Cyber Security: Security Onion Agent

From OnnoWiki
Revision as of 17:18, 14 July 2023 by Onnowpurbo (talk | contribs) (Created page with "Sumber: http://stuff.is-a-geek.net/OnlineDocs/Security/securityonion.readthedocs.io/en/latest/wazuh.html ==Security Onion Usage== Security Onion uses Wazuh as a Host Intrusi...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Sumber: http://stuff.is-a-geek.net/OnlineDocs/Security/securityonion.readthedocs.io/en/latest/wazuh.html


Security Onion Usage

Security Onion uses Wazuh as a Host Intrusion Detection System (HIDS). Wazuh is monitoring and defending Security Onion itself and you can add Wazuh agents to monitor other hosts on your network as well.

Wazuh replaced OSSEC: https://blog.securityonion.net/2018/10/wazuh-361-elastic-641-and-associated.html

Configuration

The main configuration file for Wazuh is /var/ossec/etc/ossec.conf.

Email If you want to configure Wazuh to send email, please see the Email section.

Syslog If you want to send Wazuh logs to an external syslog collector, please see the syslog-output section.

Active Response

Sometimes, Wazuh may recognize legitimate activity as potentially malicious, and engage in Active Response to block a connection. This may result in unintended consequences and/or blacklisting of trusted IPs. To prevent this from occurring, you can whitelist your IP address and change other settings in /var/ossec/etc/ossec.conf:

<global>
<white_list>desired_ip</white_list>
</global>

Tuning Rules

You can add new rules and modify existing rules in /var/ossec/rules/local_rules.xml.

Wazuh alerts of a level of 5 or greater will be populated in the Sguil database, and viewable via Sguil and/or Squert. If you would like to change the level for which alerts are sent to sguild, you can modify the value for OSSEC_AGENT_LEVEL in /etc/nsm/securityonion.conf and restart NSM services.

Menambahkan Agent

The Wazuh agent is cross platform and you can download agents for Windows/Unix/Linux/FreeBSD from the Wazuh website: https://documentation.wazuh.com/3.9/installation-guide/packages-list/index.html Please note! It is important to ensure that you download the agent that matches the version of your Wazuh server. For example, if your Wazuh server is version 3.9.5, then you will want to deploy Wazuh agent version 3.9.5.

Once you’ve installed the Wazuh agent on the host(s) to be monitored, then perform the steps defined here: https://documentation.wazuh.com/current/user-manual/registering/cli/using-command-line-linux.html You may need to run so-allow to allow traffic from the IP address of your Wazuh agent(s).

Maximum Number of Agent

Security Onion is configured to support a maximum number of 14000 Wazuh agents reporting to a single Wazuh manager.

Automated Deployment

If you would like to automate the deployment of Wazuh agents, the Wazuh server includes ossec-authd: https://documentation.wazuh.com/3.9/user-manual/reference/daemons/ossec-authd.html When using ossec-authd, be sure to add a firewall exception for agents to access port 1515/tcp on the Wazuh manager node:

sudo ufw allow proto tcp from agent_ip to any port 1515

More Information For more information about Wazuh, please see https://documentation.wazuh.com/3.9/.




Referensi

Pranala Menarik