Hi everyone,
I’m working on a POC to ingest on-prem Active Directory logs into Google SecOps.
Our current architecture is based on a central Azure VM running a Bindplane agent (Linux), which already collects logs via syslog (firewalls, M365, etc.).
For AD logs, since they are not natively sent via syslog, I’m evaluating options like Windows Event Forwarding (WEF) from the Domain Controller to a collector VM.
Given that our current collector is Linux-based, I’m trying to understand the best practice here:
Is it recommended to introduce a Windows-based collector (for WEF / Windows Event Logs) alongside the existing Linux pipeline?
Or is there a way to integrate AD logs efficiently into a Linux-based ingestion architecture without losing data quality?
Any feedback or real-world architecture examples would be greatly appreciated.
Thanks

