OSSEC Version 3.6.0 Install Successful on Google Cloud



Created by Andrew Francis
March 11, 2020

******************    OSSEC v. 3.6.0 INSTALL SUCCESSFUL  *************

This is on a CentOS 7 vm on Google Cloud Platform 

uname -a
Linux ids-server 3.10.0-1062.12.1.el7.x86_64 #1 SMP Tue Feb 4 23:02:59 UTC 2020 x86_64 x86_64 x86_64 

CentOS Linux release 7.7.1908 (Core)

[andy@ids-server ossec-hids-3.6.0]$ 

 sudo yum install zlib-devel pcre2-devel make gcc
 sudo  yum install mysql-devel postgresql-devel
 sudo  yum install sqlite-devel

 sudo yum install  libevent libevent-devel.x86_64

 wget https://github.com/ossec/ossec-hids/archive/3.6.0.tar.gz
 tar -xzvf 3.6.0.tar.gz

 cd ossec-hids-3.6.0/

[andy@ids-server ossec-hids-3.6.0]$ sudo  PCRE2_SYSTEM=yes ./install.sh

(en/br/cn/de/el/es/fr/hu/it/jp/nl/pl/ru/sr/tr) [en]:

OSSEC HIDS v3.6.0 Installation Script - http://www.ossec.net

You are about to start the installation process of the OSSEC HIDS.
You must have a C compiler pre-installed in your system.

System: Linux ids-server 3.10.0-1062.12.1.el7.x86_64

User: root

Host: ids-server

-- Press ENTER to continue or Ctrl-C to abort. --

1- What kind of installation do you want (server, agent, local, hybrid or help)? server

Server installation chosen.

2- Setting up the installation environment.

Choose where to install the OSSEC HIDS [/var/ossec]:

Installation will be made at  /var/ossec .

3- Configuring the OSSEC HIDS.

3.1- Do you want e-mail notification? (y/n) [y]:

What's your e-mail address? root@localhost

What's your SMTP server ip/host? 127.0.0.1

3.2- Do you want to run the integrity check daemon? (y/n) [y]:

Running syscheck (integrity check daemon).

3.3- Do you want to run the rootkit detection engine? (y/n) [y]:

Running rootcheck (rootkit detection).

3.4- Active response allows you to execute a specific
command based on the events received. For example,
you can block an IP address or disable access for
a specific user.
More information at:
http://www.ossec.net/en/manual.html#active-response

Do you want to enable active response? (y/n) [y]:

Active response enabled.

By default, we can enable the host-deny and the
firewall-drop responses. The first one will add
a host to the /etc/hosts.deny and the second one
will block the host on iptables (if linux) or on
ipfilter (if Solaris, FreeBSD or NetBSD).

They can be used to stop SSHD brute force scans,
portscans and some other forms of attacks. You can
also add them to block on snort events, for example.

Do you want to enable the firewall-drop response? (y/n) [y]:

firewall-drop enabled (local) for levels >= 6



169.254.169.254

Do you want to add more IPs to the white list? (y/n)? [n]:

3.5- Do you want to enable remote syslog (port 514 udp)? (y/n) [y]:

Remote syslog enabled.

3.6- Setting the configuration to analyze the following logs:
-- /var/log/messages
-- /var/log/secure
-- /var/log/maillog

If you want to monitor any other file, just change
the ossec.conf and add a new localfile entry.
Any questions about the configuration can be answered
by visiting us online at http://www.ossec.net .

--- Press ENTER to continue ---

5- Installing the system

Running the Makefile

...........Make details omitted .........

System is Redhat Linux.

Init script modified to start OSSEC HIDS during boot.

Configuration finished properly.

To start OSSEC HIDS:
/var/ossec/bin/ossec-control start

To stop OSSEC HIDS:
/var/ossec/bin/ossec-control stop

The configuration can be viewed or modified at /var/ossec/etc/ossec.conf

Thanks for using the OSSEC HIDS.
If you have any question, suggestion or if you find any bug,
contact us at https://github.com/ossec/ossec-hids

 or using
our public maillist at
https://groups.google.com/forum/#!forum/ossec-list

More information can be found at http://www.ossec.net

---  Press ENTER to finish (maybe more information below). ---

In order to connect agent and server, you need to add each agent to the server.
Run the 'manage_agents' to add or remove them:

/var/ossec/bin/manage_agents

More information at:
http://www.ossec.net/en/manual.html#ma

[andy@ids-server ossec-hids-3.6.0]$

Comments

Popular posts from this blog

Linux Performance Monitoring