> 1. Install/configure Syslog on the Hosts servers and forward the
> events to the central syslog and then analyse it with Ossec.
I have done this. In my first environment I already had a syslog server. I
then found OSSEC and discovered that I could just point it to the local
file system where the logs were written. It worked so well I had to back
off and only add logs gradually while I worked on tuning.
> - No Integrity Check
> - No RookitCheck
> - No FileCheck
As ddpbsd noted, you can do both. Just don't have the local agent read the
logs. Keep in mind, however, that you lose the benefit of encrypted and
authenticated transport.
> - Woks only if Syslog server is not an Appliance - ArcSight, and
> the events are not stored into a database. (Ossec has to see the
> events and has to be installed on the syslog server)
You can also install OSSEC on the appliance and have the syslog daemon on
the appliance (which is usually syslog-ng anyway) read the queue:
http://www.immutablesecurity.com/index.php/2010/01/29/using-ossec-for-encrypted-log-transport/
> / Bottleneck is the Syslog Server, but it's a robust technology,
> especially with rsyslog.
OSSEC can also be your syslog server, but I have not yet benchmarked the
performance against others. But with tuning, it can certainly process in
excess of 1,000 events per second.
> 2. Install Ossec agent on the Hosts servers, forward the events to
> Ossec Servers then to Syslog.
I'm doing this in two of my environments. In one of them, the alerts are
sent to the syslog server. In the other one, all logs OSSEC receives are
sent to the syslog server.
> ? I don't know if ALL the events are send to the Ossec (vs Syslog)
Yes, all logs are sent to the manager.
> ? Only the Ossec Server events/alerts are send to Syslog.
With the syslog output, only the alerts are sent to the syslog server. But
you can get around this by reading the queue directly.
> Can you give your opinion, I can be wrong.
> What is your recommendation in term of performance / usability.
It really depends on your requirements. Keep in mind that OSSEC also has
failover capability, so you can have two or more managers in case one goes
down. One of the great things about OSSEC is that you can usually make it
do what you envision, architecture-wise. So I would say work on your design
and OSSEC can probably fit in it just fine.
--
Michael Starks
[I] Immutable Security
Information Security, Privacy and Personal Liberty
http://www.immutablesecurity.com