I have the below in my "./etc/local_decoder.xml" file in an attempt to 
create custom decoders for specific Windows events such as RDP logons.  The 
log sample isn't being decoded by the "windows_rdp" decoder and I'm not 
sure why.  I have tried dozens of variations on the below with no success. 
 Not sure what I'm missing and I'm guessing its something simple I'm just 
missing.  If I remove the "windows_rdp" decoder things go back to normal in 
decoding windows logs.  With the decoder in place the rule 18100 is what 
gets applied with the description of "Group of windows rules." and not my 
rule of 100010.  This is on OSSEC 2.8.

*Decoders in ./etc/local_decoder.xml:*
<decoder name="windows">
  <type>windows</type>
  <prematch>^\d\d\d\d \w\w\w \d\d \d\d:\d\d:\d\d WinEvtLog: |^WinEvtLog: 
</prematch>
</decoder>

<decoder name="windows_rdp">
  <type>windows</type>
  <parent>windows</parent>
  <regex offset="after_parent">4624</regex>
</decoder>

<decoder name="windows_default">
  <type>windows</type>
  <parent>windows</parent>
  <regex offset="after_parent">^\.+: (\w+)\((\d+)\): (\.+): </regex>
  <regex>(\.+): \.+: (\S+): </regex>
  <order>status, id, extra_data, user, system_name</order>
  <fts>name, location, user, system_name</fts>
</decoder>

*Rule in ./rules/local_rules.xml:*
<group name="windows,">
        <rule id="100010" level="12">
                <decoded_as>windows_rdp</decoded_as>
                <group>rdp</group>
                <description>RDP Windows Logon</description>
        </rule>
</group>

*Below is a log sample:*
2014 Aug 28 09:54:56 WinEvtLog: Security: AUDIT_SUCCESS(4624): 
Microsoft-Windows-Security-Auditing: tsmith: CONTOSO: server55.contoso.com 
<http://server55.na.d-rco.com/>: An account was successfully logged on. 
Subject:  Security ID:  S-1-5-18  Account Name:  server55$  Account Domain: 
 CONTOSO  Logon ID:  0x3e7  Logon Type:   10  New Logon:  Security ID: 
 S-1-5-21-1434109735-357464061-2299825339-86050  Account Name:  tsmith 
 Account Domain:  CONTOSO  Logon ID:  0x128a6efd  Logon GUID: 
 {0254B574-A9A0-7895-94B0-AD2127BDE342}  Process Information:  Process ID: 
 0x1280  Process Name:  C:\Windows\System32\winlogon.exe  Network 
Information:  Workstation Name: server55  Source Network Address: 
192.168.11.4  Source Port:  9512  Detailed Authentication Information: 
 Logon Process:  User32   Authentication Package: Negotiate  Transited 
Services: -  Package Name (NTLM only): -  Key Length:  0  This event is 
generated when a logon session is created. It is generated on the computer 
that was accessed.

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to