Hi,

 

If anyone has  created  custom rules for windows events, I would really
appreciate some pointers and  examples.  I have read the FAQs, bought
and read the book, and googled as much as I could, but I'm stuck.  I
have also looked at the msauth rules but most all of them are simply
matching an id.    A couple contain match or regex or user strings.   Is
match, regex and user the only options I have besides matching the id?

 

Examples:

<regex> ID:\s+\p*S-1-5-32-544\p*</regex>

<match>Target Account Name: None</match>

<user>^LOCAL SERVICE|^NETWORK SERVICE|^ANONYMOUS LOGON</user>

 

 

 

I would like to create a rule which will alert on a failed or successful
terminal services connection which has event id 

540 or  4624 with logon type 10.  

 

My first question is how do you pull\format a windows event from the
event viewer so that ossec-logtest will decode and test it.   

 

Below is the rule I made. I used the existing widows decoder. If there
is a better more preferred way to do this, please share.   ( I also
tried using <Logon Type>10</Logon Type>)  My rule is accepted by OSSEC
but it does not alert on a terminal services connection.  

 

# vi local_rules.xml 

 

<group name="custom-windows-event-alert">

    <rule id="700005" level="0">

        <decoded_as>windows</decoded_as>

        <description>custom-windows-event-alert</description>

    </rule>

 

 

<!-- Alert if terminal session attempted -->

    <rule id="700006" level="12">

        <if_sid>700005</if_sid>

        <id>^540|^4624</id>

        <match>Logon Type: 10</match>

    </rule>

</group>

 

 

Thanks for the help and have a Happy Holiday.

 

 

Russ                    



 

Reply via email to