[ossec-list] Default checkpoint decoder provided by ossec doesn't works

2012-04-30 Thread carlopmart
Hi all, I am doing some tests sending checkpoint fw logs to ossec vi syslog and the default checkpoint decoder provided by ossec 2.6 doesn't works. For example using log explained in decoder.xml: 2012/04/30 10:26:13 ossec-testrule: INFO: Reading local decoder file. 2012/04/30 10:26:13

[ossec-list] Re: Unable to connect to remoted

2012-04-30 Thread mikes
W dniu poniedziałek, 30 kwietnia 2012 09:52:29 UTC+2 użytkownik Mike Sievers napisał: Hi List, I am always getting the following error: agent_control -r -a 2012/04/30 09:44:19 agent_control(1210): ERROR: Queue '/queue/alerts/ar' not accessible: 'Queue not found'. 2012/04/30 09:44:34

Re: [ossec-list] Default checkpoint decoder provided by ossec doesn't works

2012-04-30 Thread dan (ddp)
To start, your log message is missing the syslog header (timestamp and hostname). Then taking out the first \s+ in the prematch of the checkpoint decoder makes this work. In fact, changing the decoder to this made it work with one of your examples and one of the examples in the decoder.conf:

Re: [ossec-list] Re: Ossec 2.6 Compile errors on Mac Os 10.7.3

2012-04-30 Thread dan (ddp)
I'm disappointed that Apple released a broken compiler by default. :( On Sat, Apr 28, 2012 at 4:31 AM, Gappa gapp...@gmail.com wrote: ahahah i can feel a little bit of disappointing in your answer. My bad, i'm sorry, i didn't notice that i was using llvm compiler. I have changed it with the

Re: [ossec-list] Default checkpoint decoder provided by ossec doesn't works

2012-04-30 Thread carlopmart
Oops ... You are right dan .. I have missed timestamp and hostname ... Doing some adjustements, decoder works now ... On 04/30/2012 02:59 PM, dan (ddp) wrote: To start, your log message is missing the syslog header (timestamp and hostname). Then taking out the first \s+ in the prematch of the

[ossec-list] Where the OSSEC configurations are...

2012-04-30 Thread A-Dubbs
Just learning OSSEC here using the documentation on ossec.net to troubleshoot some problems.I am receiving excessive HIDS notifications in a log for a windows machines(an agent) in my OSSEC environment. When looking at the security log, it seems that too many events are being added to the queue,

Re: [ossec-list] Where the OSSEC configurations are...

2012-04-30 Thread dan (ddp)
You can add custom rules to /var/ossec/rules/local_rules.xml. You can use these rules to either look for something that isn't covered by the default rules or to ignore something you don't want to see. On Mon, Apr 30, 2012 at 1:59 PM, A-Dubbs arlendelcasti...@gmail.com wrote: Just learning OSSEC

[ossec-list] msauth_rules.xml file, is this for Microsoft Windows rules?

2012-04-30 Thread A-Dubbs
I'm looking for the rules file for adjusting what gets logged for Microsoft Windows systems. Is msauth_rules.xml the correct file?

Re: [ossec-list] msauth_rules.xml file, is this for Microsoft Windows rules?

2012-04-30 Thread dan (ddp)
Modifying the default rules directly isn't encouraged. Your changes will be overwritten on an upgrade. You should add custom rules to /var/ossec/rules/local_rules.xml. You can create custom rules to look for new things the default rules don't cover, or to ignore rules that are already in place.

[ossec-list] Problem with ossec's syslog options and ossec-remoted process

2012-04-30 Thread carlopmart
Hi all, I have several problems with ossec-remoted process and ossec's syslog remote options. My ossec server is configured to receive syslog messages via tcp port. The problem is the amount of syslog messages that ossec can receive, not seem to be many. Configuration is: syslog

Re: [ossec-list] Problem with ossec's syslog options and ossec-remoted process

2012-04-30 Thread dan (ddp)
On Apr 30, 2012 4:11 PM, carlopmart carlopm...@gmail.com wrote: Hi all, I have several problems with ossec-remoted process and ossec's syslog remote options. My ossec server is configured to receive syslog messages via tcp port. The problem is the amount of syslog messages that ossec can