Hi Rafael,

OSSEC by default will alert on the audit failure 560 events, but not
on the success ones. If you want
alert on them, add the following local rule:

  <rule id="100345" level="0">
    <if_sid>18101</if_sid>
    <id>^560$</id>
    <description>Windows succes audit event.</description>
   </rule>

With that, you can make specific rules to match on a user, program
name, agent, etc. For example:

  <rule id="100345" level="0">
    <if_sid>18101</if_sid>
    <id>^560$</id>
    <match>Object Name: F:\foo\path\index.html</match>
    <description>Index.html opened.</description>
   </rule>

Thanks,

--
Daniel B. Cid
dcid ( at ) ossec.net


On Thu, Jul 23, 2009 at 7:37 AM, Rafael Gomes<[email protected]> wrote:
>
> In my case, I just wanna get this log in ossec server:
>
> Event Type: Success Audit
> Event Source: Security
> Event Category: Object Access
> Event ID: 560
> Date:  7/20/2009
> Time:  4:54:04 PM
> User:  UFBA\user1
> Computer: server1
> Description:
> Object Open:
>    Object Server: Security
>    Object Type: File
>    Object Name: F:\foo\path\index.html
>    Handle ID: 51652
>    Operation ID: {0,2956632565}
>    Process ID: 4
>    Image File Name:
>    Primary User Name: server1$
>    Primary Domain: DOMAIN1
>    Primary Logon ID: (0x0,0x3E7)
>    Client User Name: user1
>    Client Domain: DOMAIN1
>    Client Logon ID: (0x0,0xB0216AFA)
>    Accesses: DELETE
>     ReadAttributes
>
>    Privileges: -
>    Restricted Sid Count: 0
>    Access Mask: 0x10080
>
>
> I already get others logs from this server, but I think that there isn't
> any decoder or rule to handle this type of log in my ossec server.
>
> Thank you.
>
> --
> Rafael Brito Gomes
> Projeto UFBA
> LPIC-1
> CPM Braxis
> Tel : +55 71 3283 6102
> http://www.cpmbraxis.com
>

Reply via email to