QNAP NAS Integration
Overview
This integration collects file access logs, authentication events, SMB/FTP connections, and system events from QNAP NAS devices. QNAP devices have been specifically targeted by ransomware campaigns (e.g., DeadBolt), making security monitoring critical.
Supported OS: QTS 5.x
Prerequisites
- A KYRA MDR Collector installed and running (Installation Guide)
- QNAP QTS admin access
- Network connectivity from the NAS to the collector on port 514
Configuration
Syslog Setup
- Log in to QTS
- Navigate to Control Panel > System Logs > Syslog Client
- Enable the syslog client and configure:
| Setting | Value |
|---|---|
| Server IP | Your KYRA Collector IP |
| Port | 514 |
| Protocol | TCP (recommended) or UDP |
- Select the log types to forward
- Click Apply
No additional agent installation is required.
Alternative: rsyslog on QNAP (via Entware)
For advanced log forwarding with custom formatting, install rsyslog via Entware:
# Install rsyslog via Entware (requires Entware installed on QNAP)opkg install rsyslog
# Create forwarding configurationcat > /opt/etc/rsyslog.d/60-kyra-mdr.conf << 'EOF'# Forward QNAP logs to KYRA Collectormodule(load="imfile" PollingInterval="5")
# Monitor QNAP system loginput(type="imfile" File="/var/log/event_log" Tag="qnap-event:" Severity="info" Facility="local0" StateFile="qnap-event-state")
# Monitor QNAP connection loginput(type="imfile" File="/var/log/conn_log" Tag="qnap-conn:" Severity="info" Facility="local0" StateFile="qnap-conn-state")
local0.* @@<COLLECTOR_IP>:514EOF
# Restart rsyslog/opt/etc/init.d/S01rsyslog restartVerify Log Reception
# On the KYRA Collector, verify incoming QNAP logssudo tcpdump -i any port 514 -A | grep -i "qnap\|NAS"
# Check rsyslogtail -f /var/log/syslog | grep "qnap"Collected Log Types
| Log Type | Security Use | Priority |
|---|---|---|
| File access logs | Data exfiltration, bulk download detection | Critical |
| Login success/failure | Brute force attack detection | Critical |
| SMB/FTP connections | Unauthorized access monitoring | High |
| Mass file modification/deletion | Ransomware detection (DeadBolt, etc.) | Critical |
| App install/remove | Malicious app installation detection | Medium |
| System events | Device health and configuration changes | Medium |
| Auto-block logs | IP blocking events | Medium |
Troubleshooting
No Logs Received
- Verify the syslog client is enabled in Control Panel > System Logs
- Check that the server IP and port are correct
- Ensure no firewall rules block port 514 between the NAS and collector
Ransomware Protection Tips
- Disable default
adminaccount and use a custom admin username - Disable UPnP and unnecessary external access services
- Keep QTS firmware updated to the latest version
- Enable auto-block to limit brute force attempts
For additional help, contact kyra@seekerslab.com.