Deploying HIDS Client to Windows Hosts



Similar documents
AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

How to send s triggered by events

Device Integration: Checkpoint Firewall-1

AlienVault. Unified Security Management 5.x Configuration Backup and Restore

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

How to enable File Integrity Monitoring (FIM)

Device Integration: CyberGuard SG565

Monitoring VMware ESX Virtual Switches

AlienVault Unified Security Management (USM) x. Configuring High Availability (HA)

AlienVault. Unified Security Management 5.x Configuring a VPN Environment

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Device Integration: Citrix NetScaler

AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard

Assets, Groups & Networks

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

How to configure High Availability (HA) in AlienVault USM (for versions 4.14 and prior)

Suricata IDS. What is it and how to enable it

Device Integration: Cisco Wireless LAN Controller (WLC)

The SIEM Evaluator s Guide

Netflow Collection with AlienVault Alienvault 2013

Intrusion Detection in AlienVault

User Management Guide

AlienVault. Unified Security Management (USM) x Initial Setup Guide

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

SYSTEM BACKUP AND RESTORE (AlienVault USM 4.8+)

How to Create a Basic VPN Connection in Panda GateDefender eseries

AlienVault. Unified Security Management x Offline Update and Software Restoration Procedures

USER CONFERENCE 2011 SAN FRANCISCO APRIL Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

Network Load Balancing

Outlook 2010 Setup Guide (POP3)

IBM Security QRadar Vulnerability Manager Version User Guide

Installation Guide for Windows May 2016

AlienVault Offline Key Activation

Installation Notes for Outpost Network Security (ONS) version 3.2

Version 3.8. Installation Guide

Networking Guide Redwood Manager 3.0 August 2013

Ekran System Help File

HP Device Manager 4.6

The RT module VT6000 (VT6050 / VT6010) can be used to enhance the RT. performance of CANoe by distributing the real-time part of CANoe to a

Using Cisco UC320W with Windows Small Business Server

Network Setup Guide. Introduction. Setting up for use over LAN

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

IBM Security QRadar Version (MR1) WinCollect User Guide

Citrix Access Gateway Plug-in for Windows User Guide

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

Immotec Systems, Inc. SQL Server 2005 Installation Document

Customer Tips. Configuration and Use of the MeterAssistant Option. for the user. Purpose. Xerox Device Configuration. Xerox Multifunction Devices

RSA Event Source Configuration Guide. McAfee Database Security

Metasys System Direct Connection and Dial-Up Connection Application Note

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Unified Security Management (USM) Asset Management Guide

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Support Guide: Managing the Subject machine s Firewall.

Acellus Lab Cart. User s Manual. Version 4B. Acellus Corporation Copyright 2010 Acellus Corporation. All Rights Reserved.

WHAT IS LOG CORRELATION? Understanding the most powerful feature of SIEM

Discover Security That s Highly Intelligent.

Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

CRESTRON-APP-ANDROID Control App for Android

AWS Service Catalog. User Guide

(1) Network Camera

DCA Local Print Agent Push Install

Administering Jive for Outlook

Asset Management Guide

SonicWALL Global Management System Reporting Guide Standard Edition

Quick Start Guide for VMware and Windows 7

HP Device Manager 4.6

PaperCut Payment Gateway Module - RBS WorldPay Quick Start Guide

Nexio Connectus with Nexio G-Scribe

Enterprise Manager. Version 6.2. Installation Guide

Licensing Guide BES12. Version 12.1

Pearl Echo Installation Checklist

ez Agent Administrator s Guide

vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide

Installing and Configuring vcenter Support Assistant

Wireless Installation Checklist for Novell GroupWise Environments

AlienVault Unified Security Management for Government v4.12 & CyberC4:Alert v4.12 Configuration for Common Criteria

Adaptive Log Exporter Users Guide

Unified Threat Management

Issue Tracking Anywhere Installation Guide

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Setting up Microsoft Office 365

Quick Start Guide for Parallels Virtuozzo

LEVEL PLATFORMS INTEGRATION GUIDE

Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10

Cisco QuickVPN Installation Tips for Windows Operating Systems

Moxa Device Manager 2.3 User s Manual

Wireless Presentation System User s Manual

CRESTRON-APP/CRESTRON-APP-PAD

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later


Aventail Connect Client with Smart Tunneling

StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster

Endpoint Security Console. Version 3.0 User Guide

Fireware Essentials Exam Study Guide

SonicWALL Global Management System Reporting Guide Standard Edition

Monitor Print Popup for Mac. Product Manual.

Desktop Surveillance Help

Transcription:

Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved.

AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat Exchange, AlienVault OTX Reputation Monitor, AlienVault OTX Reputation Monitor Alert, AlienVault OSSIM and OSSIM are trademarks or service marks of AlienVault.

CONTENTS 1. INTRODUCTION... 4 2. PREREQUISITES... 4 3. PRECONFIGURED MANUAL INSTALLATION... 4 4. VALIDATION... 5 4.1. On the Client... 6 4.2. On the Server... 7 5. LOG MANAGEMENT... 8 DC-00127 Edition 00 Copyright 2014 AlienVault. All rights reserved. Page 3 of 10

1. INTRODUCTION AlienVault currently distributes a custom OSSEC 2.7 version, which is a host-based Intrusion Detection system with the following features: Log Monitoring and Collection File Integrity Checking Windows Registry Integrity Checking Active Response AlienVault integrates OSSEC as a key component for providing extended visibility of the operating system layer. OSSEC operates via server/agent architecture, with some limited support for agentless operation with certain operating systems. Agents are deployed to client systems and run as a continuous in-memory service, communicating with the central server via UDP port 1514. Therefore, if there is any firewall in the network, it is necessary to open the UDP port 1514 to make it work. 2. PREREQUISITES A host to be monitored running: Windows Server 2003 and 2008 Windows 7, XP, 2000 and Vista An account with administrative rights for installation 3. PRECONFIGURED MANUAL INSTALLATION For Windows Client Hosts, AlienVault can generate a pre-configured binary this binary will install without the need for any additional configuration. The binary will already have the appropriate server configuration and authentication key embedded in the installation binary. 1. Navigate to Environment > Detection > HIDS and choose Agents. 2. Click on ADD AGENT: 3. Enter the details of the agent to be added either its fixed IP address, or the CIDR subnet if it will have an address assigned by DHCP. DC-00127 Edition 00 Copyright 2014 AlienVault. All rights reserved. Page 4 of 10

4. Once an entry for the new agent is added, from the icon string to the right of the row for the new agent. Click on Download Preconfigured Agent for Windows icon ( ): Figure 1. Detection option: download preconfigured agent for Windows 5. The system will assemble a preconfigured binary, this may take a short time to complete. 6. The assembled installer will then be downloaded. The file name will resemble the following: ossec_installer_564dabd0-fa1c-fd4c-d391-8feedf3246ff_001.exe 7. If necessary, move this generated installer binary to the intended client host for installation. 8. Open the executable, the installer will briefly run in a console window, then display the Installer progress UI for a short time, and, finally, exiting after completing the installation. 9. Skip to the Validation section of this document after this has been completed. 4. VALIDATION Validating a successful pairing between the new client agent and the OSSEC Server host can be performed from both sides of the connection. DC-00127 Edition 00 Copyright 2014 AlienVault. All rights reserved. Page 5 of 10

4.1. ON THE CLIENT The agent maintains a local log file regarding its operation; this can be accessed more directly via the Agent Manager > View menu > View Logs. Figure 2. OSSEC Agent Manager: View menu The log file will open in your system s default application for.txt files (typically notepad). A successful connection to the server will create a log entry similar to this: 2013/05/28 10:53:42 ossec-agent(4102): INFO: Connected to the server (192.168.1.240:1514). 2013/05/28 10:53:42 ossec-agent Sending keep alive message... Should the client agent not be able to connect to the OSSEC Service on the AlienVault server, you will instead see log entries like this: 2013/05/28 12:20:15 ossec-agent(4101): WARN: Waiting for server reply (not started). Tried: '192.168.1.240'. 2013/05/28 12:25:05 ossec-agent: INFO: Trying to connect to server (192.168.1.240:1514). 2013/05/28 12:25:05 ossec-agent: INFO: Using IPv4 for: 192.168.1.240 DC-00127 Edition 00 Copyright 2014 AlienVault. All rights reserved. Page 6 of 10

4.2. ON THE SERVER Return to the AlienVault Web UI. Open the OSSEC configuration panel through Environment > Detection > HIDS. Look for the Agent s listing at the bottom of the main panel, for your newly created agent to be marked as Active: Figure 3. OSSEC configuration panel The trend chart will not immediately populate, requiring logs to be received from the client for a period of time beforehand. Your Client Installation is now completed. When re-launching the OSSEC manage agent tool under windows, it must always be started using the run as Administrator option. If not done so it will indicate, falsely, that the agent is not running, service status will be unavailable, and agent status logs will not be permitted to be viewed. DC-00127 Edition 00 Copyright 2014 AlienVault. All rights reserved. Page 7 of 10

5. LOG MANAGEMENT Event logs provide all the information you need to troubleshoot operational errors, and investigate potential security exposures. Navigate to Analysis > Security Events (SIEM). The window is similar to the following: DC-00127 Edition 00 Copyright 2014 AlienVault. All rights reserved. Page 8 of 10

Figure 4. Security Events (SIEM) Navigate to Analysis > Raw Logs to view Logger logs: DC-00127 Edition 00 Copyright 2014 AlienVault. All rights reserved. Page 9 of 10

Figure 5. Raw Logs DC-00127 Edition 00 Copyright 2014 AlienVault. All rights reserved. Page 10 of 10