Thanks Santiago!

These are great.

How can I import this dashboard into an existing Kibana installation?

Thanks,


On Tuesday, January 5, 2016 at 2:14:47 PM UTC-5, Santiago Bassett wrote:
>
> Hi,
>
> the dashboards we have created can be found here:
>
> https://github.com/wazuh/ossec-wazuh/tree/master/extensions/kibana
>
> Regarding the rules, here is the repo:
>
> https://github.com/wazuh/ossec-rules
>
> When the rule is related to a PCI control, that information is included in 
> the groups section, for example:
>
>   <rule id="18106" level="5">
>
>     <if_sid>18105</if_sid>
>
>     <id>^529$|^530$|^531$|^532$|^533$|^534$|^535$|^536$|^537$|^539$|^4625$
> </id>
>
>     <description>Windows Logon Failure.</description>
>
>     <group>win_authentication_failed,pci_dss_10.2.4,pci_dss_10.2.5,
> </group>
>
>   </rule>
>
>
> This, combined with the modified json output, allow us to create the 
> dashboards for PCI in Kibana. 
>
> On the other hand we are about to publish rules/decoders for Amazon AWS 
> (in case you happen to use it), you can already see the work we are doing 
> in the development branch.
>
> Best
>
> On Tue, Jan 5, 2016 at 7:13 AM, <namobud...@gmail.com <javascript:>> 
> wrote:
>
>> I took a look and it looks great, but I was wondering if you had any 
>> customized dashboards or favorite OSSEC rules to share?
>>
>> Thanks for all the great work.
>>
>>
>>
>> On Tuesday, December 22, 2015 at 10:44:07 PM UTC-5, Santiago Bassett 
>> wrote:
>>>
>>> Hi,
>>>
>>> in case you are interested, we have done some work integrating OSSEC 
>>> with ELK (specially for those using them to be compliant with PCI DSS, not 
>>> sure if this is the case), including the creation of Kibana dashboards.
>>>
>>> We have also created a RESTful API for OSSEC that we plan to use with 
>>> new Kibana plugins functionality (added in version 4.2), to be able to 
>>> monitor/control your OSSEC deployments from Kibana (e.g agent status, 
>>> syscheck or rootcheck settings, agent keys, loaded rules...)
>>>
>>> See more info in our website at: 
>>> http://documentation.wazuh.com/en/latest/ossec_elk.html
>>>
>>> Best regards,
>>>
>>> Santiago.
>>>
>>> On Thu, Dec 17, 2015 at 8:24 AM, <namobud...@gmail.com> wrote:
>>>
>>>> I've been tasked with tuning OSSEC.
>>>>
>>>> I've wondering if there is a general guideline or process. We have 
>>>> OSSEC feeding into ELK stack. What are folks thoughts on tuning vs. coming 
>>>> up with better Kibana hunting searches?
>>>>
>>>> Thanks!
>>>>
>>>> -- 
>>>>
>>>> --- 
>>>> You received this message because you are subscribed to the Google 
>>>> Groups "ossec-list" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send 
>>>> an email to ossec-list+...@googlegroups.com.
>>>> For more options, visit https://groups.google.com/d/optout.
>>>>
>>>
>>> -- 
>>
>> --- 
>> You received this message because you are subscribed to the Google Groups 
>> "ossec-list" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to ossec-list+...@googlegroups.com <javascript:>.
>> For more options, visit https://groups.google.com/d/optout.
>>
>
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to