Good thread idea. I’ve copied a few Windows-centric rules below. Some of the 
rules that lean heavily on <match> could no doubt be improved, but they don’t 
bother me with false positives or performance issues in my small environment, 
so I don’t worry about it. YMMV. I also have some decoders and rules for Cowrie 
honeypots, but intend to polish those up and submit a pull request for those 
one of these days. If anyone is interested in testing them though, I could send 
those off list.

 

<rule id="100006" level="8">

        <if_sid>594</if_sid>

        <match>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run</match>

        <description>A change has been made to the software that automatically 
runs at startup.</description>

</rule>

 

<rule id="100010" level="7">

        <if_sid>18103</if_sid>

        <match>Length specified in network packet</match>

        <description>Somebody is sending malformed data to your SQL Server. You 
should probably investigate.</description>

</rule>

 

<rule id="100011" level="10">

        <if_sid>18101</if_sid>

        <match>PSEXESVC|PsExec</match>

        <description>Remote access via PSEXEC. If this wasn't initiated by you, 
then you've got a problem.</description>

</rule>

 

<rule id="100013" level="8">

        <if_sid>18102</if_sid>

        <id>^2004$</id>

        <match>diagnosed</match>

        <description>There's a problem with abnormal memory usage on this 
system! Please investigate the indicated processes.</description>

</rule>

 

<rule id="100014" level="7">

        <if_sid>18104</if_sid>

        <id>4698</id>

        <description>A scheduled task has been created on this machine. Please 
review.</description>

        <info>Requires group policy modification to the Advanced Security Audit 
policy/Audit Other Object Access Events. See: 
https://technet.microsoft.com/en-us/library/dn319119.aspx</info>

</rule>

 

<rule id="100016" level="1">

        <if_sid>18103</if_sid>

        <id>36874|36888</id>

        <group>recon_ssl,</group>

        <description>Add Schannel errors to the custom recon_ssl 
group</description>

</rule>

 

<rule id="100017" level="7" frequency="38" timeframe="120" ignore="1800">

        <if_matched_group>recon_ssl</if_matched_group>

        <description>There have been over 40 SSL cipher suite probes in the 
last two minutes. Someone may be performing reconnaissance on your servers, 
assessing whether one of your SSL-enabled services is vulnerable to 
exploits.</description>

        <info>Unfortunately, Schannel errors are of limited usefulness. They 
occur without any indication of which IP address caused them, so consulting 
contextual log info or firewall logs is the only way to track down who is 
responsible.</info>

</rule>

 

<rule id="100022" level="7">

        <if_sid>18103</if_sid>

        <id>^1000$|^1002$|^7023$|^7034$</id>

        <!--<match>Fault|terminate</match>-->

        <description>A program or service has crashed. Investigate as 
appropriate.</description>

</rule>

 

<rule id="100026" level="7">

        <if_sid>18101</if_sid>

        <id>^7045$</id>

        <description>A new service has been installed on this 
computer.</description>

</rule>

 

From: [email protected] [mailto:[email protected]] On 
Behalf Of [email protected]
Sent: Thursday, March 3, 2016 6:35 AM
To: ossec-list <[email protected]>
Subject: [ossec-list] What's your favorite rules?

 

I'm wondering what everyone's favorite rules are.

 

I'm trying to come up with some new rules to tighten security, so I would like 
to hear (and see code snippets) or folks favorites, and what they are designed 
to detect. I.E. detect commands run, look for certain IOC's and so on. I'm 
impressed with how much OSSEC does out of box too!

 

Thanks!

 

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected] 
<mailto:[email protected]> .
For more options, visit https://groups.google.com/d/optout.

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to