Thx for the feedback, we used the default rules, and added our filtering to 
the local_rules.xml - also added some extra alerts :)

Op maandag 1 oktober 2012 11:17:09 UTC+2 schreef techs...@ecsc.co.uk het 
volgende:
>
> I would agree with this, get all clients installed and reporting at the 
> beginning otherwise you are tailoring rules to a 'half system'.
>
> If you are concerned about the job of identifying which alerts need tuning 
> I would recommend using AnaLogi (shameless plug), it's graphical and based 
> on graphs, with it you can instantly see which alerts/logs/hosts are the 
> loudest and need tuning first.
>
> When you get all the rules in place and things quieten down, you can 
> always just wipe the logs/database and consider that a baseline/test period.
>
> Andy
>
> On Friday, September 28, 2012 3:43:01 PM UTC+1, ash kumar wrote:
>>
>> It is almost always better to collect everything and start eliminating 
>> events that are not interesting or noisy rather than the other way around. 
>> It does not take as long as you think it would and helps you learn to 
>> navigate OSSEC and understand your traffic patterns better.
>>  
>> Just looking at successful / unsuccessful logons is rather droll and 
>> voluminous in reasonably busy network. You are creating a lot of alert data 
>> and missing out on potentially more interesting activity. In my opinion 
>> logons should be reported on daily for trending statistics or correlated 
>> with other events to be meaningful.
>>  
>> The File Integrity information is limited as it cannot return a lot of 
>> useful information such what the change was or who changed the file and at 
>> what time.
>>  
>> In a nutshell, these goals for the POC virtually ensure disappointment.
>>  
>> Ash
>>
>> On Monday, September 24, 2012 9:43:33 AM UTC-4, dan (ddpbsd) wrote:
>>
>>> On Mon, Sep 24, 2012 at 9:40 AM, Michiel van Es <vanesm...@gmail.com> 
>>> wrote: 
>>> > 
>>> > 
>>> > 2012/9/24 dan (ddp) <ddp...@gmail.com> 
>>> >> 
>>> >> On Mon, Sep 24, 2012 at 9:27 AM, Michiel van Es <vanesm...@gmail.com> 
>>>
>>> >> wrote: 
>>> >> > 
>>> >> > 
>>> >> > 2012/9/24 dan (ddp) <ddp...@gmail.com> 
>>> >> >> 
>>> >> >> On Mon, Sep 24, 2012 at 9:21 AM, Michiel van Es 
>>> >> >> <vanesm...@gmail.com> 
>>> >> >> wrote: 
>>> >> >> > 
>>> >> >> > 
>>> >> >> > 2012/9/24 dan (ddp) <ddp...@gmail.com> 
>>> >> >> > 
>>> >> >> >> On Mon, Sep 24, 2012 at 2:41 AM, Michiel van Es 
>>> >> >> >> <vanesm...@gmail.com> 
>>> >> >> >> wrote: 
>>> >> >> >> > Hello, 
>>> >> >> >> > 
>>> >> >> >> > We are using OSSEC for a PoC and we want to show only some 
>>> alerts 
>>> >> >> >> > initially 
>>> >> >> >> > and expand the alert list. 
>>> >> >> >> > We are using OSSEC 2.6 mixed Windows and Linux agents. 
>>> >> >> >> > 1 Manager and several agents and Splunk on the manager server 
>>> to 
>>> >> >> >> > show 
>>> >> >> >> > the 
>>> >> >> >> > alerts. 
>>> >> >> >> > 
>>> >> >> >> > For now we want to achieve to show only failed and successful 
>>> >> >> >> > logins 
>>> >> >> >> > and 
>>> >> >> >> > file integrity alerts. 
>>> >> >> >> > How can we achieve this? => manually going through all 
>>> rules/xml 
>>> >> >> >> > files 
>>> >> >> >> > and 
>>> >> >> >> > set accordingly all xml entries to 0 or anything else? (0 
>>> meaning 
>>> >> >> >> > disabled 
>>> >> >> >> > and dont show) or is there an easier way of achieving this? 
>>> >> >> >> > 
>>> >> >> >> > Kind regards, 
>>> >> >> >> > 
>>> >> >> >> > Michiel 
>>> >> >> >> 
>>> >> >> >> >>You can remove entire rules files if you don't want to use 
>>> them. 
>>> >> >> >> >> Just 
>>> >> >> >> >>test your changes (/var/ossec/bin/ossec-logtest -t) after you 
>>> do 
>>> >> >> >> >> this 
>>> >> >> >> >>to make sure you didn't get rid of something necessary. 
>>> >> >> > 
>>> >> >> > 
>>> >> >> > Would you suggest creating specific rules in xml files with the 
>>> >> >> > correct 
>>> >> >> > alerts and move/disable all others and start from there? 
>>> >> >> 
>>> >> >> >>You should do it however you think is best. I don't like this 
>>> >> >> >> approach 
>>> >> >> >>and don't have an opinion on it. 
>>> >> >> 
>>> >> > What would you suggest? 
>>> >> > 
>>> >> 
>>> >> >>I think you should do what works for you. If starting small and 
>>> adding 
>>> >> >>more later is better for your organization, do it. If I was going 
>>> to 
>>> >> >>do it that way I'd probably remove the entries for the rule files 
>>> in 
>>> >> >>/var/ossec/etc/ossec.conf. 
>>> > 
>>> > 
>>> > Clear. 
>>> > Thx will work something out! 
>>> > 
>>> > Michiel 
>>>
>>> Good luck. Hopefully someone who has done something along the lines of 
>>> what you're trying to do can post some tips & tricks. 
>>>
>>

Reply via email to