Re: [ossec-list] Is there a way to send AGENT's ossec.log to syslog server using ryslog.conf
You could have ossec monitor ossec.log like it does with active- responses.log. You'd just have to write rules for it, or barring that turn on archives.log -Scott On Mon, 2019-03-25 at 08:02 -0400, dan (ddp) wrote: > On Fri, Mar 22, 2019 at 12:01 PM YoYo wrote: > > Hi All, > > > > We are planning to deploy the HIDS agent in large network (say 10k > > servers). > > > > I need to track the agent installation, key registration & startup > > failure. > > > > Is there any way to send AGENT's logs/ossec.log to some external > > syslog server or to the server configured syslog.conf? > > > > Is there any way to achieve this in Agent side or some work around > > to do this? > > > > The agent doesn't have any built-in way to do this. > You could use your syslog daemon to read the file and forward the > logs. I'm pretty sure rsyslogd can do this, not sure about the > others. > > > Apologies if it is a duplicate discussion. I couldn't able to find > > one. > > > > Thanks in advance. > > > > Thanks & Regards, > > Vijay. > > > > -- > > > > --- > > You received this message because you are subscribed to the Google > > Groups "ossec-list" group. > > To unsubscribe from this group and stop receiving emails from it, > > send an email to ossec-list+unsubscr...@googlegroups.com. > > For more options, visit https://groups.google.com/d/optout. -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to ossec-list+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [ossec-list] Updates rules and signatures
They're internal to the package *for the moment*, so when we release an OSSEC update the new rules come along with it. When you update to 2.9.1 its going to update the rules along with it. Eventually we're going to break the more dynamic content (rules, decoders, etc) into a separate package. Hope this helps! -Scott CTO, Atomicorp On Sat, 2017-06-10 at 20:19 -0400, dan (ddp) wrote: > On Thu, Jun 8, 2017 at 2:01 PM, Alexis Lessard >wrote: > > Do you update the version every time you add new rules? We've > > manage to > > install with with yum using atomicorp repo's, so if you could > > update them > > with yum, that'd much easier. > > > > Atomic may update the rules separately. I don't use the packages, so > I > do not know. > > > > > > > > -- > > > > --- > > You received this message because you are subscribed to the Google > > Groups > > "ossec-list" group. > > To unsubscribe from this group and stop receiving emails from it, > > send an > > email to ossec-list+unsubscr...@googlegroups.com. > > For more options, visit https://groups.google.com/d/optout. > > -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to ossec-list+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.
RE: [ossec-list] Detecting changes to running processes ports
If you could send me your changes I can get those added into the main package too. -Scott On Thu, 2010-08-26 at 11:41 -0400, David Porcello wrote: Indeed I am. Specifically, here are the Atomic packages I installed: inotify-tools-3.11-1.el5.art.x86_64.rpm ossec-hids-2.4-1.el5.art.x86_64.rpm ossec-hids-client-2.4-1.el5.art.x86_64.rpm Would be great to see your SPEC fix if you'd like to share. Otherwise I'll just build a new RPM from source. Thanks!! d. -Original Message- From: ossec-list@googlegroups.com [mailto:ossec-l...@googlegroups.com] On Behalf Of Jason 'XenoPhage' Frisvold Sent: Wednesday, August 18, 2010 4:25 PM To: ossec-list@googlegroups.com Subject: Re: [ossec-list] Detecting changes to running processes ports -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Aug 12, 2010, at 11:53 AM, David Porcello wrote: Hi all, I'm running OSSEC client 2.4.1 on a handful of RedHat EL 5.5 servers and I'm seeing the following behavior across the board: It appears that client-logcollector and client-syscheckd aren't detected as running, and therefore aren't stopped by ossec-control. If these daemons aren't killed, multiple instances begin building up with each start or restart request, and new agent.conf configs are prevented from loading. Are you, perchance, running the atomicturtle RPM version of ossec? Specifically version 2.4.1-4 ? If so, I think this is a bug in that RPM causing the problem.. I have a SPEC that fixes the problem if you want it, though it removes all of the atomicturtle specific stuff (rules, decoders, etc). Found a couple related threads, but none with a resolution. Anyone else seeing this? Thanks, d. - --- Jason 'XenoPhage' Frisvold xenoph...@godshell.com - --- Any sufficiently advanced magic is indistinguishable from technology. - - Niven's Inverse of Clarke's Third Law -BEGIN PGP SIGNATURE- Version: GnuPG/MacGPG2 v2.0.14 (Darwin) iEYEARECAAYFAkxsQZ0ACgkQ8CjzPZyTUTSQWQCgmLRn3ZAjHP8eZqYvinCFZ4+d nqUAn0CoHOSjIEBoJAyuhxy4wYBXynSb =g6SA -END PGP SIGNATURE- NOTICE: The information contained in this e-mail and any attachments is intended solely for the recipient(s) named above, and may be confidential and legally privileged. If you received this e-mail in error, please notify the sender immediately by return e-mail and delete the original message and any copy of it from your computer system. If you are not the intended recipient, you are hereby notified that any review, disclosure, retransmission, dissemination, distribution, copying, or other use of this e-mail, or any of its contents, is strictly prohibited. Although this e-mail and any attachments are believed to be free of any virus or other defects, it is the responsibility of the recipient to ensure that it is virus-free and no responsibility is accepted by the sender for any loss or damage arising if such a virus or defect exists.
[ossec-list] Release Announcement: OSSEC-HODS 2.0 RPM packages for CentOS, RHEL, Fedora
This is an initial release of OSSEC-HIDS 2.0 from the [atomic] rpm repository for: * CentOS 4 * CentOS 5 * RHEL 4 * RHEL 5 * Fedora 4-10 available for both i386 and x86_64 platforms. The atomic yum repository is located at: http://www.atomicrocketturtle.com Short Installation instructions: Step 1) Configure the repository for your system using the installer wget -q -O - http://www.atomicorp.com/installers/atomic |sh Step 2) Install OSSEC server yum install ossec-hids ossec-server or for clients yum install ossec-hids ossec-client -Scott