summary, that question is:  "Can the DNS Analytical Log be customized to only log certain data?  I only care about X,Y, and Z when I'm digging through the logs; the rest just gets in my way and makes the log fill up faster than necessary." 

 

Well, boys and girls, I'm here to announce that you can both have your cake and eat it too.  The answer is YES YOU CAN!  Who’s excited!?  Yeah…I hear ya, me too!

 

First things first though, for those that don't know what the DNS Analytical Log is, read this. For everyone else, let's move on to the exciting part - but first take another sip of your favorite energy drink - it's a bit of a long read.

 

OK, so how do we go about doing this?  Well, let's pick it apart.  We'll treat it as if we're doing a custom ETL trace defining the DNS Analytic provider and the data that we're looking for - Primarily because, that's what's happening; it's just a default configuration that gets reset every time you stop and start the built-in DNS Analytical Log.  With that said though, lets run through an example of setting up a custom trace using PowerShell, and hopefully that'll help you better understand the end result of what happens when I later modify the built-in DNS Analytical Log:

 

Step 1:  Define a path to your .ETL and create an Event Session.

 

EJansen_1-1605072170039.png

 

So far so good…

 

…Until it's not so good.  I say that because inevitably, some folks that try the above may get an error showing the following:

 

EJansen_2-1605072170080.png

 

The issue that you'll run into (if you get that error) is that you can only have one session running at a time.  In this case, I tried to immediately start another event session after I already had one started.  If another session is already running, you'd need to find what it is, and stop/remove it, if it's not in use (in your lab, of course).  You can do that by running Get-NetEventSession, and if you find an Event Session that’s running, you'll need to Stop-NetEventSession, and finally you'll need to remove it using Remove-NetEventSession.  After that, you should be able to create your session.

 

Step 2:  Figure out what options the DNS Analytics Provider offers, so that you can input data into Step 3.   

 

For that, I wrote a little snippet of code to help you out: 

 

 

function Get-ProviderKeyWordData ([Parameter(Mandatory=$true)]$Provider, [switch]$ShowLevels ) { $ProviderKeywords = Get-WinEvent -ListProvider $Provider | select -ExpandProperty keywords $ConvertedKeywordTable = @() Foreach ($Keyword in $ProviderKeywords){ $KWConvertedToHex = "{0:x16}" -f $Keyword.value $KWHashTable = [Ordered]@{KeywordName = $Keyword.name;KeyWordValue = $("0x" + $KWConvertedToHex)} $ConvertedKeywordTable += New-Object psobject -Property $KWHashTable } $ConvertedKeywordTable $LevelData = @() IF($ShowLevels){ $Levels = Get-WinEvent -ListProvider $Provider | select -ExpandProperty Levels foreach($Level in $Levels){$LevelData += New-Object psobject -Property @{DisplayName = $Level.DisplayName ;Level = $("0x" +$Level.Value)} } } $LevelData | ft -AutoSize }

 

 

Of course, all of my code comes with the following disclaimer:  

This is a sample script.  Sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages. 

   

With that out of the way, when you run the function, and define the DNS provider for the -Provider parameter value, it'll display the KeywordNames and KeyWordValues, as well as the Level options, if you use the -ShowLevels parameter: 

 

EJansen_40-1605072972600.png

 

Step 3:  Add the ETW provider to the Event Session with the specific options that you'd like to collect.   

 

In this case, I was looking for Errors, with a KeyWordName of "RESPONSE_FAILURE", however, because it’s a bitmask value, you can pick and choose as many options as you want.  For the purposes of my demonstration, however, I’m just choosing the one value of interest.  Also, note the required type casting for each variable in the screenshot below. 

 

EJansen_41-1605072972541.png

 

EJansen_42-1605072972574.png

 

Step 3:  Start the Session. 

  

EJansen_43-1605072972545.png

Step 4:  So now, I'm going to switch it up a bit and look for AutoLoggers and/or Sessions that are using the "Microsoft-Windows-DNSServer" Provider GUID, and it just happens to find the trace that I just started in the list.   Interesting... 

 

EJansen_44-1605072972590.png

 

Step 5:  Consume more of your energy drink, while collecting data, and then check your progress. 

 

EJansen_45-1605072972579.png

 

Step 6:  OK, we've collected some data, let's stop the trace and see what we're able to find. 

 

EJansen_46-1605072972588.png

 

Indeed, it looks like the only data that we're getting back is what we wanted - "RESPONSE_FAILURE" events with a level of "Error".  In this case, it's showing domain names that are being blocked by Query Resolution Policies, that clients are attempting to query, but are being refused. 

 

Step 7:  We've validated that the trace only showed us what we wanted, so let's remove the session since it's no longer needed. 

 

EJansen_47-1605072972552.png

 

Alright, so now let's see if we can apply this same logic to the built-in DNS Analytical Debug Log, but where do we begin?  Well, if the default DNS Analytical Log is just an ETW session, let's see what sessions are using the "Microsoft-Windows-DNSServer" Provider GUID before and again after we start the DNS Analytical Log. 

 

Before: 

 

EJansen_48-1605072972582.png

 

Enable the DNS Analytic Log: 

 

EJansen_49-1605072972576.png

 

After: 

 

EJansen_50-1605072972593.png

 

OK, so we've determined that once the built-in DNS Analytic Log is started, it creates an AutoLogger and a Session for collecting data, showing the default configuration for data collection.  We've also determined that there's a useful cmdlet named Get-ETWTraceProvider..  If only we could modify this, to meet our own requirements….  Perhaps there's a Set-EtwTraceProvider?.prepare to be happy, because there is!  Awesome.  

 

OK, so, when we created the custom trace earlier, looking for AutoLoggers and Sessions that were using that provider, you may have noticed that it only created a session when we did a Get-ETWTraceProvider -GUID '{EB79061A-A566-4698-9119-3ED2807060E7}'.  With that said, all we really need to modify is the "EventLog-Microsoft-Windows-DNSServer-Analytical" session - there's no need to attempt to modify the AutoLogger. 

 

So, let's use the same logic that we did when we created the custom trace, when adding the provider to the event session, but with Set-EtwTraceProvider and see what happens: 

 

EJansen_51-1605072972578.png

 

Crash and burn.  We failed with Access Denied.....  But what if we had more power?  Let's try to run as SYSTEM and see what happens.  To do this I used a third-party function called Invoke-CommandAs, written by a Mr. MarKellerman that can be found on his Github page, here. 

 

So, after running as system, it looks like there's no more 'Access Denied' issues, AND the Level and KeyWord values match what I set them to. 

 

EJansen_52-1605072972585.png

 

I trust what I see above, but let's verify to see what's being logged: 

 

EJansen_53-1605072972605.png

 

Wouldya look at that!?  When the log was initially started, it was collecting any / all DNS analytic events that met the criteria of the provider, but as soon as I modified the session, it changed to only the data of interest that I defined when running Set-ETWTraceProvider.  I like it! 

 

But do the changes persist, or does it reset to the default if I disable the log, and then re-enable the log?  I may have already answered that above, but let's see anyway: 

 

EJansen_54-1605072972596.png

 

The changes in fact DO NOT persist - some may prefer that, some may not.  Fortunately, it's all scriptable. 

 

Well team, that's all you get this time, but hopefully this proves to be useful to someone out there.  Until next time, when we discuss more in regards to things that you can do with the DNS Analytical Log, and maybe talk about some of the Easter eggs in this blog posting. 

REMEMBER: these articles are REPUBLISHED. Your best bet to get a reply is to follow the link at the top of the post to the ORIGINAL post! BUT you're more than welcome to start discussions here:

This site uses Akismet to reduce spam. Learn how your comment data is processed.