diff --git a/salt/firewall/init.sls b/salt/firewall/init.sls index a26993cc0..657ff7814 100644 --- a/salt/firewall/init.sls +++ b/salt/firewall/init.sls @@ -359,6 +359,17 @@ enable_minion_osquery_8080_{{ip}}: - position: 1 - save: True +enable_minion_wazuh_55000_{{ip}}: + iptables.insert: + - table: filter + - chain: DOCKER-USER + - jump: ACCEPT + - proto: tcp + - source: {{ ip }} + - dport: 55000 + - position: 1 + - save: True + {% endfor %} # Allow Forward Nodes to send their beats traffic diff --git a/salt/wazuh/files/agent/wazuh-register-agent b/salt/wazuh/files/agent/wazuh-register-agent index 8a8c2ab7f..ae6ddee60 100755 --- a/salt/wazuh/files/agent/wazuh-register-agent +++ b/salt/wazuh/files/agent/wazuh-register-agent @@ -24,7 +24,7 @@ ### # Connection variables -API_IP="localhost" +API_IP="{{ ip }}" API_PORT="55000" PROTOCOL="https" USER="foo" diff --git a/salt/wazuh/files/server/ossec.conf b/salt/wazuh/files/server/ossec.conf new file mode 100644 index 000000000..9d6fa94bf --- /dev/null +++ b/salt/wazuh/files/server/ossec.conf @@ -0,0 +1,220 @@ + + + + + yes + yes + yes + yes + no + smtp.example.wazuh.com + ossecm@example.wazuh.com + recipient@example.wazuh.com + 12 + + + + 1 + 7 + + + + secure + 1514 + udp + + + + + no + yes + yes + yes + yes + yes + yes + yes + yes + + + 43200 + + /var/ossec/etc/shared/rootkit_files.txt + /var/ossec/etc/shared/rootkit_trojans.txt + + /var/ossec/etc/shared/system_audit_rcl.txt + /var/ossec/etc/shared/system_audit_ssh.txt + /var/ossec/etc/shared/cis_rhel7_linux_rcl.txt + + yes + + + + yes + 1800 + 1d + yes + + + xccdf_org.ssgproject.content_profile_pci-dss + xccdf_org.ssgproject.content_profile_common + + + + + + no + + + 43200 + + yes + + + yes + + + no + + + /etc,/usr/bin,/usr/sbin + /bin,/sbin,/boot + + + /etc/mtab + /etc/hosts.deny + /etc/mail/statistics + /etc/random-seed + /etc/random.seed + /etc/adjtime + /etc/httpd/logs + /etc/utmpx + /etc/wtmpx + /etc/cups/certs + /etc/dumpdates + /etc/svc/volatile + + + ^/proc + .log$|.swp$ + + + /etc/ssl/private.key + + yes + + + + + 127.0.0.1 + ^localhost.localdomain$ + 10.0.0.2 + + + + disable-account + disable-account.sh + user + yes + + + + restart-ossec + restart-ossec.sh + + + + + firewall-drop + firewall-drop.sh + srcip + yes + + + + host-deny + host-deny.sh + srcip + yes + + + + route-null + route-null.sh + srcip + yes + + + + win_route-null + route-null.cmd + srcip + yes + + + + + + host-deny + local + 6 + 600 + + + + + firewall-drop + local + 6 + 600 + + + + + command + df -P + 360 + + + + full_command + netstat -tulpn | sed 's/\([[:alnum:]]\+\)\ \+[[:digit:]]\+\ \+[[:digit:]]\+\ \+\(.*\):\([[:digit:]]*\)\ \+\([0-9\.\:\*]\+\).\+\ \([[:digit:]]*\/[[:alnum:]\-]*\).*/\1 \2 == \3 == \4 \5/' | sort -k 4 -g | sed 's/ == \(.*\) ==/:\1/' | sed 1,2d + netstat listening ports + 360 + + + + full_command + last -n 20 + 360 + + + + syslog + /var/ossec/logs/active-responses.log + + + + + ruleset/decoders + ruleset/rules + 0215-policy_rules.xml + etc/lists/audit-keys + + + etc/decoders + etc/rules + + + diff --git a/salt/wazuh/init.sls b/salt/wazuh/init.sls index a0ea9a1f0..322ce4883 100644 --- a/salt/wazuh/init.sls +++ b/salt/wazuh/init.sls @@ -73,6 +73,15 @@ wazuhagentconf: - group: 945 - template: jinja +# Add Wazuh server conf +wazuhserverconf: + file.managed: + - name: /opt/so/conf/wazuh/etc/ossec.conf + - source: salt://wazuh/files/server/ossec.conf + - user: 0 + - group: 945 + - template: jinja + # Add Wazuh agent conf wazuhagentregister: file.managed: