AppLocker Event Logs with OSSEC 2.8
In a previous post, Monitoring Windows Networks Using Syslog, I discussed using syslog to send the event logs to a SIEM. This post covers another technique for collecting event log data for analysis.
A new version of OSSEC (2.8) has been released that includes the ability on Windows to access event channels that were introduced in Vista. To get this  to work correctly, I had to have the agent and server on 2.8. This new ability allows admins to send some of the more interesting event logs to OSSEC in a very easy way.
Client Config
Setting up the config for the subscription is quite easy. Â If you want to do it on an per install basis, you edit the C:\Program Files\ossec-agent\ossec.conf. Â Add a new tag for local file, then under location put the XPATH channel name and the log_format as eventchannel.
Â
â??![]()
Â
If you want this config to be pushed out to all your Windows OS centrally, you should add the config below to the /var/ossec/etc/shared/agent.conf. This file has a added XML field for matching which system should apply the config.
Â
Â
Creating Rules
Once you get the logs, you need to create rules to get the alerts. Â When creating the rules, you need to know what event level (e.g. Info, Error ect..) the alerts are created for the event. Â To get a detailed list of the events, follow this link (hxxp://technet.microsoft.com/en-us/library/ee844150(v=ws.10).aspx)
Â
When creating your own rules, you should always add them to the Local_rules.xml file to make sure they do not get overwritten with updates. Â These rules should start with 100000 rule ID.
Â
Â
Â
Iâ??ve posted all my AppLocker rules to my github(hxxps://github.com/tcw3bb/ISC_Posts/blob/master/OSSEC_AppLocker_Local_Rule.xml), and Iâ??ve also submitted them to the OSSEC group to be added in the next version.  When using the local rules, you may need to change rule ID for your environment. Â
RAW Log
Once you have the rules in place your alerts like the ones below should be created.
Quick report
To get a report for the current day of who had blocked apps, you can run the following:
>zcat /var/ossec/log/alerts/alerts.log |/var/ossec/bin/ossec-reportd -f rule 100021 -s
Â
I also have a nxlog and an eventsys client config on my github (hxxps://github.com/tcw3bb/ISC_Posts)for additional client config.  To use these with OSSEC, you will need to have a different parser and rules. Â
--
Tom Webb
Comments
www
Nov 17th 2022
6 months ago
EEW
Nov 17th 2022
6 months ago
qwq
Nov 17th 2022
6 months ago
mashood
Nov 17th 2022
6 months ago
isc.sans.edu
Nov 23rd 2022
6 months ago
isc.sans.edu
Nov 23rd 2022
6 months ago
isc.sans.edu
Dec 3rd 2022
5 months ago
isc.sans.edu
Dec 3rd 2022
5 months ago
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.
<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
isc.sans.edu
Dec 26th 2022
5 months ago
isc.sans.edu
Dec 26th 2022
5 months ago