Hi,

Unfortunately windows audit (EventLog configuration) has not specific 
configuration,
          If audit of windows firewall event is enable, all of firewall 
events (chrome, internet explorer, ping, etc) is logged. (So we *cannot 
exclude OSSEC firewall events*)
          If audit of windows firewall event is disable, *we cannot detect 
*network 
scan, port scan, etc attacks.


I don't know specific information of UDP but Is there any* socket.open() 
socket.close() f*unctionalism?
          When ossec service start, UDP socket will be open. When service 
close, UDP socket will close? (Like TCP)
                  And it will solve *infinite recursivity log *problem.

Best Regards


9 Haziran 2016 Perşembe 12:11:52 UTC+3 tarihinde Victor Fernandez yazdı:
>
> Hi Abdulvehhab.
>
> It has sense, it falls into a infinite recursivity, But it's a bit 
> difficult to store some messages and send them to the server since the 
> protocol consists on one datagram per message. Even if the agent stores 
> some messages and sends all of them at a time, the firewall would detect 
> one delivery per message.
>
> Out of curiosity, what is the EventLog configuration? Maybe it's possible 
> to ignore connections towards the OSSEC server.
>
> Best regards.
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to