Hello list,
I am working on some integration of OSSEC into our systems. Situation
is  following:
Our agents are almost all "dynamic", so I a have agents with, for
example,  ID=030, agent-name: test_wks230, ip=0.0.0.0/0

This basically works well, because ID of the secured communication
between OSSEC remoted and remote agent is sent unencrypted, so the
remoted knows agent name, even if there are many of them behind single
IP.

What I need is to know which ip is agent behind. In the logs, there is
no such information. I would like to see in the log, for example:

** Alert 1337151768.43281: - windows,authentication_success,
2012 May 16 09:02:48 (test_wks230) 0.0.0.0->WinEvtLog
Rule: 18107 (level 3) -> 'Windows Logon Success.'
User: user
IncomingIP: 123.123.123.123
<<<<<<<<<<<<<<<<<<<-----------------------
WinEvtLog: Security: AUDIT_SUCCESS(4624): Microsoft-Windows-Security-
Auditing: user: wks_230: wks_230: An account was successfully logged
on. Subject:  Security ID:  S-1-5-18  Account Name:  WKS_230$  Account
Domain:  WORKGROUP  Logon ID:  0x3e7  Logon Type:   7  New Logon:
Security ID:  S-1-5-21-3830819501-1208969821-1794380766-1001  Account
Name:  user  Account Domain:  wks_230  Logon ID:  0x4e5625e  Logon
GUID:  {00000000-0000-0000-0000-000000000000}  Process Information:
Process ID:  0x318  Process Name:  C:\Windows\System32\winlogon.exe
Network Information:  Workstation Name: WKS_230  Source Network
Address: 127.0.0.1  Source Port:  0  Detailed Authentication
Information:  Logon Process:  User32   Authentication Package:
Negotiate  Transited Services: -  Package Name (NTLM only): -  Key
Length:  0  This event is generated when a logon session is created.
It is generated on the computer that was accessed.

Is there some already existing solution for that, or is this nonsense?
Thanks!

Regards,
Ales

Reply via email to