본문으로 건너뛰기

Synology NAS Integration

Overview

This integration collects file access logs, authentication events, SMB/FTP connections, and system events from Synology NAS devices. NAS devices are primary targets for ransomware attacks, making monitoring essential for SMB environments.

Supported OS: DSM (DiskStation Manager) 7.x Supported models: DS220+, DS420+, DS920+, DS1621+, and other DSM 7.x devices


Prerequisites

  • A KYRA MDR Collector installed and running (Installation Guide)
  • Synology DSM admin access
  • Network connectivity from the NAS to the collector on port 514

Configuration

Syslog Setup

  1. Log in to DSM
  2. Navigate to Log Center > Log Sending
  3. Add a syslog server with the following settings:
SettingValue
Server IPYour KYRA Collector IP
Port514
ProtocolTCP (recommended) or UDP
Log FormatBSD syslog
  1. Select the log categories to send
  2. Click Apply

No additional agent installation is required.

DSM UI Navigation

The full path in DSM 7.x:

  1. Open Control Panel
  2. Go to Log Center (under System section)
  3. Click the Log Sending tab
  4. Check Send log to syslog server
  5. Enter the KYRA Collector IP, port, and protocol
  6. Select log categories: General, Connection, File Transfer
  7. Click Apply

Enable File Transfer Logging

To capture file access events (critical for ransomware detection):

DSM > Control Panel > File Services > SMB > Advanced Settings
→ Enable Transfer Log: ON
DSM > Control Panel > File Services > FTP > General
→ Enable FTP transfer log: ON

Verify Log Reception

Terminal window
# On the KYRA Collector, verify incoming Synology syslog
sudo tcpdump -i any port 514 -A | grep -i "synology\|DiskStation"
# Example Synology syslog output format
# <134>Mar 15 10:23:45 DiskStation Connection: User [admin] from [192.168.1.100] logged in successfully via [DSM].
# <134>Mar 15 10:24:12 DiskStation Connection: User [admin] from [192.168.1.100] failed to log in via [DSM].
# <134>Mar 15 10:25:00 DiskStation WinFileService: User [user1] accessed shared folder [documents] with IP [192.168.1.101].
# Check that logs are arriving
tail -f /var/log/syslog | grep "DiskStation"

Collected Log Types

Log TypeSecurity UsePriority
File access logsData exfiltration, bulk download detectionCritical
Login success/failureBrute force attack detectionCritical
SMB/FTP connectionsUnauthorized access monitoringHigh
Mass file modification/deletionRansomware detectionCritical
External access (QuickConnect)Unauthorized remote access detectionHigh
Package install/removeMalicious app installation detectionMedium
Auto-block logsIP blocking eventsMedium
Firmware updatesVulnerability patch status trackingLow

Troubleshooting

No Logs Received

  1. Verify the syslog server IP and port in Log Center > Log Sending
  2. Ensure no firewall rules block port 514 between the NAS and collector
  3. Confirm that Log Center is enabled and the desired categories are selected

Missing File Access Logs

  • Enable File Services > SMB > Advanced > Enable transfer log
  • Ensure file access logging is turned on in Log Center settings

For additional help, contact kyra@seekerslab.com.