I have no issues with creating decoders and rules, been doing it for years.

But these do not make up for event information that the agent fails to
include in the event that it forwards to the OSSEC server. That is where
the problem lies -- agent-side /not/ server-side.

In the case of WMI, sufficient detail is forwarded. But in the case of
AppLocker, the information forwarded by the agent is woefully deficient.

In the environment, sudowin is utilized to elevate privileges. So the
user name _can__not_ be a criteria that allows the determination of
whether a user is privileged or not. In regulated environments this is
crucial. The Logon ID is what allows us to distinguish between
unprivileged and privileged user sessions for the same Account Name
/and/ Security ID. In the XML event, it reports the logon ID plus
rule/policy information. All that the agent sends upstream is the user
name and application path, and whether it was blocked, allowed, or
allowed in audit mode. Better than nothing, but not good enough. Lots
more information is definitely lurking in XML, and it is /not/ being
picked up by the agent.

Seems to me the agent is picking up the eventlog and not the
eventchannel. For WMI, there is little difference. between the two But
for AppLocker the story differs
 eventlog is truly minimal.

- <#> <Eventxmlns="*http://schemas.microsoft.com/win/2004/08/events/event*";>
- <#> <System>
  <Provider
Name="*Microsoft-Windows-AppLocker*"Guid="*{CBDA4DBF-8D5D-4F69-9578-BE14AA540D22}*"/>

  <EventID>8003</EventID>
  <Version>0</Version>
  <Level>3</Level>
  <Task>0</Task>
  <Opcode>0</Opcode>
  <Keywords>0x8000000000000000</Keywords>
  <TimeCreated SystemTime="*2017-03-07T21:48:00.766807200Z*"/>
  <EventRecordID>3367</EventRecordID>
  <Correlation />
  <Execution ProcessID="*1144*"ThreadID="*19284*"/>
  <Channel>Microsoft-Windows-AppLocker/EXE and DLL</Channel>
  <Computer>Desktop</Computer>
  <Security UserID="*S-1-5-21-*XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXXX-XXXX"/>
  </System>
- <#> <UserData>
- <#>
<RuleAndFileDataxmlns="*http://schemas.microsoft.com/schemas/event/Microsoft.Windows/1.0.0.0*";>
  <PolicyName>EXE</PolicyName>
  <RuleId>{00000000-0000-0000-0000-000000000000}</RuleId>
  <RuleName>-</RuleName>
  <RuleSddl>-</RuleSddl>
  <TargetUser>S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXXX-XXXX</TargetUser>
  <TargetProcessId>18476</TargetProcessId>
 
<FilePath>%OSDRIVE%\USERS\XXXXXXXX\APPDATA\LOCAL\CITRIX\GOTOMEETING\6441\G2MUPDATE.EXE</FilePath>

 
<FileHash>27BACB741B3A46B326905C18E67D809404FD69578711E00C94CB00067AE79899</FileHash>

  <Fqbn>O=CITRIX ONLINE, L=FORT LAUDERDALE, S=FLORIDA,
C=US\GOTOMEETING\G2M.EXE\8.0.0.6441</Fqbn>
  <TargetLogonId>0x3147a4</TargetLogonId>
  </RuleAndFileData>
  </UserData>
  </Event>

Yet, the following is all the agent picks up:

Log Name:      Microsoft-Windows-AppLocker/EXE and DLL
Source:        Microsoft-Windows-AppLocker
Date:          2017-03-07 23:48:00
Event ID:      8003
Task Category: None
Level:         Warning
Keywords:     
User:          DOMAIN\User
Computer:      Computer
Description:
%OSDRIVE%\USERS\XXXXXXXX\APPDATA\LOCAL\CITRIX\GOTOMEETING\6441\G2MUPDATE.EXE
was allowed to run but would have been prevented from running if the
AppLocker policy were enforced.

Open to a G2M to exchange info if you feel it necessary to move forward.

Which time zone are you in?
------------------------------------------------------------------------

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to