Hi,

I am trying to troubleshoot why I am not seeing any windows type events from my 
windows ossec agents.  Linux events are pouring in just fine. I have enabled 
"logall" in the Global options of my ossec manager and restarted ossec.   
However when I tail the archives.log the only events I see from my windows 
agent is ossec-keepalives, agent started, etc. I don't see any windows logins 
logoffs, failures, etc. I have also looked in /var/ossec/logs/alerts/alerts.log 
and I see no windows events.  I also looked in ossec.log on my windows box and 
I don't see any windows event logs there.   Where are windows events logged 
locally on the agent?  Suggestions?  Thank you in advance for your help!



-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of dan (ddp)
Sent: Thursday, December 23, 2010 3:01 PM
To: [email protected]
Subject: EXTERNAL:Re: [ossec-list] custom rules for windows events

On Thu, Dec 23, 2010 at 2:50 PM, Anthony, Russell (Information
Security) <[email protected]> wrote:
> Hi,
>
>
>
> If anyone has  created  custom rules for windows events, I would really
> appreciate some pointers and  examples.  I have read the FAQs, bought and
> read the book, and googled as much as I could, but I'm stuck.  I have also
> looked at the msauth rules but most all of them are simply matching an id.
>    A couple contain match or regex or user strings.   Is match, regex and
> user the only options I have besides matching the id?
>
>
>
> Examples:
>
> <regex> ID:\s+\p*S-1-5-32-544\p*</regex>
>
> <match>Target Account Name: None</match>
>
> <user>^LOCAL SERVICE|^NETWORK SERVICE|^ANONYMOUS LOGON</user>
>
>
>
>
>
>
>
> I would like to create a rule which will alert on a failed or successful
> terminal services connection which has event id
>
> 540 or  4624 with logon type 10.
>
>
>
> My first question is how do you pull\format a windows event from the event
> viewer so that ossec-logtest will decode and test it.
>
>
>
> Below is the rule I made. I used the existing widows decoder. If there is a
> better more preferred way to do this, please share.   ( I also tried using
> <Logon Type>10</Logon Type>)  My rule is accepted by OSSEC but it does not
> alert on a terminal services connection.
>
>
>
> # vi local_rules.xml
>
>
>
> <group name="custom-windows-event-alert">
>
>     <rule id="700005" level="0">
>
>         <decoded_as>windows</decoded_as>
>
>         <description>custom-windows-event-alert</description>
>
>     </rule>
>
>
>
>
>
> <!-- Alert if terminal session attempted -->
>
>     <rule id="700006" level="12">
>
>         <if_sid>700005</if_sid>
>
>         <id>^540|^4624</id>
>
>         <match>Logon Type: 10</match>
>
>     </rule>
>
> </group>
>
>
>
>
>
> Thanks for the help and have a Happy Holiday.
>
>
>
>
>
> Russ
>
>

You can turn on the <logall> option and pull the alerts you want out
of archives.log. There's a small "header" on the messages that you'll
have to get rid of, but that's pretty easy.

Once you get an example writing a rule will be a lot easier.

Reply via email to