aboutsummaryrefslogtreecommitdiff
path: root/system/ossec-server/ossec-server.conf
diff options
context:
space:
mode:
Diffstat (limited to 'system/ossec-server/ossec-server.conf')
-rw-r--r--system/ossec-server/ossec-server.conf233
1 files changed, 233 insertions, 0 deletions
diff --git a/system/ossec-server/ossec-server.conf b/system/ossec-server/ossec-server.conf
new file mode 100644
index 000000000000..5befd2db7ab6
--- /dev/null
+++ b/system/ossec-server/ossec-server.conf
@@ -0,0 +1,233 @@
+<!-- OSSEC Slackware example config -->
+<!-- Written by Mario Preksavec <mario at slackware dot hr> -->
+
+<ossec_config>
+ <global>
+ <email_notification>no</email_notification>
+ <email_to>root@example.com</email_to>
+ <smtp_server>smtp.example.com</smtp_server>
+ <email_from>ossecm@ossec.example.com</email_from>
+ </global>
+
+ <rules>
+ <include>rules_config.xml</include>
+ <include>pam_rules.xml</include>
+ <include>sshd_rules.xml</include>
+ <include>telnetd_rules.xml</include>
+ <include>syslog_rules.xml</include>
+ <include>arpwatch_rules.xml</include>
+ <include>symantec-av_rules.xml</include>
+ <include>symantec-ws_rules.xml</include>
+ <include>pix_rules.xml</include>
+ <include>named_rules.xml</include>
+ <include>smbd_rules.xml</include>
+ <include>vsftpd_rules.xml</include>
+ <include>pure-ftpd_rules.xml</include>
+ <include>proftpd_rules.xml</include>
+ <include>ms_ftpd_rules.xml</include>
+ <include>ftpd_rules.xml</include>
+ <include>hordeimp_rules.xml</include>
+ <include>roundcube_rules.xml</include>
+ <include>wordpress_rules.xml</include>
+ <include>cimserver_rules.xml</include>
+ <include>vpopmail_rules.xml</include>
+ <include>vmpop3d_rules.xml</include>
+ <include>courier_rules.xml</include>
+ <include>web_rules.xml</include>
+ <include>web_appsec_rules.xml</include>
+ <include>apache_rules.xml</include>
+ <include>nginx_rules.xml</include>
+ <include>php_rules.xml</include>
+ <include>mysql_rules.xml</include>
+ <include>postgresql_rules.xml</include>
+ <include>ids_rules.xml</include>
+ <include>squid_rules.xml</include>
+ <include>firewall_rules.xml</include>
+ <include>apparmor_rules.xml</include>
+ <include>cisco-ios_rules.xml</include>
+ <include>netscreenfw_rules.xml</include>
+ <include>sonicwall_rules.xml</include>
+ <include>postfix_rules.xml</include>
+ <include>sendmail_rules.xml</include>
+ <include>imapd_rules.xml</include>
+ <include>mailscanner_rules.xml</include>
+ <include>dovecot_rules.xml</include>
+ <include>ms-exchange_rules.xml</include>
+ <include>racoon_rules.xml</include>
+ <include>vpn_concentrator_rules.xml</include>
+ <include>spamd_rules.xml</include>
+ <include>msauth_rules.xml</include>
+ <include>mcafee_av_rules.xml</include>
+ <include>trend-osce_rules.xml</include>
+ <include>ms-se_rules.xml</include>
+ <!-- <include>policy_rules.xml</include> -->
+ <include>zeus_rules.xml</include>
+ <include>solaris_bsm_rules.xml</include>
+ <include>vmware_rules.xml</include>
+ <include>ms_dhcp_rules.xml</include>
+ <include>asterisk_rules.xml</include>
+ <include>ossec_rules.xml</include>
+ <include>attack_rules.xml</include>
+ <include>systemd_rules.xml</include>
+ <include>firewalld_rules.xml</include>
+ <include>dropbear_rules.xml</include>
+ <include>unbound_rules.xml</include>
+ <include>sysmon_rules.xml</include>
+ <include>opensmtpd_rules.xml</include>
+ <include>local_rules.xml</include>
+ </rules>
+
+ <syscheck>
+ <!-- Frequency that syscheck is executed -- default every 20 hours -->
+ <frequency>17200</frequency>
+
+ <!-- Directories to check (perform all possible verifications) -->
+ <directories check_all="yes">/etc,/usr/bin,/usr/sbin</directories>
+ <directories check_all="yes">/bin,/sbin,/boot</directories>
+
+ <!-- Files/directories to ignore -->
+ <ignore>/etc/mtab</ignore>
+ <ignore>/etc/hosts.deny</ignore>
+ <ignore>/etc/mail/statistics</ignore>
+ <ignore>/etc/random-seed</ignore>
+ <ignore>/etc/adjtime</ignore>
+ <ignore>/etc/ntp/drift</ignore>
+ </syscheck>
+
+ <rootcheck>
+ <rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files>
+ <rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans>
+ <system_audit>/var/ossec/etc/shared/system_audit_rcl.txt</system_audit>
+ <system_audit>/var/ossec/etc/shared/cis_debian_linux_rcl.txt</system_audit>
+ <system_audit>/var/ossec/etc/shared/cis_rhel_linux_rcl.txt</system_audit>
+ <system_audit>/var/ossec/etc/shared/cis_rhel5_linux_rcl.txt</system_audit>
+ <system_audit>/var/ossec/etc/shared/cis_rhel6_linux_rcl.txt</system_audit>
+ <system_audit>/var/ossec/etc/shared/cis_rhel7_linux_rcl.txt</system_audit>
+ </rootcheck>
+
+ <global>
+ <white_list>127.0.0.1</white_list>
+ <white_list>::1</white_list>
+ </global>
+
+ <remote>
+ <connection>secure</connection>
+ </remote>
+
+ <alerts>
+ <log_alert_level>1</log_alert_level>
+ <email_alert_level>7</email_alert_level>
+ </alerts>
+
+ <command>
+ <name>host-deny</name>
+ <executable>host-deny.sh</executable>
+ <expect>srcip</expect>
+ <timeout_allowed>yes</timeout_allowed>
+ </command>
+
+ <command>
+ <name>firewall-drop</name>
+ <executable>firewall-drop.sh</executable>
+ <expect>srcip</expect>
+ <timeout_allowed>yes</timeout_allowed>
+ </command>
+
+ <command>
+ <name>disable-account</name>
+ <executable>disable-account.sh</executable>
+ <expect>user</expect>
+ <timeout_allowed>yes</timeout_allowed>
+ </command>
+
+ <!-- Active Response Config -->
+ <active-response>
+ <!-- This response is going to execute the host-deny
+ - command for every event that fires a rule with
+ - level (severity) >= 6.
+ - The IP is going to be blocked for 600 seconds.
+ -->
+ <command>host-deny</command>
+ <location>local</location>
+ <level>6</level>
+ <timeout>600</timeout>
+ </active-response>
+
+ <active-response>
+ <!-- Firewall Drop response. Block the IP for
+ - 600 seconds on the firewall (iptables,
+ - ipfilter, etc).
+ -->
+ <command>firewall-drop</command>
+ <location>local</location>
+ <level>6</level>
+ <timeout>600</timeout>
+ </active-response>
+
+ <!-- Files to monitor (localfiles) -->
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/messages</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/syslog</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/debug</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/secure</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/cron</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/maillog</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/spooler</location>
+ </localfile>
+
+ <localfile>
+ <log_format>apache</log_format>
+ <location>/var/log/httpd/access_log</location>
+ </localfile>
+
+ <localfile>
+ <log_format>apache</log_format>
+ <location>/var/log/httpd/error_log</location>
+ </localfile>
+
+ <localfile>
+ <log_format>command</log_format>
+ <command>df -h</command>
+ </localfile>
+
+ <localfile>
+ <log_format>full_command</log_format>
+ <command>netstat -tan | grep LISTEN | grep -v 127.0.0.1 | sort</command>
+ </localfile>
+
+ <localfile>
+ <log_format>full_command</log_format>
+ <command>last -n 5</command>
+ </localfile>
+
+ <localfile>
+ <log_format>full_command</log_format>
+ <command>lastb -n 5</command>
+ </localfile>
+</ossec_config>