Setting up OSSEC on Cent OS

Installing OSSEC

E-mail Print PDF

Product Name : OSSEC
Product Version : 1.6.1
Homepage : http://www.ossec.net/
Description : OSSEC is an Open Source Host-based intrusion detection system. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, Mac OS, Solaris and Windows. It has a centralized, cross-platform architecture allowing multiple systems to be easily monitored and managed. It was written by Daniel B. Cid and made public in 2004.

This tool will autosense your system, and send you mails when something is strange or really fishy.

It sends you mail from LEVEL 1 to LEVEL 10, so if you get LEVEL 10 mails you need to read them đŸ™‚

Step 1: Installing OSSEC from Source

cd /usr/local/src
wget http://www.ossec.net/files/ossec-hids-1.6.1.tar.gz
tar -zxf ossec-hids-1.6.1.tar.gz
cd ossec-hids-1.6.1
./install.sh

Step 2: Now the config, my choices are marked with RED text

[root@box ossec-hids-1.6.1]# ./install.sh

Choice 1:
(en/br/cn/de/el/es/fr/it/jp/pl/ru/sr/tr) [en]: <— Enter
Choice 2:
1- What kind of installation do you want (server, agent, local or help)? <— Local
Choice 3:
– Choose where to install the OSSEC HIDS [/var/ossec]: <— Enter
Choice 4:
3.1- Do you want e-mail notification? (y/n) [y]: <— Enter
Choice 4.1:
– What’s your e-mail address? <— Fill in the email you want the alerts to
Choice 4.2: Installer will try to find you smtp server that belongs to your email. Choose NO and use localhost if you have sendmail running on your server.
– Do you want to use it? (y/n) [n]:  <— Press N
Choice 4.3:
– What’s your SMTP server ip/host? <— Localhost
Choice 5:
3.2- Do you want to run the integrity check daemon? (y/n) [y]: <— Enter
Choice 6:
3.3- Do you want to run the rootkit detection engine? (y/n) [y]: <— Enter
Choice 7:
– Do you want to enable active response? (y/n) [y]: <— Press Enter
Choice 8:
– Do you want to enable the firewall-drop response? (y/n) [y]: <— Press Enter
Choice 9: Choose Yes if you want to add more IPs to the whitelist. Else NO to continue
– Do you want to add more IPs to the white list? (y/n)? [n]:

Step 3: Installer made OSSEC start at boot.
Step 3.1:
To start the OSSEC

/var/ossec/bin/ossec-control start

Step 3.2: To stop the OSSEC

/var/ossec/bin/ossec-control stop

Step 4:For futher settings, edit of the config file

nano /var/ossec/etc/ossec.conf

Optional Config 1: Add this lines in /var/ossec/etc/ossec.conf to get rid of some unnessecary mails from OSSEC
Locate , And add new lines

If you use APF Firewall:

/etc/apf/internals/.last.full
/etc/apf/internals/.apf.restore
/etc/prelink.cache

If you use CSF Firewall:

/etc/csf/csf.temppids
/etc/csf/csf.spamhaus

Restart  OSSEC

/var/ossec/bin/ossec-control restart

From

http://74.125.95.132/search?q=cache:bhJziKKdcAcJ:www.securecentos.com/temp/installing-ossec.html+http://www.securecentos.com/installing-ossec.html&cd=1&hl=en&ct=clnk&gl=us&client=firefox-a

Leave a Reply

Your email address will not be published. Required fields are marked *