Hello,

I've changed of "strategy", SEP 11 management console can log to an
external syslog server.
So I receive on my syslog server this kind of security logs when I run
a scan ports with nmap:
Aug  3 04:10:59 sep11srvtest sep11srvtest: testdev,"Somebody is
scanning your computer.  Your computer's TCP ports:   1350, 993, 85,
1995 and 1004 have been scanned from 192.168.25.10.",Local:
192.168.25.70,Local: 005056B60036,Remote: ,Remote:
192.168.25.10,Remote: 005056B60007,Inbound,TCP,,Begin: 2011-08-03
04:05:41,End: 2011-08-03 04:06:32,Occurrences:
1653,Application: ,Location: Default,User: test,Domain: TEST

So I've created a decoder:
<decoder name="symantec-EndpointProtection-SP">
<program_name>sep11srvtest</program_name>
  <prematch>"Somebody is scanning your computer.  Your computer's TCP
ports:   </prematch>
  <regex offset="after_prematch">(\d+), (\d+), (\d+), (\d+) and (\d+)
have been scanned from (\S+) (\S+)</regex>
  <order>dstport,dstport,dstport,dstport,dstport,srcip,dstip</order>
</decoder>

And some rules:
<group name="symantecEP,">
  <rule id="100000" level="5">
    <decoded_as>symantec-EndpointProtection-SP</decoded_as>
    <description>Grouping of Symantec Endpoint Protection Rules.</
description>
  </rule>

  <rule id="100001" level="5">
    <category>windows</category>
    <description>Grouping of Symantec EP rules from external syslog
server</description>
  </rule>

  <rule id="100002" level="15">
    <if_sid>100000, 100001</if_sid>
    <group>recon</group>
    <description>Scan Port detected on a windows server.</description>
  </rule>

</group> <!-- symantec SEP11 -->

It's really not perfect and need more "tunning" but it's work, I
received an email at each ports scan on my windows server.


On 2 août, 10:54, Blauch Armand <[email protected]> wrote:
> Hello,
>
> Thanks for your advices, yes I've restarted the manager's OSSEC
> processes after I added the <logall> option to the manager's
> ossec.conf. It's the same things, no scan log detection logs are send
> to the manager.
>
> On 1 août, 23:45, "dan (ddp)" <[email protected]> wrote:
>
>
>
>
>
>
>
> > On Mon, Aug 1, 2011 at 4:15 AM, Blauch Armand <[email protected]> wrote:
> > > Hello,
>
> > > Thanks for your advices.
> > > The purpose of rule 100001 it's to alert when there is a port scan
> > > detection on the host.
> > > I tried to active <logall> option on, and I my symantec logs don't
> > > arrive to ossec server. I don't  know why.
> > > In parallel I work on email alert via symantec endpoint protection
> > > manager, maybe it's simplest than try to read symantec non-conforming
> > > logs with ossec.
>
> > That's always an option.
>
> > Did you restart the manager's OSSEC processes after you added the
> > <logall> option to the manager's ossec.conf? You need to restart the
> > processes for the setting to take effect.
>
> > > On 29 juil, 15:44, "dan (ddp)" <[email protected]> wrote:
> > >> On Thu, Jul 28, 2011 at 8:07 AM, Blauch Armand <[email protected]> wrote:
> > >> > Hello,
>
> > >> > I want to check a symantec end point protection log file without
> > >> > succes.
>
> > >> > This file (seclog.log) is here:
> > >> > C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\sec.log
>
> > >> > So, I first add on the ossec.conf this lines (on the agent):
> > >> > ***********************************************************
> > >> > <localfile>
> > >> >    <location>C:\Program Files (x86)\Symantec\Symantec Endpoint
> > >> > Protection\seclog.log</location>
> > >> >    <log_format>syslog</log_format>
> > >> >  </localfile>
> > >> > ***********************************************************
>
> > >> > I've restarted ossec service and put full control for all user on the
> > >> > file sec.log.
>
> > >> > I have theses lines on the ossec.log on the agent:
> > >> > 2011/07/28 03:54:12 ossec-agent(1950): INFO: Analyzing file: 'C:
> > >> > \Program Files (x86)\Symantec\Symantec Endpoint Protection
> > >> > \seclog.log'.
> > >> > 2011/07/28 03:54:12 ossec-agent: INFO: Started (pid: 1308).
>
> > >> > On the ossec server, I've added a decoder:
> > >> > ********************************************************
> > >> > <decoder name="symantec-EndpointProtection-SP">
> > >> >   <prematch>have been scanned from </prematch>
> > >> >   <regex offset="after_prematch">(\S+)</regex>
> > >> >   <order>srcip</order>
> > >> > </decoder>
> > >> > *********************************************************
>
> > >> > I've added to 3 rules:
> > >> > *********************************************************
> > >> > <group name="symantecEP,">
> > >> >  <rule id="100000" level="5">
> > >> >    <decoded_as>symantec-EndpointProtection-SP</decoded_as>
> > >> >    <description>Grouping of Symantec Endpoint Protection Rules.</
> > >> > description>
> > >> >  </rule>
>
> > >> >  <rule id="100001" level="5">
> > >> >    <category>windows</category>
> > >> >    <description>Grouping of Symantec EP rules from file sec.log.</
> > >> > description>
> > >> >  </rule>
>
> > >> What's the purpose of rule 100001?
>
> > >> >  <rule id="100002" level="15">
> > >> >    <if_sid>100000, 100001</if_sid>
> > >> >    <group>recon</group>
> > >> >    <description>Scan Port detected.</description>
> > >> >  </rule>
>
> > >> > </group> <!-- symantec -->
> > >> > *************************************************************
> > >> > I've restarted ossec service on the server.
>
> > >> > My seclog.log is like this:
> > >> > *************************************************************
> > >> > 00000151   01cc4d09b71eCef1    000000ca    0000000b    460da2c0
> > >> > 451da2c0    00000002    00000000    00000001    01cc42095af2e918
> > >> > 01cc4d099113dfe8    000009c1    00000000    Somebody is scanning your
> > >> > computer.
> > >> > Your computer's TCP ports:
> > >> > 2068, 13705, 115, 83 and 1358 have been scanned from
> > >> > 192.168.25.69.                 PV¶ 6 PV¶           PV¶
> > >> > ø[        Default    test    DOMAIN
> > >> > 00000151    01cc4d14fdV17f78    000000ca    0000000b    460da2c0
> > >> > 450d28c0    00000002    00000000    00000001    01cc4d14af92e151
> > >> > 01cc4d14d682ae78    000004b7    00000000    Somebody is scanning your
> > >> > computer.
> > >> > Your computer's TCP ports:
> > >> > 9999, 39, 3001, 254 and 22273 have been scanned from
> > >> > 192.168.25.69.                 PV¶ 6 PV¶           PV¶
> > >> > ø[        Default    test    DOMAIN
> > >> > 00000151   01cc4d16b42e1e74    000000ca    0000000b    460d28c0
> > >> > 450da2c0    00000002    00000000    00000001    01cc4d16592a2768
> > >> > 01cc4d1690651668    00000800    00000000    Somebody is scanning your
> > >> > computer.
> > >> > Your computer's TCP ports:
> > >> > 627, 5432, 569, 1396 and 5901 have been scanned from
> > >> > 192.168.25.69.                 PV¶ 6 PV¶           PV¶
> > >> > ø[        Default    test    DOMAIN
> > >> > 00000152    01cc4d17156723e4    000000ca    0000000b    462da2c0
> > >> > 450da2c0    00000002    00000000    00000001    01cc4d16d0da2838
> > >> > 01cc4d16edefed08    0000027a    00000000    Somebody is scanning your
> > >> > computer.
> > >> > Your computer's TCP ports:
> > >> > 340, 487, 220, 4660 and 5803 have been scanned from
> > >> > 192.168.25.69.                 PV¶ 6 PV¶           PV¶
> > >> > ø[        Default    test    DOMAIN
> > >> > **************************************************************
>
> > >> Unfortunately, due to line wrapping I'm not sure where the logs begin an 
> > >> end.
>
> > >> > And ossec-logtest is ok for this kind of line: "340, 487, 220, 4660
> > >> > and 5803 have been scanned from 192.168.25.69."
>
> > >> > Does anyone has an idea with my issue? How can I check that the ossec
> > >> > server has the informations on the seclog.log?
>
> > >> What is your issue?
> > >> If you want to make sure the logs are making it to the manager, turn
> > >> the <logall> option on. You can then check
> > >> /var/ossec/logs/archives/archives.log to see what log messages are
> > >> being 
> > >> processed.http://www.ossec.net/doc/syntax/head_ossec_config.reports.html#elemen...

Reply via email to