diff options
author | Mario Preksavec <mario at slackware dot hr> | 2016-10-14 13:45:14 +0700 |
---|---|---|
committer | Willy Sudiarto Raharjo <willysr@slackbuilds.org> | 2016-10-14 22:20:05 +0700 |
commit | 5e6a573b5acb43f5f6f8432b6f49ec9e08463fe8 (patch) | |
tree | f7b84cc4d6f027c868571e9ed5a1fe0da48a2e16 /system/ossec-local/ossec-local.conf | |
parent | 2a16520e1accca46b48a74a4e5217fb0b1959204 (diff) |
system/ossec-local: Added (Open Source Host-based IDS).
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'system/ossec-local/ossec-local.conf')
-rw-r--r-- | system/ossec-local/ossec-local.conf | 229 |
1 files changed, 229 insertions, 0 deletions
diff --git a/system/ossec-local/ossec-local.conf b/system/ossec-local/ossec-local.conf new file mode 100644 index 0000000000000..9e7ca62e6bfa7 --- /dev/null +++ b/system/ossec-local/ossec-local.conf @@ -0,0 +1,229 @@ +<!-- OSSEC Slackware example config --> +<!-- Written by Mario Preksavec <mario at slackware dot hr> --> + +<ossec_config> + <global> + <email_notification>no</email_notification> + <email_to>root@example.com</email_to> + <smtp_server>smtp.example.com</smtp_server> + <email_from>ossecm@ossec.example.com</email_from> + </global> + + <rules> + <include>rules_config.xml</include> + <include>pam_rules.xml</include> + <include>sshd_rules.xml</include> + <include>telnetd_rules.xml</include> + <include>syslog_rules.xml</include> + <include>arpwatch_rules.xml</include> + <include>symantec-av_rules.xml</include> + <include>symantec-ws_rules.xml</include> + <include>pix_rules.xml</include> + <include>named_rules.xml</include> + <include>smbd_rules.xml</include> + <include>vsftpd_rules.xml</include> + <include>pure-ftpd_rules.xml</include> + <include>proftpd_rules.xml</include> + <include>ms_ftpd_rules.xml</include> + <include>ftpd_rules.xml</include> + <include>hordeimp_rules.xml</include> + <include>roundcube_rules.xml</include> + <include>wordpress_rules.xml</include> + <include>cimserver_rules.xml</include> + <include>vpopmail_rules.xml</include> + <include>vmpop3d_rules.xml</include> + <include>courier_rules.xml</include> + <include>web_rules.xml</include> + <include>web_appsec_rules.xml</include> + <include>apache_rules.xml</include> + <include>nginx_rules.xml</include> + <include>php_rules.xml</include> + <include>mysql_rules.xml</include> + <include>postgresql_rules.xml</include> + <include>ids_rules.xml</include> + <include>squid_rules.xml</include> + <include>firewall_rules.xml</include> + <include>apparmor_rules.xml</include> + <include>cisco-ios_rules.xml</include> + <include>netscreenfw_rules.xml</include> + <include>sonicwall_rules.xml</include> + <include>postfix_rules.xml</include> + <include>sendmail_rules.xml</include> + <include>imapd_rules.xml</include> + <include>mailscanner_rules.xml</include> + <include>dovecot_rules.xml</include> + <include>ms-exchange_rules.xml</include> + <include>racoon_rules.xml</include> + <include>vpn_concentrator_rules.xml</include> + <include>spamd_rules.xml</include> + <include>msauth_rules.xml</include> + <include>mcafee_av_rules.xml</include> + <include>trend-osce_rules.xml</include> + <include>ms-se_rules.xml</include> + <!-- <include>policy_rules.xml</include> --> + <include>zeus_rules.xml</include> + <include>solaris_bsm_rules.xml</include> + <include>vmware_rules.xml</include> + <include>ms_dhcp_rules.xml</include> + <include>asterisk_rules.xml</include> + <include>ossec_rules.xml</include> + <include>attack_rules.xml</include> + <include>systemd_rules.xml</include> + <include>firewalld_rules.xml</include> + <include>dropbear_rules.xml</include> + <include>unbound_rules.xml</include> + <include>sysmon_rules.xml</include> + <include>opensmtpd_rules.xml</include> + <include>local_rules.xml</include> + </rules> + + <syscheck> + <!-- Frequency that syscheck is executed -- default every 20 hours --> + <frequency>72000</frequency> + + <!-- Directories to check (perform all possible verifications) --> + <directories check_all="yes">/etc,/usr/bin,/usr/sbin</directories> + <directories check_all="yes">/bin,/sbin,/boot</directories> + + <!-- Files/directories to ignore --> + <ignore>/etc/mtab</ignore> + <ignore>/etc/hosts.deny</ignore> + <ignore>/etc/mail/statistics</ignore> + <ignore>/etc/random-seed</ignore> + <ignore>/etc/adjtime</ignore> + <ignore>/etc/ntp/drift</ignore> + </syscheck> + + <rootcheck> + <rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files> + <rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans> + <system_audit>/var/ossec/etc/shared/system_audit_rcl.txt</system_audit> + <system_audit>/var/ossec/etc/shared/cis_debian_linux_rcl.txt</system_audit> + <system_audit>/var/ossec/etc/shared/cis_rhel_linux_rcl.txt</system_audit> + <system_audit>/var/ossec/etc/shared/cis_rhel5_linux_rcl.txt</system_audit> + <system_audit>/var/ossec/etc/shared/cis_rhel6_linux_rcl.txt</system_audit> + <system_audit>/var/ossec/etc/shared/cis_rhel7_linux_rcl.txt</system_audit> + </rootcheck> + + <global> + <white_list>127.0.0.1</white_list> + <white_list>::1</white_list> + </global> + + <alerts> + <log_alert_level>1</log_alert_level> + <email_alert_level>7</email_alert_level> + </alerts> + + <command> + <name>host-deny</name> + <executable>host-deny.sh</executable> + <expect>srcip</expect> + <timeout_allowed>yes</timeout_allowed> + </command> + + <command> + <name>firewall-drop</name> + <executable>firewall-drop.sh</executable> + <expect>srcip</expect> + <timeout_allowed>yes</timeout_allowed> + </command> + + <command> + <name>disable-account</name> + <executable>disable-account.sh</executable> + <expect>user</expect> + <timeout_allowed>yes</timeout_allowed> + </command> + + <!-- Active Response Config --> + <active-response> + <!-- This response is going to execute the host-deny + - command for every event that fires a rule with + - level (severity) >= 6. + - The IP is going to be blocked for 600 seconds. + --> + <command>host-deny</command> + <location>local</location> + <level>6</level> + <timeout>600</timeout> + </active-response> + + <active-response> + <!-- Firewall Drop response. Block the IP for + - 600 seconds on the firewall (iptables, + - ipfilter, etc). + --> + <command>firewall-drop</command> + <location>local</location> + <level>6</level> + <timeout>600</timeout> + </active-response> + + <!-- Files to monitor (localfiles) --> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/messages</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/syslog</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/debug</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/secure</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/cron</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/maillog</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/spooler</location> + </localfile> + + <localfile> + <log_format>apache</log_format> + <location>/var/log/httpd/access_log</location> + </localfile> + + <localfile> + <log_format>apache</log_format> + <location>/var/log/httpd/error_log</location> + </localfile> + + <localfile> + <log_format>command</log_format> + <command>df -h</command> + </localfile> + + <localfile> + <log_format>full_command</log_format> + <command>netstat -tan | grep LISTEN | grep -v 127.0.0.1 | sort</command> + </localfile> + + <localfile> + <log_format>full_command</log_format> + <command>last -n 5</command> + </localfile> + + <localfile> + <log_format>full_command</log_format> + <command>lastb -n 5</command> + </localfile> +</ossec_config> |