Hi Muraleedaran, I use syslog-ng running on CentOS, its an excellent syslog daemon with very advanced options. I think if I was to do it again I would use rsyslog which is very similar to syslog-ng, it will be used in RHEL 6. I also use winlogd on windows hosts. I use OSSEC for file integrity checking, log parsing and alerting. I also run the rootkit detection feature. I really like it because it can parse snort logs too.
With OSSEC and snort you can cover points 10.5.5, 10.6, 11.4 and 11.5 of the PCI DSS on both Linux and Windows! Not sure what you mean by syslog viewer? I just use standard Linux text file reader tools like less/cat/more/nano etc. I have config files I have customised for CentOS/RHEL and also Windows 2008 R2, if you want a copy, let me know Best Regards, Max Williams From: [email protected] [mailto:[email protected]] On Behalf Of Muraleedaran Kanapathy Sent: 10 May 2010 14:59 To: [email protected] Subject: RE: [ossec-list] RE: ossec for log analysis Hi Max Thanks a lot for the reply May I know what did you use to collect the logs from network devices? (Router and switches) And OSSEC did you use it only for File Integrity check, if so what is the syslog and syslog viewer you implemented Kindly advice Muraleedaran Kanapathy| Linux/Unix System Engineer - ISS Department Voice +966(1) 2888136 | Fax +966(1) 288-8899 ext 1422 Integrated Networks | Faisaliah Tower | Level 7A | PO Box 53553, Riyadh 11593, KSA | GMT +3 | Email [email protected]<mailto:[email protected]> [cid:[email protected]] Disclaimer: This electronic mail message contains information that (a) is or may be LEGALLY PRIVILEGED, CONFIDENTIAL, ROPRIETARY IN NATURE, OR OTHERWISE PROTECTED BY LAW FROM DISCLOSURE, and (b) is intended only for the use of the Addressee(s) named herein. If you are not the intended recipient, an addressee, or the person responsible for delivering this to an addressee, you are hereby notified that reading, using, copying, or distributing any part of this message is strictly prohibited. If you have received this electronic mail message in error, please contact us immediately and take the steps necessary to delete the message completely from your computer system. Unless explicitly attributed, the opinions expressed in this message do not necessarily represent the official position or opinions of Integrated Networks LLC., whilst all care has been taken, Integrated Networks LLC. disclaims all liability for loss or damage to person or property arising from this message being infected by computer virus or any type of contamination. ________________________________ From: [email protected] [mailto:[email protected]] On Behalf Of Max Williams Sent: Monday, May 10, 2010 3:57 PM To: '[email protected]' Subject: [ossec-list] RE: ossec for log analysis Hi Muraleedaran, You cannot browse all windows events from the web interface, you can only view Windows Events that have been triggered by a rule to generate an alert. Take a look in this file on the ossec server: <osse_path>/rules/msauth_rules.xml You could write your own rule to generate alerts for other events. If you wish to browse all events for many hosts you could use Windows Event Collector or use winlogd to send events to a syslog server (which is what we do for PCI DSS) Cheers, Max From: [email protected] [mailto:[email protected]] On Behalf Of Muraleedaran Kanapathy Sent: 08 May 2010 17:07 To: [email protected] Subject: [ossec-list] ossec for log analysis Dear Sirs We are in the process of installing the OSSEC for the log analyzing purposes for the PCI DSS requirement In windows I have installed the OSSEC agent, but I am unable to see any Windows event logs such Application, System, except for the Security logs ( Including CISCO logs) How can I search these logs via ossec web interface Muraleedaran Kanapathy| Linux/Unix System Engineer - ISS Department Voice +966(1) 2888136 | Fax +966(1) 288-8899 ext 1422 Integrated Networks | Faisaliah Tower | Level 7A | PO Box 53553, Riyadh 11593, KSA | GMT +3 | Email [email protected]<mailto:[email protected]> [cid:[email protected]] Disclaimer: This electronic mail message contains information that (a) is or may be LEGALLY PRIVILEGED, CONFIDENTIAL, ROPRIETARY IN NATURE, OR OTHERWISE PROTECTED BY LAW FROM DISCLOSURE, and (b) is intended only for the use of the Addressee(s) named herein. If you are not the intended recipient, an addressee, or the person responsible for delivering this to an addressee, you are hereby notified that reading, using, copying, or distributing any part of this message is strictly prohibited. If you have received this electronic mail message in error, please contact us immediately and take the steps necessary to delete the message completely from your computer system. Unless explicitly attributed, the opinions expressed in this message do not necessarily represent the official position or opinions of Integrated Networks LLC., whilst all care has been taken, Integrated Networks LLC. disclaims all liability for loss or damage to person or property arising from this message being infected by computer virus or any type of contamination.
<<inline: image001.jpg>>
