On Mon, Mar 17, 2014 at 12:00 PM, James Brown <[email protected]> wrote:
> I've been trying to use ossec-reportd by issuing the following command: cat
Which version of OSSEC?
> /var/ossec/logs/alerts/alerts.log | /var/ossec/bin/ossec-reportd -f group
> authentication_success
>
> Unfortunately, the output is simply:
>
> 2014/03/17 09:53:34 ossec-reportd: INFO: Started (pid: 13402).
> 2014/03/17 09:53:40 ossec-reportd: INFO: Report completed and zero alerts
> post-filter.
>
> However, if I cat out the alerts.log file it looks like this:
>
I'm not sure where you got this alert from, but it is not in OSSEC's
alert format.
> AV - Alert - "1395036000" --> RID: "18107"; RL: "3"; RG:
> "windows,authentication_success,"; RC: "Windows Logon Success."; USER:
> "None"; SRCIP: "None"; HOSTNAME: "(**********) **.*.**.***->WinEvtLog";
> LOCATION: "(*********) **.*.**.***->WinEvtLog"; EVENT: "[INIT]WinEvtLog:
> Security: AUDIT_SUCCESS(4624): Microsoft-Windows-Security-Auditing: (no
> user): no domain: ******.***.local: An account was successfully logged on.
> Subject: Security ID: *-*-*-* Account Name: -
> Account Domain: - Logon ID: 0x0 Logon Type:
> 3 Impersonation Level: %1833 New Logon: Security ID:
> ********************** Account Name: ************* Account
> Domain: **** Logon ID: *********** Logon GUID:
> {00000000-0000-0000-0000-000000000000} Process Information:
> Process ID: 0x0 Process Name: - Network Information:
> Workstation Name: L2FS266 Source Network Address: 10.1.14.119
> Source Port: 57548 Detailed Authentication Information: Logon
> Process: NtLmSsp Authentication Package: NTLM Transited
> Services: - Package Name (NTLM only): NTLM V2 Key Length: 128
> This event is generated when a logon session is created. It is generated on
> the computer that was accessed. The subject fields indicate the account
> on the local system which requested the logon. This is most commonly a
> service such as the Server service, or a local process such as Winlogon.exe
> or Services.exe. The logon type field indicates the kind of logon that
> occurred. The most common types are 2 (interactive) and 3 (network). The
> New Logon fields indicate the account for whom the new logon was created,
> i.e. the account that was logged on.
>
> Note: I replaced any identifying information (domain, IP Address, etc) with
> *************.
>
> Clearly running reportd for authentication_success should catch this event
> correct or am I misunderstanding the filter? The filter I'm most interested
> in is File Integrity Monitoring in the end, but it would be nice to
> understand more about these filters and what I'm doing wrong.
>
> Any help is greatly appreciated, thank you for your time.
>
> Jimmy
>
> --
>
> ---
> You received this message because you are subscribed to the Google Groups
> "ossec-list" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> For more options, visit https://groups.google.com/d/optout.
--
---
You received this message because you are subscribed to the Google Groups
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.