Thanks for all the help from you (Santiago), from dan, some other posts on 
here, github repository issues, a book I bought on ossec for $10, and the 
work of the OSSEC developers that made the 2.8.3 update, and of course the 
people in the AlienVault Labs!

I was now able to get the alerts working.  I analyzed the PowerShell logs 
and changed my rules a bit.  Here is what I changed it too:

<group name="powershell,">
  <rule id="100210" level="0">
    <if_sid>18100,18101</if_sid>
    <match>CommandType=Script</match>
    <description>Powershell Script.</description>
  </rule>
  <rule id="100211" level="0">
    <if_sid>18100,18101</if_sid>
    <match>CommandType=Cmdlet</match>
    <description>Powershell Command.</description>
  </rule>
  <rule id="100212" level="0">
    <if_sid>18100,18101</if_sid>
    <match>CommandType=Function</match>
    <description>Powershell Function.</description>
  </rule>  
  <rule id="100213" level="2">
    <if_sid>100210</if_sid>
    <match>NewCommandState=Started</match>
    <description>Powershell Script (500-Started).</description>
  </rule>
  <rule id="100214" level="2">
    <if_sid>100210</if_sid>
    <match>NewCommandState=Stopped</match>
    <description>Powershell Script (501-Stopped).</description>
  </rule>  
  <rule id="100215" level="2">
    <if_sid>100211</if_sid>
    <match>NewCommandState=Started</match>
    <description>Powershell Command (500-Started).</description>
  </rule>
  <rule id="100216" level="2">
    <if_sid>100211</if_sid>
    <match>NewCommandState=Stopped</match>
    <description>Powershell Command (501-Stopped).</description>
  </rule>  
  <rule id="100217" level="2">
    <if_sid>100212</if_sid>
    <match>NewCommandState=Started</match>
    <description>Powershell Function (500-Started).</description>
  </rule>
  <rule id="100218" level="2">
    <if_sid>100212</if_sid>
    <match>NewCommandState=Stopped</match>
    <description>Powershell Function (501-Stopped).</description>
  </rule>
</group> <!-- POWERSHELL -->

I have also created a custom OSSIM plugin for AlienVault to get the alerts 
into the SEIM:
/etc/ossim/agent/plugins/powershell.cfg: (ATTACHED FILE)
/etc/ossim/agent/plugins/powershell.sql: (ATTACHED FILE)

It's probably not the best structure, but it works pretty well and is a 
good start!

On Wednesday, December 2, 2015 at 1:16:09 PM UTC-6, Santiago Bassett wrote:
>
> Glad it finally worked Phillipa :-)
>
> On Tue, Dec 1, 2015 at 5:28 PM, Phillipa Moorea <philli...@gmail.com 
> <javascript:>> wrote:
>
>> Yeah, I finally got the alerts working.  This post helped me out alot: 
>> https://groups.google.com/forum/#!searchin/ossec-list/alert$20to$20be$20generated/ossec-list/SWJe7nm2cbU/pKc8HSfDXCEJ
>>
>> It shows exactly a log inside of the archive.log, and what you should 
>> paste into the ossec-logtest.  I also found somewhere to run ossec-logtest 
>> with the "-v" flag option to show the rule matches too.  After I got that, 
>> I found that other rules would match causing the level to be 0.
>>
>> Rule 6 matches which was a generic windows rule.
>> Rule 18100 matched with some logs which is the "Group of windows rules"
>>
>> I changed the "<if_sid>" to the 18100 as suggested by Santiago, and then 
>> ran the test again.
>> It worked.
>>
>> So I actually tested it in a real test scenario, and it worked!! Alarms 
>> were generated in the alarms.log file.
>>
>>
>> THANK YOU everyone for all of your help.  After a bunch of fixes, 
>> configuration fixes, OSSEC upgrades, buying an OSSEC book off of amazon, 
>> and these forums, I was finally able to get it to work. :)
>>
>> YEAH!!
>>
>>
>>
>> On Tuesday, December 1, 2015 at 6:43:58 PM UTC-6, Phillipa Moorea wrote:
>>>
>>> Thanks Santiago for the information about OSSIM.
>>>
>>> I do not have conditions for "if_sid" in the rules.  I'm not sure what I 
>>> would even put there since this is the first rule for PowerShell events.  I 
>>> currently have set the alert level on the rule to 2.  I tried other values, 
>>> but nothing was working there.  I'm still trying to debug why an alert is 
>>> not generating, even though when I run the ossec-logtest, it says that an 
>>> alert will be generated....
>>>
>>>
>>> On Tuesday, December 1, 2015 at 6:37:03 PM UTC-6, Santiago Bassett wrote:
>>>>
>>>> I haven't have time to go through the whole email thread, but I don't 
>>>> think using OSSEC in AlienVault OSSIM would cause this. The only 
>>>> modification AlienVault does to OSSEC is the format used for alerts output 
>>>> (at alerts.log), so it can easily be parsed by the AlienVault plugin.
>>>>
>>>> Regarding your other question, please check that conditions of <if_sid> 
>>>> rules are also met, and that ultimately the alert level is different than 
>>>> 0.
>>>>
>>>> Hope that helps
>>>>
>>>> On Tue, Dec 1, 2015 at 4:32 PM, Phillipa Moorea <philli...@gmail.com> 
>>>> wrote:
>>>>
>>>>> I had before restarted only OSSEC, but now I tried restarting the 
>>>>> server, but no fixes yet.
>>>>>
>>>>> Could the issue be caused by the use of OSSEC on an AlienVault OSSIM 
>>>>> server?
>>>>>
>>>>>
>>>>> On Tuesday, December 1, 2015 at 5:40:19 PM UTC-6, Phillipa Moorea 
>>>>> wrote:
>>>>>>
>>>>>> Could the problem (of not creating alerts) be caused because 
>>>>>> PowerShell events are INFORMATIONAL?
>>>>>>
>>>>>> Informational Event Codes generated by PowerShell: 400, 403, 500, 
>>>>>> 501, 600
>>>>>>
>>>>>>
>>>>>>
>>>>>> On Monday, November 30, 2015 at 1:05:35 PM UTC-6, Phillipa Moorea 
>>>>>> wrote:
>>>>>>>
>>>>>>> Here's another example of a log file in which I'm actually 
>>>>>>> interested in:
>>>>>>>
>>>>>>> 2015 Nov 30 13:02:39 (HOSTNAME) HOSTIP->WinEvtLog 2015 Nov 30 
>>>>>>> 13:02:39 WinEvtLog: Windows PowerShell: INFORMATION(500): PowerShell: 
>>>>>>> (no 
>>>>>>> user): no domain: HOSTNAME_FQDN: Command "Get-Host" is Started.     
>>>>>>> Details:    NewCommandState=Started   SequenceNumber=41   
>>>>>>> HostName=ConsoleHost  HostVersion=2.0 
>>>>>>>  HostId=9579f128-903c-463c-80fa-7eaa4a80dc54  EngineVersion=2.0 
>>>>>>>  RunspaceId=c07bf134-24b9-47f7-9dfe-9732dc3e675d  PipelineId=5 
>>>>>>>  CommandName=Get-Host  CommandType=Cmdlet  ScriptName=  CommandPath= 
>>>>>>>  CommandLine=Get-Host
>>>>>>>
>>>>>>> This log actually shows the command name that was ran "Get-Host" was 
>>>>>>> my test Powershell command.  If there was a script, then the ScriptName 
>>>>>>> would be populated.
>>>>>>>
>>>>>>>
>>>>>>> On Monday, November 30, 2015 at 12:54:50 PM UTC-6, Phillipa Moorea 
>>>>>>> wrote:
>>>>>>>>
>>>>>>>> Also, thanks for the information about the groups
>>>>>>>>
>>>>>>>> On Monday, November 30, 2015 at 10:15:26 AM UTC-6, Phillipa Moorea 
>>>>>>>> wrote:
>>>>>>>>>
>>>>>>>>> Hi Dan!  Here's a log from my archives.log file
>>>>>>>>>
>>>>>>>>> 2015 Nov 30 10:07:57 (HOSTNAME) HOSTIP->WinEvtLog 2015 Nov 30 
>>>>>>>>> 10:07:54 WinEvtLog: Security: AUDIT_SUCCESS(4688): 
>>>>>>>>> Microsoft-Windows-Security-Auditing: (no user): no domain: 
>>>>>>>>> HOSTNAME_FQDN: A 
>>>>>>>>> new process has been created. Subject:  Security ID: 
>>>>>>>>>  S-1-5-21-1292428093-1078145449-842925246-500  Account Name:  
>>>>>>>>> Administrator 
>>>>>>>>>  Account Domain:  DOMAIN  Logon ID:  0x6b008a65  Process Information: 
>>>>>>>>>  New 
>>>>>>>>> Process ID:  0xeac  New Process Name: 
>>>>>>>>> C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe  Token 
>>>>>>>>> Elevation 
>>>>>>>>> Type: %%1936  Creator Process ID: 0x2068
>>>>>>>>>
>>>>>>>>> I also get other similar powershell event logs with this type of 
>>>>>>>>> unique message info:
>>>>>>>>> handle to an object was closed
>>>>>>>>> a process has exited
>>>>>>>>> handle to an object was requested
>>>>>>>>> privileges used for access check
>>>>>>>>>
>>>>>>>>> in addition to the log above which has the message "a new process 
>>>>>>>>> has been created"
>>>>>>>>>
>>>>>>>>> On Monday, November 30, 2015 at 7:52:14 AM UTC-6, dan (ddpbsd) 
>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>> On Mon, Nov 30, 2015 at 6:39 AM, Phillipa Moorea <
>>>>>>>>>> philli...@gmail.com> wrote: 
>>>>>>>>>> > If anybody knows what I am doing wrong, any help would be 
>>>>>>>>>> great.  Even just 
>>>>>>>>>> > a documentation link or something or a question of 
>>>>>>>>>> clarification?  I have 
>>>>>>>>>> > posted this issue in the AlienVault forums as well.  I've been 
>>>>>>>>>> keeping both 
>>>>>>>>>> > forums updated. 
>>>>>>>>>> > 
>>>>>>>>>>
>>>>>>>>>> Can you post an entry from the archives.log after the 
>>>>>>>>>> eventchannel change? 
>>>>>>>>>>
>>>>>>>>>> > I think a lot of people will want to monitor any scripts from 
>>>>>>>>>> the command 
>>>>>>>>>> > line and from PowerShell that run on one of their servers or 
>>>>>>>>>> workstations. 
>>>>>>>>>> > If bad malware gets onto a device, it usually runs scripts, so 
>>>>>>>>>> this is part 
>>>>>>>>>> > of my detection technique to alert me if a script is ran.  I'm 
>>>>>>>>>> still working 
>>>>>>>>>> > on the rules. 
>>>>>>>>>> > 
>>>>>>>>>> > This is my current rule setup in the local_rules.xml file: 
>>>>>>>>>> > 
>>>>>>>>>> > <group name="local,syslog,"> 
>>>>>>>>>> >   <rule id="100210" level="6"> 
>>>>>>>>>> >     <id>^400$|^403$|^500$|^501$|^600$</id> 
>>>>>>>>>> >     <description>Powershell Event.</description> 
>>>>>>>>>> >   </rule> 
>>>>>>>>>> >   <rule id="100211" level="6"> 
>>>>>>>>>> >     <match>CommandType=Cmdlet</match> 
>>>>>>>>>> >     <description>Powershell Command.</description> 
>>>>>>>>>> >   </rule> 
>>>>>>>>>> >   <rule id="100212" level="6"> 
>>>>>>>>>> >     <match>PowerShell</match> 
>>>>>>>>>> >     <description>Powershell Log.</description> 
>>>>>>>>>> >   </rule> 
>>>>>>>>>> > </group> 
>>>>>>>>>> > 
>>>>>>>>>> > I'm not sure if the group name matters or needs to be something 
>>>>>>>>>> specific? 
>>>>>>>>>> > 
>>>>>>>>>>
>>>>>>>>>> The group names shouldn't affect much. 
>>>>>>>>>>
>>>>>>>>>> > 
>>>>>>>>>> > On Friday, November 27, 2015 at 9:06:21 AM UTC-6, Phillipa 
>>>>>>>>>> Moorea wrote: 
>>>>>>>>>> >> 
>>>>>>>>>> >> A little further, I changed the logformat from eventlog to 
>>>>>>>>>> eventchannel, 
>>>>>>>>>> >> and now the archive.log has taken out all of the multiple 
>>>>>>>>>> lines.  I still do 
>>>>>>>>>> >> not have a generated alert yet even though ossec-logtest says 
>>>>>>>>>> it generates 
>>>>>>>>>> >> an alert and it matches my custom rule.  I set the level to 
>>>>>>>>>> level 6. 
>>>>>>>>>> >> 
>>>>>>>>>> >> On Friday, November 27, 2015 at 8:41:48 AM UTC-6, Phillipa 
>>>>>>>>>> Moorea wrote: 
>>>>>>>>>> >>> 
>>>>>>>>>> >>> Well, I updated both the server and client OSSEC HIDS to 
>>>>>>>>>> 2.8.3, but still 
>>>>>>>>>> >>> no luck.  The PowerShell logs in archive.log are still 
>>>>>>>>>> multi-line logs, and 
>>>>>>>>>> >>> I am getting the same results. 
>>>>>>>>>> >>> 
>>>>>>>>>> >>> On Wednesday, November 25, 2015 at 8:45:18 AM UTC-6, Phillipa 
>>>>>>>>>> Moorea 
>>>>>>>>>> >>> wrote: 
>>>>>>>>>> >>>> 
>>>>>>>>>> >>>> Ok, I think I know what's going on now.  I do not have the 
>>>>>>>>>> latest stable 
>>>>>>>>>> >>>> release of 2.8.3.  I think I might have 2.8.2 or 2.8.1 or 
>>>>>>>>>> something. 
>>>>>>>>>> >>>> 
>>>>>>>>>> >>>> I found this issue which resembled my issue because the logs 
>>>>>>>>>> have 
>>>>>>>>>> >>>> multiple lines in powershell. 
>>>>>>>>>> >>>> https://github.com/ossec/ossec-hids/issues/224 
>>>>>>>>>> >>>> Then I saw that a fix was implemented in 2.9 from here: 
>>>>>>>>>> >>>> https://github.com/ossec/ossec-hids/pull/457 
>>>>>>>>>> >>>> Then from this forum I now see that perhaps it is 
>>>>>>>>>> implemented in 2.8.3 
>>>>>>>>>> >>>> on Nov 5th which is probably the day after I had made my 
>>>>>>>>>> OSSEC updates, lol: 
>>>>>>>>>> >>>> 
>>>>>>>>>> https://groups.google.com/forum/#!topic/ossec-list/JA9x4uzDg1g 
>>>>>>>>>> >>>> 
>>>>>>>>>> >>>> I'll try updating to the latest version again and see if 
>>>>>>>>>> that helps. 
>>>>>>>>>> >>>> 
>>>>>>>>>> >>>> On Monday, November 9, 2015 at 9:17:28 AM UTC-6, Phillipa 
>>>>>>>>>> Moorea wrote: 
>>>>>>>>>> >>>>> 
>>>>>>>>>> >>>>> I have restarted OSSEC using the OSSEC Agent Manager on the 
>>>>>>>>>> ossec 
>>>>>>>>>> >>>>> client computer.  I have also restarted the OSSEC service 
>>>>>>>>>> on the OSSEC 
>>>>>>>>>> >>>>> server.  I'm not sure why I can't reply to your response, 
>>>>>>>>>> so I had to reply 
>>>>>>>>>> >>>>> to mine @dan(ddpbsd) 
>>>>>>>>>> >>>>> 
>>>>>>>>>> >>>>> Also I am using OSSEC HIDS v2.8 on the client & server. 
>>>>>>>>>> > 
>>>>>>>>>> > -- 
>>>>>>>>>> > 
>>>>>>>>>> > --- 
>>>>>>>>>> > You received this message because you are subscribed to the 
>>>>>>>>>> Google Groups 
>>>>>>>>>> > "ossec-list" group. 
>>>>>>>>>> > To unsubscribe from this group and stop receiving emails from 
>>>>>>>>>> it, send an 
>>>>>>>>>> > email to ossec-list+...@googlegroups.com. 
>>>>>>>>>> > For more options, visit https://groups.google.com/d/optout. 
>>>>>>>>>>
>>>>>>>>> -- 
>>>>>
>>>>> --- 
>>>>> You received this message because you are subscribed to the Google 
>>>>> Groups "ossec-list" group.
>>>>> To unsubscribe from this group and stop receiving emails from it, send 
>>>>> an email to ossec-list+...@googlegroups.com.
>>>>> For more options, visit https://groups.google.com/d/optout.
>>>>>
>>>>
>>>> -- 
>>
>> --- 
>> You received this message because you are subscribed to the Google Groups 
>> "ossec-list" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to ossec-list+...@googlegroups.com <javascript:>.
>> For more options, visit https://groups.google.com/d/optout.
>>
>
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
DELETE FROM plugin WHERE id=9002;
DELETE FROM plugin_sid WHERE plugin_id=9002;
INSERT INTO plugin (id, type, name, description) VALUES (9002, 1, 'powershell', 
'Powershell Script/Function/Command Events');
INSERT INTO plugin_sid (plugin_id, sid, category_id, class_id, name, priority, 
reliability) VALUES (9002, 100213, NULL, NULL, 'powershell: PowerShell Script 
Started', 3, 2);
INSERT INTO plugin_sid (plugin_id, sid, category_id, class_id, name, priority, 
reliability) VALUES (9002, 100214, NULL, NULL, 'powershell: PowerShell Script 
Stopped' ,3, 2);
INSERT INTO plugin_sid (plugin_id, sid, category_id, class_id, name, priority, 
reliability) VALUES (9002, 100215, NULL, NULL, 'powershell: PowerShell Command 
Started', 3, 2);
INSERT INTO plugin_sid (plugin_id, sid, category_id, class_id, name, priority, 
reliability) VALUES (9002, 100216, NULL, NULL, 'powershell: PowerShell Command 
Stopped', 3, 2);
INSERT INTO plugin_sid (plugin_id, sid, category_id, class_id, name, priority, 
reliability) VALUES (9002, 100217, NULL, NULL, 'powershell: PowerShell Function 
Started', 3, 2);
INSERT INTO plugin_sid (plugin_id, sid, category_id, class_id, name, priority, 
reliability) VALUES (9002, 100218, NULL, NULL, 'powershell: PowerShell Function 
Stopped', 3, 2);
# Alienvault plugin
# Author: Phillip W. Moore at phillipmo...@gmail.com
# Plugin powershell id:9002 version: 0.0.0
# Last modification: 2015-12-02 13:00
#
# Plugin Selection Info:
# PowerShell
#
# END-HEADER
# Accepted products:
# OSSEC - OSSEC 2.8_singleline
# OSSEC - OSSEC 2.7_singleline
# Description:
# <custom_alert_output>AV - Alert - "$TIMESTAMP" --> RID: "$RULEID"; RL: 
"$RULELEVEL"; RG: "$RULEGROUP"; RC: "$RULECOMMENT"; USER: "$DSTUSER"; SRCIP: 
"$SRCIP"; HOSTNAME: "$HOSTNAME"; LOCATION: "$LOCATION"; EVENT: 
"[INIT]$FULLLOG[END]"; </custom_alert_output>
#
#

[DEFAULT]
plugin_id=9002

[config]
type=detector
enable=yes
pre_match="^AV\s-\sAlert\s-\s\"\d+\"\s-->\sRID:\s\"(?P<key>\d+)\".*"
source=log
location=/var/ossec/logs/alerts/alerts.log
create_file=false
process=ossec-logcollector
start=yes   ; launch plugin process when agent starts
stop=yes    ; shutdown plugin process when agent stops
restart=no  ; restart plugin process after each interval
restart_interval=_CFG(watchdog,restart_interval) ; interval between each restart
startup=/etc/init.d/ossec start
shutdown=/etc/init.d/ossec stop

[translation]
100210=9002
100211=9002
100212=9002
100213=9002
100214=9002
100215=9002
100216=9002
100217=9002
100218=9002

######################################################
# WINDOWS EVENTS
######################################################
#
# Windows Information Event <status>^INFORMATION</status>
# OSSEC rule disabled by default (level 2)
# [100213 - PowerShell Script Started (500)]
# [100214 - PowerShell Script Stopped (501)]
# [100215 - PowerShell Command Started (500)]
# [100216 - PowerShell Command Stopped (501)]
# [100217 - PowerShell Function Started (500)]
# [100218 - PowerShell Function Stopped (501)]
#

[100213 - PowerShell Script Started (500)]
event_type=event
#precheck="INFORMATION"
regexp="^AV\s+\-\sAlert\s+\-\s\"(?P<date>\d+)\"\s\-\->\sRID\:\s\"(?P<rule_id>\d+)\"\;\s+RL\:\s+\"(?P<rule_level>\d+)\"\;\s+RG\:\s+\"(?P<rule_group>[^\"]*)\"\;\s+RC\:\s+\"(?P<rule_comment>[^\"]*)\";.*?HOSTNAME\:[^\)]*\)\s(?P<winip>\S+)->.*?INFORMATION\((?P<winevent_id>\d+)\)\:.*NewCommandState=(?P<cmd_state>[^=]*)
   SequenceNumber=(?P<seq_num>[^=]*)   
HostName.*CommandName=(?P<cmd_name>[^=]*)  CommandType=(?P<cmd_type>[^=]*)  
ScriptName=(?P<script_name>[^=]*)  CommandPath=(?P<cmd_path>[^=]*)  
CommandLine=(?P<cmd_line>[^=]*)\[END\]\"\;"
date={normalize_date($date)}
#plugin_id={translate($rule_id)}
plugin_sid={$rule_id}
device={resolv($winip)}
src_ip={resolv($winip)}
dst_ip={resolv($winip)}
userdata1={$rule_level}
userdata2={$winevent_id}
userdata3={$cmd_state}
userdata4={$seq_num}
userdata5={$cmd_name}
userdata6={$cmd_type}
userdata7={$script_name}
userdata8={$cmd_path}
userdata9={$cmd_line}

[100214 - PowerShell Script Stopped (501)]
event_type=event
#precheck="INFORMATION"
regexp="^AV\s+\-\sAlert\s+\-\s\"(?P<date>\d+)\"\s\-\->\sRID\:\s\"(?P<rule_id>\d+)\"\;\s+RL\:\s+\"(?P<rule_level>\d+)\"\;\s+RG\:\s+\"(?P<rule_group>[^\"]*)\"\;\s+RC\:\s+\"(?P<rule_comment>[^\"]*)\";.*?HOSTNAME\:[^\)]*\)\s(?P<winip>\S+)->.*?INFORMATION\((?P<winevent_id>\d+)\)\:.*NewCommandState=(?P<cmd_state>[^=]*)
   SequenceNumber=(?P<seq_num>[^=]*)   
HostName.*CommandName=(?P<cmd_name>[^=]*)  CommandType=(?P<cmd_type>[^=]*)  
ScriptName=(?P<script_name>[^=]*)  CommandPath=(?P<cmd_path>[^=]*)  
CommandLine=(?P<cmd_line>[^=]*)\[END\]\"\;"
date={normalize_date($date)}
#plugin_id={translate($rule_id)}
plugin_sid={$rule_id}
device={resolv($winip)}
src_ip={resolv($winip)}
dst_ip={resolv($winip)}
userdata1={$rule_level}
userdata2={$winevent_id}
userdata3={$cmd_state}
userdata4={$seq_num}
userdata5={$cmd_name}
userdata6={$cmd_type}
userdata7={$script_name}
userdata8={$cmd_path}
userdata9={$cmd_line}

[100215 - PowerShell Command Started (500)]
event_type=event
#precheck="INFORMATION"
regexp="^AV\s+\-\sAlert\s+\-\s\"(?P<date>\d+)\"\s\-\->\sRID\:\s\"(?P<rule_id>\d+)\"\;\s+RL\:\s+\"(?P<rule_level>\d+)\"\;\s+RG\:\s+\"(?P<rule_group>[^\"]*)\"\;\s+RC\:\s+\"(?P<rule_comment>[^\"]*)\";.*?HOSTNAME\:[^\)]*\)\s(?P<winip>\S+)->.*?INFORMATION\((?P<winevent_id>\d+)\)\:.*NewCommandState=(?P<cmd_state>[^=]*)
   SequenceNumber=(?P<seq_num>[^=]*)   
HostName.*CommandName=(?P<cmd_name>[^=]*)  CommandType=(?P<cmd_type>[^=]*)  
ScriptName=(?P<script_name>[^=]*)  CommandPath=(?P<cmd_path>[^=]*)  
CommandLine=(?P<cmd_line>[^=]*)\[END\]\"\;"
date={normalize_date($date)}
#plugin_id={translate($rule_id)}
plugin_sid={$rule_id}
device={resolv($winip)}
src_ip={resolv($winip)}
dst_ip={resolv($winip)}
userdata1={$rule_level}
userdata2={$winevent_id}
userdata3={$cmd_state}
userdata4={$seq_num}
userdata5={$cmd_name}
userdata6={$cmd_type}
userdata7={$script_name}
userdata8={$cmd_path}
userdata9={$cmd_line}

[100216 - PowerShell Command Stopped (501)]
event_type=event
#precheck="INFORMATION"
regexp="^AV\s+\-\sAlert\s+\-\s\"(?P<date>\d+)\"\s\-\->\sRID\:\s\"(?P<rule_id>\d+)\"\;\s+RL\:\s+\"(?P<rule_level>\d+)\"\;\s+RG\:\s+\"(?P<rule_group>[^\"]*)\"\;\s+RC\:\s+\"(?P<rule_comment>[^\"]*)\";.*?HOSTNAME\:[^\)]*\)\s(?P<winip>\S+)->.*?INFORMATION\((?P<winevent_id>\d+)\)\:.*NewCommandState=(?P<cmd_state>[^=]*)
   SequenceNumber=(?P<seq_num>[^=]*)   
HostName.*CommandName=(?P<cmd_name>[^=]*)  CommandType=(?P<cmd_type>[^=]*)  
ScriptName=(?P<script_name>[^=]*)  CommandPath=(?P<cmd_path>[^=]*)  
CommandLine=(?P<cmd_line>[^=]*)\[END\]\"\;"
date={normalize_date($date)}
#plugin_id={translate($rule_id)}
plugin_sid={$rule_id}
device={resolv($winip)}
src_ip={resolv($winip)}
dst_ip={resolv($winip)}
userdata1={$rule_level}
userdata2={$winevent_id}
userdata3={$cmd_state}
userdata4={$seq_num}
userdata5={$cmd_name}
userdata6={$cmd_type}
userdata7={$script_name}
userdata8={$cmd_path}
userdata9={$cmd_line}

[100217 - PowerShell Function Started (500)]
event_type=event
#precheck="INFORMATION"
regexp="^AV\s+\-\sAlert\s+\-\s\"(?P<date>\d+)\"\s\-\->\sRID\:\s\"(?P<rule_id>\d+)\"\;\s+RL\:\s+\"(?P<rule_level>\d+)\"\;\s+RG\:\s+\"(?P<rule_group>[^\"]*)\"\;\s+RC\:\s+\"(?P<rule_comment>[^\"]*)\";.*?HOSTNAME\:[^\)]*\)\s(?P<winip>\S+)->.*?INFORMATION\((?P<winevent_id>\d+)\)\:.*NewCommandState=(?P<cmd_state>[^=]*)
   SequenceNumber=(?P<seq_num>[^=]*)   
HostName.*CommandName=(?P<cmd_name>[^=]*)  CommandType=(?P<cmd_type>[^=]*)  
ScriptName=(?P<script_name>[^=]*)  CommandPath=(?P<cmd_path>[^=]*)  
CommandLine=(?P<cmd_line>[^=]*)\[END\]\"\;"
date={normalize_date($date)}
#plugin_id={translate($rule_id)}
plugin_sid={$rule_id}
device={resolv($winip)}
src_ip={resolv($winip)}
dst_ip={resolv($winip)}
userdata1={$rule_level}
userdata2={$winevent_id}
userdata3={$cmd_state}
userdata4={$seq_num}
userdata5={$cmd_name}
userdata6={$cmd_type}
userdata7={$script_name}
userdata8={$cmd_path}
userdata9={$cmd_line}

[100218 - PowerShell Function Stopped (501)]
event_type=event
#precheck="INFORMATION"
regexp="^AV\s+\-\sAlert\s+\-\s\"(?P<date>\d+)\"\s\-\->\sRID\:\s\"(?P<rule_id>\d+)\"\;\s+RL\:\s+\"(?P<rule_level>\d+)\"\;\s+RG\:\s+\"(?P<rule_group>[^\"]*)\"\;\s+RC\:\s+\"(?P<rule_comment>[^\"]*)\";.*?HOSTNAME\:[^\)]*\)\s(?P<winip>\S+)->.*?INFORMATION\((?P<winevent_id>\d+)\)\:.*NewCommandState=(?P<cmd_state>[^=]*)
   SequenceNumber=(?P<seq_num>[^=]*)   
HostName.*CommandName=(?P<cmd_name>[^=]*)  CommandType=(?P<cmd_type>[^=]*)  
ScriptName=(?P<script_name>[^=]*)  CommandPath=(?P<cmd_path>[^=]*)  
CommandLine=(?P<cmd_line>[^=]*)\[END\]\"\;"
date={normalize_date($date)}
#plugin_id={translate($rule_id)}
plugin_sid={$rule_id}
device={resolv($winip)}
src_ip={resolv($winip)}
dst_ip={resolv($winip)}
userdata1={$rule_level}
userdata2={$winevent_id}
userdata3={$cmd_state}
userdata4={$seq_num}
userdata5={$cmd_name}
userdata6={$cmd_type}
userdata7={$script_name}
userdata8={$cmd_path}
userdata9={$cmd_line}

Reply via email to