mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 09:12:45 +01:00
212 lines
6.2 KiB
Plaintext
212 lines
6.2 KiB
Plaintext
{%- if grains['role'] in ['so-manager', 'so-eval', 'so-managersearch', 'so-standalone'] %}
|
|
{%- set ip = salt['pillar.get']('global:managerip', '') %}
|
|
{%- elif grains['role'] == 'so-node' or grains['role'] == 'so-heavynode' %}
|
|
{%- set ip = salt['pillar.get']('elasticsearch:mainip', '') %}
|
|
{%- elif grains['role'] == 'so-sensor' %}
|
|
{%- set ip = salt['pillar.get']('sensor:mainip', '') %}
|
|
{%- else %}
|
|
{%- set mainint = salt['pillar.get']('host:mainint') %}
|
|
{%- set ip = salt['grains.get']('ip_interfaces:' ~ mainint)[0] %}
|
|
{%- endif %}
|
|
<!--
|
|
Wazuh - Agent Configuration
|
|
More info at: https://documentation.wazuh.com
|
|
Mailing list: https://groups.google.com/forum/#!forum/wazuh
|
|
-->
|
|
|
|
<ossec_config>
|
|
<client>
|
|
<server>
|
|
<address>{{ip}}</address>
|
|
<port>1514</port>
|
|
<protocol>udp</protocol>
|
|
</server>
|
|
{%- if grains['os'] == 'Ubuntu' %}
|
|
<config-profile>ubuntu, ubuntu16, ubuntu16.04</config-profile>
|
|
{%- else %}
|
|
<config-profile>centos, centos7</config-profile>
|
|
{%- endif %}
|
|
<notify_time>10</notify_time>
|
|
<time-reconnect>60</time-reconnect>
|
|
<auto_restart>yes</auto_restart>
|
|
<crypto_method>aes</crypto_method>
|
|
</client>
|
|
|
|
<client_buffer>
|
|
<!-- Agent buffer options -->
|
|
<disabled>no</disabled>
|
|
<queue_size>5000</queue_size>
|
|
<events_per_second>500</events_per_second>
|
|
</client_buffer>
|
|
|
|
<!-- Policy monitoring -->
|
|
<rootcheck>
|
|
<disabled>no</disabled>
|
|
<check_unixaudit>yes</check_unixaudit>
|
|
<check_files>yes</check_files>
|
|
<check_trojans>yes</check_trojans>
|
|
<check_dev>yes</check_dev>
|
|
<check_sys>yes</check_sys>
|
|
<check_pids>yes</check_pids>
|
|
<check_ports>yes</check_ports>
|
|
<check_if>yes</check_if>
|
|
|
|
<!-- Frequency that rootcheck is executed - every 12 hours -->
|
|
<frequency>43200</frequency>
|
|
|
|
<rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files>
|
|
<rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans>
|
|
|
|
<system_audit>/var/ossec/etc/shared/system_audit_rcl.txt</system_audit>
|
|
<system_audit>/var/ossec/etc/shared/system_audit_ssh.txt</system_audit>
|
|
|
|
<skip_nfs>yes</skip_nfs>
|
|
</rootcheck>
|
|
|
|
<wodle name="open-scap">
|
|
<disabled>yes</disabled>
|
|
<timeout>1800</timeout>
|
|
<interval>1d</interval>
|
|
<scan-on-start>yes</scan-on-start>
|
|
</wodle>
|
|
|
|
<wodle name="cis-cat">
|
|
<disabled>yes</disabled>
|
|
<timeout>1800</timeout>
|
|
<interval>1d</interval>
|
|
<scan-on-start>yes</scan-on-start>
|
|
|
|
<java_path>wodles/java</java_path>
|
|
<ciscat_path>wodles/ciscat</ciscat_path>
|
|
</wodle>
|
|
|
|
<!-- Osquery integration -->
|
|
<wodle name="osquery">
|
|
<disabled>yes</disabled>
|
|
<run_daemon>yes</run_daemon>
|
|
<log_path>/var/log/osquery/osqueryd.results.log</log_path>
|
|
<config_path>/etc/osquery/osquery.conf</config_path>
|
|
<add_labels>yes</add_labels>
|
|
</wodle>
|
|
|
|
<!-- System inventory -->
|
|
<wodle name="syscollector">
|
|
<disabled>no</disabled>
|
|
<interval>1h</interval>
|
|
<scan_on_start>yes</scan_on_start>
|
|
<hardware>yes</hardware>
|
|
<os>yes</os>
|
|
<network>yes</network>
|
|
<packages>yes</packages>
|
|
<ports all="no">yes</ports>
|
|
<processes>yes</processes>
|
|
</wodle>
|
|
|
|
<!-- File integrity monitoring -->
|
|
<syscheck>
|
|
<disabled>no</disabled>
|
|
|
|
<!-- Frequency that syscheck is executed default every 12 hours -->
|
|
<frequency>43200</frequency>
|
|
|
|
<scan_on_start>yes</scan_on_start>
|
|
|
|
<!-- Directories to check (perform all possible verifications) -->
|
|
<directories check_all="yes">/etc,/usr/bin,/usr/sbin</directories>
|
|
<directories check_all="yes">/bin,/sbin,/boot</directories>
|
|
|
|
<!-- Files/directories to ignore -->
|
|
<ignore>/etc/mtab</ignore>
|
|
<ignore>/etc/hosts.deny</ignore>
|
|
<ignore>/etc/mail/statistics</ignore>
|
|
<ignore>/etc/random-seed</ignore>
|
|
<ignore>/etc/random.seed</ignore>
|
|
<ignore>/etc/adjtime</ignore>
|
|
<ignore>/etc/httpd/logs</ignore>
|
|
<ignore>/etc/utmpx</ignore>
|
|
<ignore>/etc/wtmpx</ignore>
|
|
<ignore>/etc/cups/certs</ignore>
|
|
<ignore>/etc/dumpdates</ignore>
|
|
<ignore>/etc/svc/volatile</ignore>
|
|
<ignore>/sys/kernel/security</ignore>
|
|
<ignore>/sys/kernel/debug</ignore>
|
|
|
|
<!-- Check the file, but never compute the diff -->
|
|
<nodiff>/etc/ssl/private.key</nodiff>
|
|
|
|
<skip_nfs>yes</skip_nfs>
|
|
|
|
<!-- Remove not monitored files -->
|
|
<remove_old_diff>yes</remove_old_diff>
|
|
|
|
<!-- Allow the system to restart Auditd after installing the plugin -->
|
|
<restart_audit>yes</restart_audit>
|
|
</syscheck>
|
|
|
|
<!-- Log analysis -->
|
|
<localfile>
|
|
<log_format>command</log_format>
|
|
<command>df -P</command>
|
|
<frequency>360</frequency>
|
|
</localfile>
|
|
|
|
<localfile>
|
|
<log_format>full_command</log_format>
|
|
<command>netstat -tulpn | sed 's/\([[:alnum:]]\+\)\ \+[[:digit:]]\+\ \+[[:digit:]]\+\ \+\(.*\):\([[:digit:]]*\)\ \+\([0-9\.\:\*]\+\).\+\ \([[:digit:]]*\/[[:alnum:]\-]*\).*/\1 \2 == \3 == \4 \5/' | sort -k 4 -g | sed 's/ == \(.*\) ==/:\1/' | sed 1,2d</command>
|
|
<alias>netstat listening ports</alias>
|
|
<frequency>360</frequency>
|
|
</localfile>
|
|
|
|
<localfile>
|
|
<log_format>full_command</log_format>
|
|
<command>last -n 20</command>
|
|
<frequency>360</frequency>
|
|
</localfile>
|
|
|
|
<!-- Active response -->
|
|
<active-response>
|
|
<disabled>no</disabled>
|
|
<ca_store>/var/ossec/etc/wpk_root.pem</ca_store>
|
|
<ca_verification>yes</ca_verification>
|
|
</active-response>
|
|
|
|
<!-- Choose between "plain", "json", or "plain,json" for the format of internal logs -->
|
|
<logging>
|
|
<log_format>plain</log_format>
|
|
</logging>
|
|
|
|
</ossec_config>
|
|
|
|
<ossec_config>
|
|
<localfile>
|
|
<log_format>syslog</log_format>
|
|
<location>/var/ossec/logs/active-responses.log</location>
|
|
</localfile>
|
|
{%- if grains['os'] == 'Ubuntu' %}
|
|
<localfile>
|
|
<log_format>syslog</log_format>
|
|
<location>/var/log/auth.log</location>
|
|
</localfile>
|
|
{%- else %}
|
|
<localfile>
|
|
<log_format>syslog</log_format>
|
|
<location>/var/log/secure</location>
|
|
</localfile>
|
|
{%- endif %}
|
|
<localfile>
|
|
<log_format>syslog</log_format>
|
|
<location>/var/log/syslog</location>
|
|
</localfile>
|
|
|
|
<localfile>
|
|
<log_format>syslog</log_format>
|
|
<location>/var/log/dpkg.log</location>
|
|
</localfile>
|
|
|
|
<localfile>
|
|
<log_format>syslog</log_format>
|
|
<location>/var/log/kern.log</location>
|
|
</localfile>
|
|
|
|
</ossec_config>
|