225 lines
6.9 KiB
Plaintext
225 lines
6.9 KiB
Plaintext
|
<!-- OSSEC example config -->
|
||
|
|
||
|
<ossec_config>
|
||
|
<global>
|
||
|
<!—Our LAN -->
|
||
|
<white_list>192.168.0.0/24</white_list>
|
||
|
<!-- Server -->
|
||
|
<white_list>127.0.0.1</white_list>
|
||
|
<white_list>192.168.0.10</white_list>
|
||
|
<white_list>1.1.1.1</white_list>
|
||
|
<email_notification>yes</email_notification>
|
||
|
<email_to>root@localhost</email_to>
|
||
|
<smtp_server>127.0.0.1</smtp_server>
|
||
|
<email_from>ossecm@localhost</email_from>
|
||
|
</global>
|
||
|
|
||
|
<rules>
|
||
|
<include>rules_config.xml</include>
|
||
|
<include>pam_rules.xml</include>
|
||
|
<include>sshd_rules.xml</include>
|
||
|
<include>telnetd_rules.xml</include>
|
||
|
<include>syslog_rules.xml</include>
|
||
|
<include>arpwatch_rules.xml</include>
|
||
|
<include>symantec-av_rules.xml</include>
|
||
|
<include>symantec-ws_rules.xml</include>
|
||
|
<include>pix_rules.xml</include>
|
||
|
<include>named_rules.xml</include>
|
||
|
<include>smbd_rules.xml</include>
|
||
|
<include>vsftpd_rules.xml</include>
|
||
|
<include>pure-ftpd_rules.xml</include>
|
||
|
<include>proftpd_rules.xml</include>
|
||
|
<include>ms_ftpd_rules.xml</include>
|
||
|
<include>ftpd_rules.xml</include>
|
||
|
<include>hordeimp_rules.xml</include>
|
||
|
<include>roundcube_rules.xml</include>
|
||
|
<include>wordpress_rules.xml</include>
|
||
|
<include>cimserver_rules.xml</include>
|
||
|
<include>vpopmail_rules.xml</include>
|
||
|
<include>vmpop3d_rules.xml</include>
|
||
|
<include>courier_rules.xml</include>
|
||
|
<include>web_rules.xml</include>
|
||
|
<include>web_appsec_rules.xml</include>
|
||
|
<include>apache_rules.xml</include>
|
||
|
<include>nginx_rules.xml</include>
|
||
|
<include>php_rules.xml</include>
|
||
|
<include>mysql_rules.xml</include>
|
||
|
<include>postgresql_rules.xml</include>
|
||
|
<include>ids_rules.xml</include>
|
||
|
<include>squid_rules.xml</include>
|
||
|
<include>firewall_rules.xml</include>
|
||
|
<include>apparmor_rules.xml</include>
|
||
|
<include>cisco-ios_rules.xml</include>
|
||
|
<include>netscreenfw_rules.xml</include>
|
||
|
<include>sonicwall_rules.xml</include>
|
||
|
<include>postfix_rules.xml</include>
|
||
|
<include>sendmail_rules.xml</include>
|
||
|
<include>imapd_rules.xml</include>
|
||
|
<include>mailscanner_rules.xml</include>
|
||
|
<include>dovecot_rules.xml</include>
|
||
|
<include>ms-exchange_rules.xml</include>
|
||
|
<include>racoon_rules.xml</include>
|
||
|
<include>vpn_concentrator_rules.xml</include>
|
||
|
<include>spamd_rules.xml</include>
|
||
|
<include>msauth_rules.xml</include>
|
||
|
<include>mcafee_av_rules.xml</include>
|
||
|
<include>trend-osce_rules.xml</include>
|
||
|
<include>ms-se_rules.xml</include>
|
||
|
<!-- <include>policy_rules.xml</include> -->
|
||
|
<include>zeus_rules.xml</include>
|
||
|
<include>solaris_bsm_rules.xml</include>
|
||
|
<include>vmware_rules.xml</include>
|
||
|
<include>ms_dhcp_rules.xml</include>
|
||
|
<include>asterisk_rules.xml</include>
|
||
|
<include>ossec_rules.xml</include>
|
||
|
<include>attack_rules.xml</include>
|
||
|
<include>dropbear_rules.xml</include>
|
||
|
<include>unbound_rules.xml</include>
|
||
|
<include>sysmon_rules.xml</include>
|
||
|
<include>opensmtpd_rules.xml</include>
|
||
|
<include>exim_rules.xml</include>
|
||
|
<include>openbsd-dhcpd_rules.xml</include>
|
||
|
<include>dnsmasq_rules.xml</include>
|
||
|
<include>local_rules.xml</include>
|
||
|
</rules>
|
||
|
|
||
|
|
||
|
<syscheck>
|
||
|
<!-- Frequency that syscheck is executed -- default every 20 hours -->
|
||
|
<frequency>79200</frequency>
|
||
|
<alert_new_files>yes</alert_new_files>
|
||
|
<!-- Directories to check (perform all possible verifications) -->
|
||
|
<directories check_all="yes" realtime="yes">/etc,/usr/bin,/usr/sbin</directories>
|
||
|
<directories check_all="yes" realtime="yes">/var/www,/bin,/sbin,/boot</directories>
|
||
|
|
||
|
<!-- Files/directories to ignore -->
|
||
|
<ignore>/etc/mtab</ignore>
|
||
|
<ignore>/etc/hosts.deny</ignore>
|
||
|
<ignore>/etc/mail/statistics</ignore>
|
||
|
<ignore>/etc/random-seed</ignore>
|
||
|
<ignore>/etc/random.seed</ignore>
|
||
|
<ignore>/etc/adjtime</ignore>
|
||
|
<ignore>/etc/httpd/logs</ignore>
|
||
|
|
||
|
<!-- Check the file, but never compute the diff -->
|
||
|
<nodiff>/etc/ssl/private.key</nodiff>
|
||
|
</syscheck>
|
||
|
|
||
|
<rootcheck>
|
||
|
<rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files>
|
||
|
<rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans>
|
||
|
<system_audit>/var/ossec/etc/shared/system_audit_rcl.txt</system_audit>
|
||
|
<system_audit>/var/ossec/etc/shared/cis_debian_linux_rcl.txt</system_audit>
|
||
|
<system_audit>/var/ossec/etc/shared/cis_rhel_linux_rcl.txt</system_audit>
|
||
|
<system_audit>/var/ossec/etc/shared/cis_rhel5_linux_rcl.txt</system_audit>
|
||
|
</rootcheck>
|
||
|
|
||
|
<alerts>
|
||
|
<log_alert_level>1</log_alert_level>
|
||
|
<email_alert_level>7</email_alert_level>
|
||
|
</alerts>
|
||
|
|
||
|
<remote>
|
||
|
<connection>syslog</connection>
|
||
|
<allowed-ips>any</allowed-ips>
|
||
|
</remote>
|
||
|
|
||
|
<remote>
|
||
|
<connection>secure</connection>
|
||
|
</remote>
|
||
|
|
||
|
<command>
|
||
|
<name>host-deny</name>
|
||
|
<executable>host-deny.sh</executable>
|
||
|
<expect>srcip</expect>
|
||
|
<timeout_allowed>yes</timeout_allowed>
|
||
|
</command>
|
||
|
|
||
|
<command>
|
||
|
<name>firewall-drop</name>
|
||
|
<executable>firewall-drop.sh</executable>
|
||
|
<expect>srcip</expect>
|
||
|
<timeout_allowed>yes</timeout_allowed>
|
||
|
</command>
|
||
|
|
||
|
<command>
|
||
|
<name>disable-account</name>
|
||
|
<executable>disable-account.sh</executable>
|
||
|
<expect>user</expect>
|
||
|
<timeout_allowed>yes</timeout_allowed>
|
||
|
</command>
|
||
|
|
||
|
|
||
|
<!-- Active Response Config -->
|
||
|
<active-response>
|
||
|
<!-- This response is going to execute the host-deny
|
||
|
- command for every event that fires a rule with
|
||
|
- level (severity) >= 6.
|
||
|
- The IP is going to be blocked for 600 seconds.
|
||
|
-->
|
||
|
<command>host-deny</command>
|
||
|
<location>local</location>
|
||
|
<level>7</level>
|
||
|
<timeout>600</timeout>
|
||
|
</active-response>
|
||
|
|
||
|
<active-response>
|
||
|
<!-- Firewall Drop response. Block the IP for
|
||
|
- 600 seconds on the firewall (iptables,
|
||
|
- ipfilter, etc).
|
||
|
-->
|
||
|
<command>firewall-drop</command>
|
||
|
<location>local</location>
|
||
|
<level>7</level>
|
||
|
<timeout>600</timeout>
|
||
|
</active-response>
|
||
|
|
||
|
<!-- Files to monitor (localfiles) -->
|
||
|
|
||
|
<localfile>
|
||
|
<log_format>syslog</log_format>
|
||
|
<location>/var/log/messages</location>
|
||
|
</localfile>
|
||
|
|
||
|
<localfile>
|
||
|
<log_format>syslog</log_format>
|
||
|
<location>/var/log/authlog</location>
|
||
|
</localfile>
|
||
|
|
||
|
<localfile>
|
||
|
<log_format>syslog</log_format>
|
||
|
<location>/var/log/auth.log</location>
|
||
|
</localfile>
|
||
|
|
||
|
<localfile>
|
||
|
<log_format>syslog</log_format>
|
||
|
<location>/var/log/secure</location>
|
||
|
</localfile>
|
||
|
|
||
|
<localfile>
|
||
|
<log_format>syslog</log_format>
|
||
|
<location>/var/log/xferlog</location>
|
||
|
</localfile>
|
||
|
|
||
|
<localfile>
|
||
|
<log_format>syslog</log_format>
|
||
|
<location>/var/log/maillog</location>
|
||
|
</localfile>
|
||
|
|
||
|
<localfile>
|
||
|
<log_format>apache</log_format>
|
||
|
<location>/var/www/logs/access_log</location>
|
||
|
</localfile>
|
||
|
|
||
|
<localfile>
|
||
|
<log_format>apache</log_format>
|
||
|
<location>/var/www/logs/error_log</location>
|
||
|
</localfile>
|
||
|
|
||
|
<localfile>
|
||
|
<log_format>syslog</log_format>
|
||
|
<location>/var/log/exim_mainlog</location>
|
||
|
</localfile>
|
||
|
|
||
|
</ossec_config>
|