[ossec-list] Re: alerts.log audit

2013-03-20 Thread shadejinx
There is no reliable way to tell that an interactive user has "logged off" in Windows. Mostly because AD doesn't record an interactive logoff on the domain controller. All the log-off messages you see on the DC are for network sessions (e.g. accessing network drives/printers). You can get some

[ossec-list] Windows DHCP Decoder and rules

2009-04-28 Thread shadejinx
I wrote a decoder for Windows DHCP server logs that are being collected through Epilog. It would be easy to adapt it to fit other transport mechanisms. (ie NTSyslog, LASSO, etc...) I hope this helps someone. decoder.xml IISWebLog|DHCPLog\s\d windows-epilog true

[ossec-list] Re: Windows x64 boot failure w/ v1.6.1

2008-12-04 Thread shadejinx
I have v1.6.1 running in a 64-bit Windows 2003 environment with no problems. On Dec 3, 6:37 am, [EMAIL PROTECTED] wrote: > Installing v1.6.1 agent on 64-bit Windows 2003 server appears to have > corrupted the event logs and sent the server into endless reboot > cycle. > > Windows 2003 Server STD

[ossec-list] Re: McAfee alerts not showing up

2008-12-01 Thread shadejinx
Correct, 8.5.0i On Nov 21, 8:45 pm, Michael Starks <[EMAIL PROTECTED]> wrote: > shadejinx wrote: > > I installed an OSSEC agent on our McAfee server and most alerts are > > not being picked up by OSSEC.  After some research into the rules, I > > think I found the cu

[ossec-list] OSSEC and the ISA 2004/2006 Firewall

2008-11-26 Thread shadejinx
I noticed the wiki has some ISA firewall samples. Does 1.6.1 parse these yet?

[ossec-list] Re: Built-in reports with OSSEC - open for ideas and comments

2008-11-26 Thread shadejinx
Separate reports are nice, but the I think the timely nature of IDS information makes them ultimately useless for the function if the IDS. Following that train of thought, they are probably best suited for people who are a step or two removed from the monitoring or operation of the IDS; managers

[ossec-list] Re: OSSEC via Splunk

2008-11-25 Thread shadejinx
Man, you Splunk guys are on the ball. Nice, I'll try that search, but it doesn't look efficient enough to run in near real time, especially when parsing the uselessly verbose Windows event logs. On Nov 23, 4:27 am, Raffy <[EMAIL PROTECTED]> wrote: > > Excellent question, and the answer is twofol

[ossec-list] McAfee alerts not showing up

2008-11-21 Thread shadejinx
I installed an OSSEC agent on our McAfee server and most alerts are not being picked up by OSSEC. After some research into the rules, I think I found the culprit. 18101,18102,18103 windows ^McLogEvent Grouping of McAfee Windows AV rules. This rule is not always true. McAfee a

[ossec-list] Re: OSSEC via Splunk

2008-11-20 Thread shadejinx
than having it parse the files.  For the few servers that I have been > testing OSSEC on (about 10), the output has been easy to parse for the events > I have been looking for. > > -Original Message- > From: ossec-list@googlegroups.com [mailto:[EMAIL PROTECTED] On Behalf Of

[ossec-list] OSSEC via Splunk

2008-11-20 Thread shadejinx
So far, I have been unimpressed with the WUI and decided to use Splunk as the interface to OSSEC. If you don't know what Splunk is, head to www.splunk.com and check it out. It's a fantastic product for correlating log data, and there's a free version that's perfect for the volume of data output

[ossec-list] msauth-rules.xml

2008-10-24 Thread shadejinx
In the most current msauth-rules.xml, eventid 680 is disabled, stating that it is a duplicate. Unfortunately that is not the case. A failed 680 event is how a Windows 2003 Server AD controller denotes a failed NTLM login. A failed 672 is how it denotes failed Kerberos connections. These attemp

[ossec-list] Re: OSSEC 1.6 Windows client memory usage

2008-10-02 Thread shadejinx
I noticed this. There appears to be a memory leak with event log monitoring. I commented that portion out of the config and haven't had any memory problems. To get the event logs off, I installed SNARE and had it forward them to OSSEC. (or rather, to a syslog-ng separated file that the OSSEC s