4. Host-Based Intrusion Detection Systems


We use OSSEC for our Host-Based Intrusion Detection System because it not only comes preconfigured with many powerful rules/logs built in, but it also allows for extreme customizability. We installed OSSEC on a dedicated OSSEC server and then set up the other servers as OSSEC agents which would talk to the OSSEC server. This creates a relationship where OSSEC can monitor every server on the network and consolidate the activity into one easy to use and easy to find place. We set up email alerting with OSSEC and decided that we would set the email alert level to minimum of 1 since we were sending the email to a Gmail account made just for this. This means that the gmail account becomes flooded with many alerts, but we this is okay since it is a dedicated OSSEC email. If we were to use this with a personal email we would probably increase the level to 6 or 7. We also reduced the syscheck frequency down to checking every half an hour rather than the 22 hour default.

Overall, OSSEC is extremely powerful and allows us to see all of the important activity that we would want to see as administrators. It shows us when users begin and end ssh sessions, root user sessions, access denied messages, file integrity, and more all send through easy email alerting and gives us lots of power to add new rules as necessary.

results matching ""

    No results matching ""