I'm loving ELK so far. One question I do have is that would it be possible to integrate Wazuh into the Security Onion now that is also runs ELK? I feel like this would be an incredibly useful solution myself
I personally don't have any experience with Wazuh, but it appears to just be OSSEC built up a bit. Have you considered looking at beats? I moved from OSSEC to all beats deployment and love the amount of data I'm getting.
I've also followed the following SOS Sysmon configuration to add additional data such processes data, file access, etc.
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
Interesting I will check it out
That is great you guys do great work thank you very much!
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Here are some of the features we’ve added to OSSEC:
*Scalability and reliability*
- Cluster support for managers to scale horizontally.
- Support for Puppet, Chef, Ansible and Docker deployments.
- TCP support for agent-manager communications.
- Anti-flooding feature to prevent large burst of events from being lost or negatively impact network performance.
- AES encryption used for agent-manager communications (instead of Blowfish).
*Installation and configuration management*
- MSI signed package for Windows systems, with auto registration and configuration support.
- Unified RPM and Deb Linux packages.
- Support for AIX, Solaris, Mac OS X and HP-UX.
- RESTful API for status monitoring, querying and configuration management.
- Ability to upgrade agents from the managers.
- Improved centralized configuration management using agent groups.
*Intrusion detection*
- Improved log analysis engine, with native JSON decoding and ability to name fields dynamically.
- Updated ruleset with new log analysis rules and decoders.
- Native rules for Suricata, making use of JSON decoder.
- Native integration with Owhl project for Suricata.
- Support for IP reputation databases (e.g. AlienVault OTX).
- Module for native integration with Amazon AWS (pulling data from Cloudtrail).
*Regulatory compliance*
- Alert mapping with PCI DSS and GPG13 requirements.
- Compliance dashboards in Kibana.
- Use of Owhl Suricata mapping for compliance.
- SHA256 hashes used for file integrity monitoring (in addition to MD5 and SHA1).
*Elastic Stack integration*
- Provides the ability to index and query data.
- Data enrichment using GeoIP logstash module.
- Kibana plugin used to visualize data (integrated using Wazuh REStful API).
- Web user interface pre-configured extensions, adapting it to your use cases.
*Incident response*
- Module for collection of software and hardware inventory data.
- Ability to query for software and hardware via RESTful API.
- Module for integration with third-party tools (e.g. GRR or osquery).
- Implementation of new output options for log collector component.
- Module for integration with Virustotal.
*Vulnerability detection and configuration assessment*
- Dynamic creation of CVE vulnerability databases, gathering data from OVAL repositories.
- Cross correlation with applications inventory data to detect vulnerable software.
- Module for integration with OpenScap allows the user to remotely configured scans.
- Support for CIS-CAT scanner integration.