Files
main/Auditd
2023-01-03 06:54:01 -06:00
..
2022-12-29 10:39:48 -06:00
2023-01-03 06:53:06 -06:00
2022-12-29 10:41:02 -06:00
2022-12-29 10:45:43 -06:00
2023-01-03 06:53:50 -06:00

Auditd Awesome

The Linux Audit system provides a way to log events that happen on a Linux system. The recording options offered by the Audit system is extensive — process, network, file, user login/logout events, etc. Must have Auditd installed.

MIT License LinkedIn your-own-soc-free-for-life-tier

Auditd Rules

Use the provided auditd rules to get started.

Use custom decoders rather than the ones provided by Wazuh. I was seeing issues during testing with their provided decoders.

Remember to exclude Wazuh's default auditd decoder and rules within the ossec.conf of the manager:

<ruleset>
    <!-- Default ruleset -->
    <decoder_dir>ruleset/decoders</decoder_dir>
    <decoder_exclude>ruleset/decoders/0040-auditd_decoders.xml</decoder_exclude>
    <rule_dir>ruleset/rules</rule_dir>
    <rule_exclude>0215-policy_rules.xml</rule_exclude>
    <rule_exclude>0365-auditd_rules.xml</rule_exclude>
    <list>etc/lists/audit-keys</list>
    <list>etc/lists/amazon/aws-eventnames</list>
    <list>etc/lists/security-eventchannel</list>
    <list>etc/lists/software-vendors</list>
    <list>etc/lists/common-ports</list>
    <list>etc/lists/rfc-1918</list>
    <list>etc/lists/cve</list>
    <list>etc/lists/malicious-powershell</list>
    <list>etc/lists/bash_profile</list>
    <!-- User-defined ruleset -->
    <decoder_dir>etc/decoders</decoder_dir>
    <rule_dir>etc/rules</rule_dir>
  </ruleset>

Need Help?

SOCFortress - LinkedIn - info@socfortress.co

Let SOCFortress Professional Services Take Your Open Source SIEM to the Next Level

Banner