Airgap Rules Fix

This commit is contained in:
Mike Reeves
2023-05-11 16:00:07 -04:00
parent badaab94de
commit a4cd695cc8
5 changed files with 15 additions and 9 deletions

View File

@@ -73,6 +73,7 @@ docker:
- 80:80 - 80:80
- 443:443 - 443:443
- 8443:8443 - 8443:8443
- 7788:7788
custom_bind_mounts: [] custom_bind_mounts: []
extra_hosts: [] extra_hosts: []
'so-playbook': 'so-playbook':

View File

@@ -94,6 +94,9 @@ firewall:
tcp: tcp:
- 5601 - 5601
udp: [] udp: []
localrules:
tcp: - 7788
udp: []
mysql: mysql:
tcp: tcp:
- 3306 - 3306
@@ -181,6 +184,7 @@ firewall:
- influxdb - influxdb
- elasticsearch_rest - elasticsearch_rest
- elasticsearch_node - elasticsearch_node
- localrules
sensor: sensor:
portgroups: portgroups:
- beats_5044 - beats_5044
@@ -364,6 +368,7 @@ firewall:
- elastic_agent_control - elastic_agent_control
- elastic_agent_data - elastic_agent_data
- elastic_agent_update - elastic_agent_update
- localrules
sensor: sensor:
portgroups: portgroups:
- beats_5044 - beats_5044
@@ -501,6 +506,7 @@ firewall:
- elastic_agent_control - elastic_agent_control
- elastic_agent_data - elastic_agent_data
- elastic_agent_update - elastic_agent_update
- localrules
sensor: sensor:
portgroups: portgroups:
- beats_5044 - beats_5044
@@ -648,6 +654,7 @@ firewall:
- elastic_agent_update - elastic_agent_update
- endgame - endgame
- strelka_frontend - strelka_frontend
- localrules
fleet: fleet:
portgroups: portgroups:
- elasticsearch_rest - elasticsearch_rest
@@ -1005,6 +1012,7 @@ firewall:
- elasticsearch_rest - elasticsearch_rest
- elasticsearch_node - elasticsearch_node
- elastic_agent_control - elastic_agent_control
- localrules
sensor: sensor:
portgroups: portgroups:
- beats_5044 - beats_5044

View File

@@ -118,6 +118,9 @@ firewall:
kibana: kibana:
tcp: *tcpsettings tcp: *tcpsettings
udp: *udpsettings udp: *udpsettings
localrules:
tcp: *tcpsettings
udp: *udpsettings
mysql: mysql:
tcp: *tcpsettings tcp: *tcpsettings
udp: *udpsettings udp: *udpsettings

View File

@@ -4,7 +4,7 @@
{%- if GLOBALS.airgap is sameas true -%} {%- if GLOBALS.airgap is sameas true -%}
--merged=/opt/so/rules/nids/all.rules --merged=/opt/so/rules/nids/all.rules
--local=/opt/so/rules/nids/local.rules --local=/opt/so/rules/nids/local.rules
{%- if GLOBAL.md_engine == "SURICATA" %} {%- if GLOBALS.md_engine == "SURICATA" %}
--local=/opt/so/rules/nids/sorules/extraction.rules --local=/opt/so/rules/nids/sorules/extraction.rules
--local=/opt/so/rules/nids/sorules/filters.rules --local=/opt/so/rules/nids/sorules/filters.rules
{%- endif %} {%- endif %}

View File

@@ -37,14 +37,8 @@ logCmd() {
airgap_rules() { airgap_rules() {
# Copy the rules for suricata if using Airgap # Copy the rules for suricata if using Airgap
mkdir -p /nsm/repo/rules mkdir -p /nsm/rules
cp -v /root/SecurityOnion/agrules/emerging-all.rules /nsm/repo/rules/ cp -Rv /root/SecurityOnion/agrules/* /nsm/rules/
# Copy over sigma rules
cp -Rv /root/SecurityOnion/agrules/sigma /nsm/repo/rules/
# Don't leave Strelka out
cp -Rv /root/SecurityOnion/agrules/strelka /nsm/repo/rules/
} }
add_admin_user() { add_admin_user() {