I've been trying to use ossec-reportd by issuing the following command: cat 
/var/ossec/logs/alerts/alerts.log | /var/ossec/bin/ossec-reportd -f group 
authentication_success

Unfortunately, the output is simply:

2014/03/17 09:53:34 ossec-reportd: INFO: Started (pid: 13402).
2014/03/17 09:53:40 ossec-reportd: INFO: Report completed and zero alerts 
post-filter.

However, if I cat out the alerts.log file it looks like this:

AV - Alert - "1395036000" --> RID: "18107"; RL: "3"; RG: 
"windows,authentication_success,"; RC: "Windows Logon Success."; USER: 
"None"; SRCIP: "None"; HOSTNAME: "(**********) **.*.**.***->WinEvtLog"; 
LOCATION: "(*********) **.*.**.***->WinEvtLog"; EVENT: "[INIT]WinEvtLog: 
Security: AUDIT_SUCCESS(4624): Microsoft-Windows-Security-Auditing: (no 
user): no domain: ******.***.local: An account was successfully logged on. 
   Subject:          Security ID:    *-*-*-*         Account Name:   -     
  Account Domain:         -       Logon ID:       0x0    Logon Type:       
       3    Impersonation Level:       %1833    New Logon:     Security ID: 
   **********************         Account Name:   *************       
Account Domain:         ****    Logon ID:       ***********      Logon 
GUID:     {00000000-0000-0000-0000-000000000000}    Process Information:   
       Process ID:     0x0     Process Name:   -    Network Information:   
    Workstation Name: L2FS266       Source Network Address: 10.1.14.119     
Source Port:    57548    Detailed Authentication Information:   Logon 
Process:  NtLmSsp         Authentication Package: NTLM    Transited 
Services: -   Package Name (NTLM only): NTLM V2       Key Length:     128   
 This event is generated when a logon session is created. It is generated 
on the computer that was accessed.    The subject fields indicate the 
account on the local system which requested the logon. This is most 
commonly a service such as the Server service, or a local process such as 
Winlogon.exe or Services.exe.    The logon type field indicates the kind of 
logon that occurred. The most common types are 2 (interactive) and 3 
(network).    The New Logon fields indicate the account for whom the new 
logon was created, i.e. the account that was logged on.

*Note*: I replaced any identifying information (domain, IP Address, etc) 
with *************.

Clearly running reportd for authentication_success should catch this event 
correct or am I misunderstanding the filter? The filter I'm most interested 
in is File Integrity Monitoring in the end, but it would be nice to 
understand more about these filters and what I'm doing wrong.

Any help is greatly appreciated, thank you for your time.

Jimmy

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to