diff --git a/salt/bro/files/local.bro.community b/salt/bro/files/local.bro.community new file mode 100644 index 000000000..ee79789f5 --- /dev/null +++ b/salt/bro/files/local.bro.community @@ -0,0 +1,129 @@ +##! Local site policy. Customize as appropriate. +##! +##! This file will not be overwritten when upgrading or reinstalling! + +# This script logs which scripts were loaded during each run. +@load misc/loaded-scripts + +# Apply the default tuning scripts for common tuning settings. +@load tuning/defaults + +# Estimate and log capture loss. +@load misc/capture-loss + +# Enable logging of memory, packet and lag statistics. +@load misc/stats + +# Load the scan detection script. +@load misc/scan + +# Detect traceroute being run on the network. This could possibly cause +# performance trouble when there are a lot of traceroutes on your network. +# Enable cautiously. +#@load misc/detect-traceroute + +# Generate notices when vulnerable versions of software are discovered. +# The default is to only monitor software found in the address space defined +# as "local". Refer to the software framework's documentation for more +# information. +@load frameworks/software/vulnerable + +# Detect software changing (e.g. attacker installing hacked SSHD). +@load frameworks/software/version-changes + +# This adds signatures to detect cleartext forward and reverse windows shells. +@load-sigs frameworks/signatures/detect-windows-shells + +# Load all of the scripts that detect software in various protocols. +@load protocols/ftp/software +@load protocols/smtp/software +@load protocols/ssh/software +@load protocols/http/software +# The detect-webapps script could possibly cause performance trouble when +# running on live traffic. Enable it cautiously. +#@load protocols/http/detect-webapps + +# This script detects DNS results pointing toward your Site::local_nets +# where the name is not part of your local DNS zone and is being hosted +# externally. Requires that the Site::local_zones variable is defined. +@load protocols/dns/detect-external-names + +# Script to detect various activity in FTP sessions. +@load protocols/ftp/detect + +# Scripts that do asset tracking. +@load protocols/conn/known-hosts +@load protocols/conn/known-services +@load protocols/ssl/known-certs + +# This script enables SSL/TLS certificate validation. +@load protocols/ssl/validate-certs + +# This script prevents the logging of SSL CA certificates in x509.log +@load protocols/ssl/log-hostcerts-only + +# Uncomment the following line to check each SSL certificate hash against the ICSI +# certificate notary service; see http://notary.icsi.berkeley.edu . +# @load protocols/ssl/notary + +# If you have libGeoIP support built in, do some geographic detections and +# logging for SSH traffic. +@load protocols/ssh/geo-data +# Detect hosts doing SSH bruteforce attacks. +@load protocols/ssh/detect-bruteforcing +# Detect logins using "interesting" hostnames. +@load protocols/ssh/interesting-hostnames + +# Detect SQL injection attacks. +@load protocols/http/detect-sqli + +#### Network File Handling #### + +# Enable MD5 and SHA1 hashing for all files. +@load frameworks/files/hash-all-files + +# Detect SHA1 sums in Team Cymru's Malware Hash Registry. +@load frameworks/files/detect-MHR + +# Uncomment the following line to enable detection of the heartbleed attack. Enabling +# this might impact performance a bit. +# @load policy/protocols/ssl/heartbleed + +# Uncomment the following line to enable logging of connection VLANs. Enabling +# this adds two VLAN fields to the conn.log file. This may not work properly +# since we use AF_PACKET and it strips VLAN tags. +# @load policy/protocols/conn/vlan-logging + +# Uncomment the following line to enable logging of link-layer addresses. Enabling +# this adds the link-layer address for each connection endpoint to the conn.log file. +# @load policy/protocols/conn/mac-logging + +# Uncomment the following line to enable the SMB analyzer. The analyzer +# is currently considered a preview and therefore not loaded by default. +# @load policy/protocols/smb + +# Add the interface to the log event +#@load securityonion/add-interface-to-logs.bro + +# Add Sensor Name to the conn.log +#@load securityonion/conn-add-sensorname.bro + +# File Extraction +#@load securityonion/file-extraction + +# Intel from Mandiant APT1 Report +#@load securityonion/apt1 + +# ShellShock - detects successful exploitation of Bash vulnerability CVE-2014-6271 +#@load securityonion/shellshock + +# JA3 - SSL Detection Goodness +@load policy/ja3 + +# You can load your own intel into: +# /opt/so/saltstack/bro/policy/intel/ on the master +@load intel + +# Load a custom Bro policy +# /opt/so/saltstack/bro/policy/custom/ on the master +#@load custom/somebropolicy.bro