OSSEC host-based intrusion detection guide

This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outli...

Descripción completa

Detalles Bibliográficos
Autor principal: Hay, Andrew (-)
Otros Autores: Cid, Daniel, Bray, Rory
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub c2008.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627514006719
Tabla de Contenidos:
  • Front Cover; OSSEC Host-Based Intrusion Detection Guide; Copyright Page; Lead Authors; Contributors; Contents; About this Book; About the DVD; Foreword; Chapter 1: Getting Started with OSSEC; Introduction; Introducing Intrusion Detection; Network Intrusion Detection; Host-Based Intrusion Detection; File Integrity Checking; Registry Monitoring; Rootkit Detection; Active Response; Introducing OSSEC; Planning Your Deployment; Local Installation; Agent Installation; Server Installation; Which Type Is Right For Me?; Identifying OSSEC Pre-installation Considerations; Supported Operating Systems
  • Special ConsiderationsMicrosoft Windows; Sun Solaris; Ubuntu Linux; Mac OS X; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2: Installation; Introduction; Downloading OSSEC HIDS; Getting the Files; Preparing the System; Building and Installing; Performing Local Installation; Performing Server-Agent Installations; Installing the Server; Managing Agents; Installing Agents; Installing the Unix Agent; Installing the Windows Agent; Streamlining the Installations; Install Once, Copy Everywhere; Unix, Linux, and BSD; Push the Keys; Unix, Linux, and BSD; Summary
  • Solutions Fast TrackFrequently Asked Questions; Chapter 3: OSSEC HIDS Configuration; Introduction; Understanding the OSSEC HIDS Configuration File; Configuring Logging/Alerting Options; Alerting with Email; Configuring Email; Basic Email Configuration; Granular Email Configuration; Receiving Remote Events with Syslog; Configuring Database Output; Declaring Rule Files; Reading Log Files; Configuring Integrity Checking; Configuring an Agent; Configuring Advanced Options; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: Working with Rules; Introduction; Introducing Rules
  • Understanding the OSSEC HIDS Analysis ProcessPredecoding Events; Decoding Events; Decoder Example: sshd Message; Decoder Example: vsftpd Message; Using the Option; Decoder Example: Cisco PIX Message; Decoder Example: Cisco IOS ACL Message; Understanding Rules; Atomic Rules; Writing a Rule; Composite Rules; Working with Real World Examples; Increasing the Severity Level of a Rule; Tuning Rule Frequency; Ignoring Rules; Ignoring IP Addresses; Correlating Multiple Snort Alerts; Ignoring Identity Change Events; Writing Decoders/Rules for Custom Applications
  • Deciding What Information to ExtractCreating the Decoders; Creating the Rules; Monitoring the Log File; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5: System Integrity Check and Rootkit Detection; Introduction; Understanding System Integrity Check (syscheck); Tuning syscheck; Working with syscheck Rules; Ignoring Specific Directories; Increasing the Alert Severity for Important Files; Increasing the Severity for Changes During the Weekend; Configuring Custom Syscheck Monitoring; Detecting Rootkits and Enforcing/Monitoring Policies
  • Detecting Rootkits on Linux, Unix, and BSD