The Windows decoder has been problematic for many people. I think it's time to fix it. But in order to do so, we need some logs. If you would like to help the project, here is what I need.

Raw logs from the security event log in archives.log on the manager (the more, the better, hopefully from an active production domain of at least 100 users)...

- Windows 2003 domain controller
- Windows 2008 domain controller
- Windows 2003 domain member
- Windows 2003 standalone
- Windows 2008 domain member
- Windows 2008 standalone
- Windows XP domain member
- Windows XP standalone
- Windows Vista domain member
- Windows Vista stand-alone

Preferably, you can grep out the relevant logs from archives.log (use the hostname) and redirect them to another file, then let me know what kind of logs they are.

From this we will improve the decoder and create unit test cases from the specific event IDs that OSSEC has rules for.

About your privacy: I will keep the logs confidential; however, we will need to keep samples of some logs for the unit tests. I will anonymize these samples and then ask for your agreement that they are sufficiently anonymized, so that they can be included in the project.

If you would like to help, please tar and gzip the samples and send them to me OFF LIST. Please do NOT copy them to a Windows system before compressing them. I need the original control characters to be intact, so just use the tar in Linux.

Thanks for your help!

--

--- You received this message because you are subscribed to the Google Groups "ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to