Thanks a lot for your response and no problem I knew you are very busy.
Here are the status as you asked
[root@sapt-wazhu alerts]# cat /var/ossec/logs/alerts/alerts.log | grep level
Rule: 5901 (level 8) -> 'New group added to the system.'
Rule: 5902 (level 8) -> 'New user added to the system.'
Rule: 5108 (level 12) -> 'System running out of memory. Availability of the system is in risk.'
Rule: 533 (level 7) -> 'Listened ports status (netstat) changed (new port opened or closed).'
Rule: 533 (level 7) -> 'Listened ports status (netstat) changed (new port opened or closed).'
Rule: 533 (level 7) -> 'Listened ports status (netstat) changed (new port opened or closed).'
Rule: 533 (level 7) -> 'Listened ports status (netstat) changed (new port opened or closed).'
Rule: 510 (level 7) -> 'Host-based anomaly detection event (rootcheck).'
Rule: 510 (level 7) -> 'Host-based anomaly detection event (rootcheck).'
Rule: 92657 (level 6) -> 'Successful Remote Logon Detected - User:\ANONYMOUS LOGON - NTLM authentication, possible pass-the-hash attack - Possible RDP connection. Verify that SAPT-FIRESDC is allowed to perform RDP connections'
{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4624","version":"1","level":"0","task":"12544","opcode":"0","keywords":"0x8020000000000000","systemTime":"2023-09-13T09:44:54.964256900Z","eventRecordID":"2045238","processID":"700","threadID":"7448","channel":"Security","computer":"SAPT-HPIRS.SAPT.local","severityValue":"AUDIT_SUCCESS","message":"\"An account was successfully logged on.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-0-0\r\n\tAccount Name:\t\t-\r\n\tAccount Domain:\t\t-\r\n\tLogon ID:\t\t0x0\r\n\r\nLogon Type:\t\t\t3\r\n\r\nImpersonation Level:\t\tIdentification\r\n\r\nNew Logon:\r\n\tSecurity ID:\t\tS-1-5-7\r\n\tAccount Name:\t\tANONYMOUS LOGON\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x5FA59401\r\n\tLogon GUID:\t\t{00000000-0000-0000-0000-000000000000}\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x0\r\n\tProcess Name:\t\t-\r\n\r\nNetwork Information:\r\n\tWorkstation Name:\tSAPT-FIRESDC\r\n\tSource Network Address:\t10.10.50.67\r\n\tSource Port:\t\t50934\r\n\r\nDetailed Authentication Information:\r\n\tLogon Process:\t\tNtLmSsp \r\n\tAuthentication Package:\tNTLM\r\n\tTransited Services:\t-\r\n\tPackage Name (NTLM only):\tNTLM V1\r\n\tKey Length:\t\t128\r\n\r\nThis event is generated when a logon session is created. It is generated on the computer that was accessed.\r\n\r\nThe subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\r\n\r\nThe logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).\r\n\r\nThe New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.\r\n\r\nThe network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\r\n\r\nThe impersonation level field indicates the extent to which a process in the logon session can impersonate.\r\n\r\nThe authentication information fields provide detailed information about this specific logon request.\r\n\t- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.\r\n\t- Transited services indicate which intermediate services have participated in this logon request.\r\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\r\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\""},"eventdata":{"subjectUserSid":"S-1-0-0","subjectLogonId":"0x0","targetUserSid":"S-1-5-7","targetUserName":"ANONYMOUS LOGON","targetDomainName":"NT AUTHORITY","targetLogonId":"0x5fa59401","logonType":"3","logonProcessName":"NtLmSsp","authenticationPackageName":"NTLM","workstationName":"SAPT-FIRESDC","logonGuid":"{00000000-0000-0000-0000-000000000000}","lmPackageName":"NTLM V1","keyLength":"128","processId":"0x0","ipAddress":"10.10.50.67","ipPort":"50934","impersonationLevel":"%%1832"}}}
win.system.level: 0
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
Rule: 92657 (level 6) -> 'Successful Remote Logon Detected - User:\ANONYMOUS LOGON - NTLM authentication, possible pass-the-hash attack - Possible RDP connection. Verify that SAPT-FIRESDC is allowed to perform RDP connections'
{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4624","version":"1","level":"0","task":"12544","opcode":"0","keywords":"0x8020000000000000","systemTime":"2023-09-13T10:08:10.319548500Z","eventRecordID":"2045258","processID":"700","threadID":"752","channel":"Security","computer":"SAPT-HPIRS.SAPT.local","severityValue":"AUDIT_SUCCESS","message":"\"An account was successfully logged on.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-0-0\r\n\tAccount Name:\t\t-\r\n\tAccount Domain:\t\t-\r\n\tLogon ID:\t\t0x0\r\n\r\nLogon Type:\t\t\t3\r\n\r\nImpersonation Level:\t\tIdentification\r\n\r\nNew Logon:\r\n\tSecurity ID:\t\tS-1-5-7\r\n\tAccount Name:\t\tANONYMOUS LOGON\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x5FBD449B\r\n\tLogon GUID:\t\t{00000000-0000-0000-0000-000000000000}\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x0\r\n\tProcess Name:\t\t-\r\n\r\nNetwork Information:\r\n\tWorkstation Name:\tSAPT-FIRESDC\r\n\tSource Network Address:\t10.10.50.67\r\n\tSource Port:\t\t51936\r\n\r\nDetailed Authentication Information:\r\n\tLogon Process:\t\tNtLmSsp \r\n\tAuthentication Package:\tNTLM\r\n\tTransited Services:\t-\r\n\tPackage Name (NTLM only):\tNTLM V1\r\n\tKey Length:\t\t128\r\n\r\nThis event is generated when a logon session is created. It is generated on the computer that was accessed.\r\n\r\nThe subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\r\n\r\nThe logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).\r\n\r\nThe New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.\r\n\r\nThe network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\r\n\r\nThe impersonation level field indicates the extent to which a process in the logon session can impersonate.\r\n\r\nThe authentication information fields provide detailed information about this specific logon request.\r\n\t- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.\r\n\t- Transited services indicate which intermediate services have participated in this logon request.\r\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\r\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\""},"eventdata":{"subjectUserSid":"S-1-0-0","subjectLogonId":"0x0","targetUserSid":"S-1-5-7","targetUserName":"ANONYMOUS LOGON","targetDomainName":"NT AUTHORITY","targetLogonId":"0x5fbd449b","logonType":"3","logonProcessName":"NtLmSsp","authenticationPackageName":"NTLM","workstationName":"SAPT-FIRESDC","logonGuid":"{00000000-0000-0000-0000-000000000000}","lmPackageName":"NTLM V1","keyLength":"128","processId":"0x0","ipAddress":"10.10.50.67","ipPort":"51936","impersonationLevel":"%%1832"}}}
win.system.level: 0
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
Rule: 92657 (level 6) -> 'Successful Remote Logon Detected - User:\ANONYMOUS LOGON - NTLM authentication, possible pass-the-hash attack - Possible RDP connection. Verify that SAPT-FIRESDC is allowed to perform RDP connections'
{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4624","version":"1","level":"0","task":"12544","opcode":"0","keywords":"0x8020000000000000","systemTime":"2023-09-13T10:34:37.748453200Z","eventRecordID":"2045278","processID":"700","threadID":"9692","channel":"Security","computer":"SAPT-HPIRS.SAPT.local","severityValue":"AUDIT_SUCCESS","message":"\"An account was successfully logged on.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-0-0\r\n\tAccount Name:\t\t-\r\n\tAccount Domain:\t\t-\r\n\tLogon ID:\t\t0x0\r\n\r\nLogon Type:\t\t\t3\r\n\r\nImpersonation Level:\t\tIdentification\r\n\r\nNew Logon:\r\n\tSecurity ID:\t\tS-1-5-7\r\n\tAccount Name:\t\tANONYMOUS LOGON\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x5FD8EAEB\r\n\tLogon GUID:\t\t{00000000-0000-0000-0000-000000000000}\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x0\r\n\tProcess Name:\t\t-\r\n\r\nNetwork Information:\r\n\tWorkstation Name:\tSAPT-FIRESDC\r\n\tSource Network Address:\t10.10.50.67\r\n\tSource Port:\t\t52987\r\n\r\nDetailed Authentication Information:\r\n\tLogon Process:\t\tNtLmSsp \r\n\tAuthentication Package:\tNTLM\r\n\tTransited Services:\t-\r\n\tPackage Name (NTLM only):\tNTLM V1\r\n\tKey Length:\t\t128\r\n\r\nThis event is generated when a logon session is created. It is generated on the computer that was accessed.\r\n\r\nThe subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\r\n\r\nThe logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).\r\n\r\nThe New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.\r\n\r\nThe network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\r\n\r\nThe impersonation level field indicates the extent to which a process in the logon session can impersonate.\r\n\r\nThe authentication information fields provide detailed information about this specific logon request.\r\n\t- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.\r\n\t- Transited services indicate which intermediate services have participated in this logon request.\r\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\r\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\""},"eventdata":{"subjectUserSid":"S-1-0-0","subjectLogonId":"0x0","targetUserSid":"S-1-5-7","targetUserName":"ANONYMOUS LOGON","targetDomainName":"NT AUTHORITY","targetLogonId":"0x5fd8eaeb","logonType":"3","logonProcessName":"NtLmSsp","authenticationPackageName":"NTLM","workstationName":"SAPT-FIRESDC","logonGuid":"{00000000-0000-0000-0000-000000000000}","lmPackageName":"NTLM V1","keyLength":"128","processId":"0x0","ipAddress":"10.10.50.67","ipPort":"52987","impersonationLevel":"%%1832"}}}
win.system.level: 0
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
Rule: 92657 (level 6) -> 'Successful Remote Logon Detected - User:\ANONYMOUS LOGON - NTLM authentication, possible pass-the-hash attack - Possible RDP connection. Verify that SAPT-FIRESDC is allowed to perform RDP connections'
{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4624","version":"1","level":"0","task":"12544","opcode":"0","keywords":"0x8020000000000000","systemTime":"2023-09-13T10:59:00.687934400Z","eventRecordID":"2045292","processID":"700","threadID":"752","channel":"Security","computer":"SAPT-HPIRS.SAPT.local","severityValue":"AUDIT_SUCCESS","message":"\"An account was successfully logged on.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-0-0\r\n\tAccount Name:\t\t-\r\n\tAccount Domain:\t\t-\r\n\tLogon ID:\t\t0x0\r\n\r\nLogon Type:\t\t\t3\r\n\r\nImpersonation Level:\t\tIdentification\r\n\r\nNew Logon:\r\n\tSecurity ID:\t\tS-1-5-7\r\n\tAccount Name:\t\tANONYMOUS LOGON\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x5FF1860E\r\n\tLogon GUID:\t\t{00000000-0000-0000-0000-000000000000}\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x0\r\n\tProcess Name:\t\t-\r\n\r\nNetwork Information:\r\n\tWorkstation Name:\tSAPT-FIRESDC\r\n\tSource Network Address:\t10.10.50.67\r\n\tSource Port:\t\t54021\r\n\r\nDetailed Authentication Information:\r\n\tLogon Process:\t\tNtLmSsp \r\n\tAuthentication Package:\tNTLM\r\n\tTransited Services:\t-\r\n\tPackage Name (NTLM only):\tNTLM V1\r\n\tKey Length:\t\t128\r\n\r\nThis event is generated when a logon session is created. It is generated on the computer that was accessed.\r\n\r\nThe subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\r\n\r\nThe logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).\r\n\r\nThe New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.\r\n\r\nThe network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\r\n\r\nThe impersonation level field indicates the extent to which a process in the logon session can impersonate.\r\n\r\nThe authentication information fields provide detailed information about this specific logon request.\r\n\t- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.\r\n\t- Transited services indicate which intermediate services have participated in this logon request.\r\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\r\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\""},"eventdata":{"subjectUserSid":"S-1-0-0","subjectLogonId":"0x0","targetUserSid":"S-1-5-7","targetUserName":"ANONYMOUS LOGON","targetDomainName":"NT AUTHORITY","targetLogonId":"0x5ff1860e","logonType":"3","logonProcessName":"NtLmSsp","authenticationPackageName":"NTLM","workstationName":"SAPT-FIRESDC","logonGuid":"{00000000-0000-0000-0000-000000000000}","lmPackageName":"NTLM V1","keyLength":"128","processId":"0x0","ipAddress":"10.10.50.67","ipPort":"54021","impersonationLevel":"%%1832"}}}
win.system.level: 0
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
Rule: 92657 (level 6) -> 'Successful Remote Logon Detected - User:\ANONYMOUS LOGON - NTLM authentication, possible pass-the-hash attack - Possible RDP connection. Verify that SAPT-FIRESDC is allowed to perform RDP connections'
{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4624","version":"1","level":"0","task":"12544","opcode":"0","keywords":"0x8020000000000000","systemTime":"2023-09-13T11:01:02.760344500Z","eventRecordID":"2045297","processID":"700","threadID":"9788","channel":"Security","computer":"SAPT-HPIRS.SAPT.local","severityValue":"AUDIT_SUCCESS","message":"\"An account was successfully logged on.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-0-0\r\n\tAccount Name:\t\t-\r\n\tAccount Domain:\t\t-\r\n\tLogon ID:\t\t0x0\r\n\r\nLogon Type:\t\t\t3\r\n\r\nImpersonation Level:\t\tIdentification\r\n\r\nNew Logon:\r\n\tSecurity ID:\t\tS-1-5-7\r\n\tAccount Name:\t\tANONYMOUS LOGON\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x5FF379F8\r\n\tLogon GUID:\t\t{00000000-0000-0000-0000-000000000000}\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x0\r\n\tProcess Name:\t\t-\r\n\r\nNetwork Information:\r\n\tWorkstation Name:\tSAPT-FIRESDC\r\n\tSource Network Address:\t10.10.50.67\r\n\tSource Port:\t\t54079\r\n\r\nDetailed Authentication Information:\r\n\tLogon Process:\t\tNtLmSsp \r\n\tAuthentication Package:\tNTLM\r\n\tTransited Services:\t-\r\n\tPackage Name (NTLM only):\tNTLM V1\r\n\tKey Length:\t\t128\r\n\r\nThis event is generated when a logon session is created. It is generated on the computer that was accessed.\r\n\r\nThe subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\r\n\r\nThe logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).\r\n\r\nThe New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.\r\n\r\nThe network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\r\n\r\nThe impersonation level field indicates the extent to which a process in the logon session can impersonate.\r\n\r\nThe authentication information fields provide detailed information about this specific logon request.\r\n\t- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.\r\n\t- Transited services indicate which intermediate services have participated in this logon request.\r\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\r\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\""},"eventdata":{"subjectUserSid":"S-1-0-0","subjectLogonId":"0x0","targetUserSid":"S-1-5-7","targetUserName":"ANONYMOUS LOGON","targetDomainName":"NT AUTHORITY","targetLogonId":"0x5ff379f8","logonType":"3","logonProcessName":"NtLmSsp","authenticationPackageName":"NTLM","workstationName":"SAPT-FIRESDC","logonGuid":"{00000000-0000-0000-0000-000000000000}","lmPackageName":"NTLM V1","keyLength":"128","processId":"0x0","ipAddress":"10.10.50.67","ipPort":"54079","impersonationLevel":"%%1832"}}}
win.system.level: 0
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
Rule: 533 (level 7) -> 'Listened ports status (netstat) changed (new port opened or closed).'
Rule: 533 (level 7) -> 'Listened ports status (netstat) changed (new port opened or closed).'
Rule: 92657 (level 6) -> 'Successful Remote Logon Detected - User:\ANONYMOUS LOGON - NTLM authentication, possible pass-the-hash attack - Possible RDP connection. Verify that SAPT-FIRESDC is allowed to perform RDP connections'
{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4624","version":"1","level":"0","task":"12544","opcode":"0","keywords":"0x8020000000000000","systemTime":"2023-09-13T11:35:55.087884100Z","eventRecordID":"2045317","processID":"700","threadID":"752","channel":"Security","computer":"SAPT-HPIRS.SAPT.local","severityValue":"AUDIT_SUCCESS","message":"\"An account was successfully logged on.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-0-0\r\n\tAccount Name:\t\t-\r\n\tAccount Domain:\t\t-\r\n\tLogon ID:\t\t0x0\r\n\r\nLogon Type:\t\t\t3\r\n\r\nImpersonation Level:\t\tIdentification\r\n\r\nNew Logon:\r\n\tSecurity ID:\t\tS-1-5-7\r\n\tAccount Name:\t\tANONYMOUS LOGON\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x6018339E\r\n\tLogon GUID:\t\t{00000000-0000-0000-0000-000000000000}\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x0\r\n\tProcess Name:\t\t-\r\n\r\nNetwork Information:\r\n\tWorkstation Name:\tSAPT-FIRESDC\r\n\tSource Network Address:\t10.10.50.67\r\n\tSource Port:\t\t55192\r\n\r\nDetailed Authentication Information:\r\n\tLogon Process:\t\tNtLmSsp \r\n\tAuthentication Package:\tNTLM\r\n\tTransited Services:\t-\r\n\tPackage Name (NTLM only):\tNTLM V1\r\n\tKey Length:\t\t128\r\n\r\nThis event is generated when a logon session is created. It is generated on the computer that was accessed.\r\n\r\nThe subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\r\n\r\nThe logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).\r\n\r\nThe New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.\r\n\r\nThe network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\r\n\r\nThe impersonation level field indicates the extent to which a process in the logon session can impersonate.\r\n\r\nThe authentication information fields provide detailed information about this specific logon request.\r\n\t- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.\r\n\t- Transited services indicate which intermediate services have participated in this logon request.\r\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\r\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\""},"eventdata":{"subjectUserSid":"S-1-0-0","subjectLogonId":"0x0","targetUserSid":"S-1-5-7","targetUserName":"ANONYMOUS LOGON","targetDomainName":"NT AUTHORITY","targetLogonId":"0x6018339e","logonType":"3","logonProcessName":"NtLmSsp","authenticationPackageName":"NTLM","workstationName":"SAPT-FIRESDC","logonGuid":"{00000000-0000-0000-0000-000000000000}","lmPackageName":"NTLM V1","keyLength":"128","processId":"0x0","ipAddress":"10.10.50.67","ipPort":"55192","impersonationLevel":"%%1832"}}}
win.system.level: 0
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
Rule: 92657 (level 6) -> 'Successful Remote Logon Detected - User:\ANONYMOUS LOGON - NTLM authentication, possible pass-the-hash attack - Possible RDP connection. Verify that SAPT-FIRESDC is allowed to perform RDP connections'
{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4624","version":"1","level":"0","task":"12544","opcode":"0","keywords":"0x8020000000000000","systemTime":"2023-09-13T11:37:56.512330200Z","eventRecordID":"2045321","processID":"700","threadID":"9560","channel":"Security","computer":"SAPT-HPIRS.SAPT.local","severityValue":"AUDIT_SUCCESS","message":"\"An account was successfully logged on.\r\n\r\nSubject:\r\n\tSecurity ID:\t\tS-1-0-0\r\n\tAccount Name:\t\t-\r\n\tAccount Domain:\t\t-\r\n\tLogon ID:\t\t0x0\r\n\r\nLogon Type:\t\t\t3\r\n\r\nImpersonation Level:\t\tIdentification\r\n\r\nNew Logon:\r\n\tSecurity ID:\t\tS-1-5-7\r\n\tAccount Name:\t\tANONYMOUS LOGON\r\n\tAccount Domain:\t\tNT AUTHORITY\r\n\tLogon ID:\t\t0x601AACE1\r\n\tLogon GUID:\t\t{00000000-0000-0000-0000-000000000000}\r\n\r\nProcess Information:\r\n\tProcess ID:\t\t0x0\r\n\tProcess Name:\t\t-\r\n\r\nNetwork Information:\r\n\tWorkstation Name:\tSAPT-FIRESDC\r\n\tSource Network Address:\t10.10.50.67\r\n\tSource Port:\t\t55267\r\n\r\nDetailed Authentication Information:\r\n\tLogon Process:\t\tNtLmSsp \r\n\tAuthentication Package:\tNTLM\r\n\tTransited Services:\t-\r\n\tPackage Name (NTLM only):\tNTLM V1\r\n\tKey Length:\t\t128\r\n\r\nThis event is generated when a logon session is created. It is generated on the computer that was accessed.\r\n\r\nThe subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\r\n\r\nThe logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).\r\n\r\nThe New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.\r\n\r\nThe network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\r\n\r\nThe impersonation level field indicates the extent to which a process in the logon session can impersonate.\r\n\r\nThe authentication information fields provide detailed information about this specific logon request.\r\n\t- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.\r\n\t- Transited services indicate which intermediate services have participated in this logon request.\r\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\r\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\""},"eventdata":{"subjectUserSid":"S-1-0-0","subjectLogonId":"0x0","targetUserSid":"S-1-5-7","targetUserName":"ANONYMOUS LOGON","targetDomainName":"NT AUTHORITY","targetLogonId":"0x601aace1","logonType":"3","logonProcessName":"NtLmSsp","authenticationPackageName":"NTLM","workstationName":"SAPT-FIRESDC","logonGuid":"{00000000-0000-0000-0000-000000000000}","lmPackageName":"NTLM V1","keyLength":"128","processId":"0x0","ipAddress":"10.10.50.67","ipPort":"55267","impersonationLevel":"%%1832"}}}
win.system.level: 0
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
[root@sapt-wazhu alerts]#
################################################################################################
[root@sapt-wazhu alerts]# systemctl status wazuh-manager
● wazuh-manager.service - Wazuh manager
Loaded: loaded (/usr/lib/systemd/system/wazuh-manager.service; enabled; vendor preset: disabled)
Active: active (running) since Wed 2023-09-13 16:25:07 PKT; 30min ago
Process: 1163 ExecStart=/usr/bin/env /var/ossec/bin/wazuh-control start (code=exited, status=0/SUCCESS)
Tasks: 133 (limit: 49020)
Memory: 267.9M
CGroup: /system.slice/wazuh-manager.service
├─2517 /var/ossec/framework/python/bin/python3 /var/ossec/api/scripts/wazuh-apid.py
├─2639 /var/ossec/framework/python/bin/python3 /var/ossec/api/scripts/wazuh-apid.py
├─2642 /var/ossec/framework/python/bin/python3 /var/ossec/api/scripts/wazuh-apid.py
├─2671 /var/ossec/bin/wazuh-authd
├─2681 /var/ossec/bin/wazuh-db
├─2773 /var/ossec/bin/wazuh-execd
├─2788 /var/ossec/bin/wazuh-analysisd
├─2804 /var/ossec/bin/wazuh-syscheckd
├─2818 /var/ossec/bin/wazuh-remoted
├─2856 /var/ossec/bin/wazuh-logcollector
├─2879 /var/ossec/bin/wazuh-monitord
└─2890 /var/ossec/bin/wazuh-modulesd
Sep 13 16:25:01 sapt-wazhu env[1163]: Started wazuh-analysisd...
Sep 13 16:25:01 sapt-wazhu env[1163]: 2023/09/13 16:25:01 wazuh-syscheckd: WARNING: (1230): Invalid element in the configuration: 'database_output'.
Sep 13 16:25:01 sapt-wazhu env[1163]: 2023/09/13 16:25:01 wazuh-syscheckd: WARNING: The check_unixaudit option is deprecated in favor of the SCA module.
Sep 13 16:25:01 sapt-wazhu env[1163]: Started wazuh-syscheckd...
Sep 13 16:25:02 sapt-wazhu env[1163]: Started wazuh-remoted...
Sep 13 16:25:04 sapt-wazhu env[1163]: Started wazuh-logcollector...
Sep 13 16:25:04 sapt-wazhu env[1163]: Started wazuh-monitord...
Sep 13 16:25:05 sapt-wazhu env[1163]: Started wazuh-modulesd...
Sep 13 16:25:07 sapt-wazhu env[1163]: Completed.
Sep 13 16:25:07 sapt-wazhu systemd[1]: Started Wazuh manager.
[root@sapt-wazhu alerts]# systemctl status wazuh-indexer
● wazuh-indexer.service - Wazuh-indexer
Loaded: loaded (/usr/lib/systemd/system/wazuh-indexer.service; enabled; vendor preset: disabled)
Active: active (running) since Wed 2023-09-13 16:26:34 PKT; 28min ago
Docs:
https://documentation.wazuh.com Main PID: 1168 (java)
Tasks: 100 (limit: 49020)
Memory: 2.1G
CGroup: /system.slice/wazuh-indexer.service
└─1168 /usr/share/wazuh-indexer/jdk/bin/java -Xshare:auto -Dopensearch.networkaddress.cache.ttl=60 -Dopensearch.networkaddress.cache.negative.ttl=10 -XX:+AlwaysPreTouch -Xss1m -Djava.awt.headless=true -Dfile.encoding=UTF-8 -D>
Sep 13 16:28:31 sapt-wazhu systemd[1]: Starting Wazuh-indexer...
Sep 13 16:24:46 sapt-wazhu systemd-entrypoint[1168]: WARNING: A terminally deprecated method in java.lang.System has been called
Sep 13 16:24:46 sapt-wazhu systemd-entrypoint[1168]: WARNING: System::setSecurityManager has been called by org.opensearch.bootstrap.OpenSearch (file:/usr/share/wazuh-indexer/lib/opensearch-2.6.0.jar)
Sep 13 16:24:46 sapt-wazhu systemd-entrypoint[1168]: WARNING: Please consider reporting this to the maintainers of org.opensearch.bootstrap.OpenSearch
Sep 13 16:24:46 sapt-wazhu systemd-entrypoint[1168]: WARNING: System::setSecurityManager will be removed in a future release
Sep 13 16:25:20 sapt-wazhu systemd-entrypoint[1168]: WARNING: A terminally deprecated method in java.lang.System has been called
Sep 13 16:25:20 sapt-wazhu systemd-entrypoint[1168]: WARNING: System::setSecurityManager has been called by org.opensearch.bootstrap.Security (file:/usr/share/wazuh-indexer/lib/opensearch-2.6.0.jar)
Sep 13 16:25:20 sapt-wazhu systemd-entrypoint[1168]: WARNING: Please consider reporting this to the maintainers of org.opensearch.bootstrap.Security
Sep 13 16:25:20 sapt-wazhu systemd-entrypoint[1168]: WARNING: System::setSecurityManager will be removed in a future release
Sep 13 16:26:34 sapt-wazhu systemd[1]: Started Wazuh-indexer.
[root@sapt-wazhu alerts]#
[root@sapt-wazhu alerts]# systemctl status wazuh-dashbaord
Unit wazuh-dashbaord.service could not be found.
[root@sapt-wazhu alerts]# systemctl status wazuh-dashbaord
Unit wazuh-dashbaord.service could not be found.
[root@sapt-wazhu alerts]# systemctl status wazuh-dashboard.service
● wazuh-dashboard.service - wazuh-dashboard
Loaded: loaded (/etc/systemd/system/wazuh-dashboard.service; enabled; vendor preset: disabled)
Active: active (running) since Wed 2023-09-13 16:28:28 PKT; 27min ago
Main PID: 1062 (node)
Tasks: 11 (limit: 49020)
Memory: 92.5M
CGroup: /system.slice/wazuh-dashboard.service
└─1062 /usr/share/wazuh-dashboard/bin/../node/bin/node --no-warnings --max-http-header-size=65536 --unhandled-rejections=warn /usr/share/wazuh-dashboard/bin/../src/cli/dist -c /etc/wazuh-dashboard/opensearch_dashboards.yml
Sep 13 16:26:35 sapt-wazhu opensearch-dashboards[1062]: {"type":"log","@timestamp":"2023-09-13T11:26:35Z","tags":["error","opensearch","data"],"pid":1062,"message":"[ResponseError]: Response Error"}
Sep 13 16:26:37 sapt-wazhu opensearch-dashboards[1062]: {"type":"log","@timestamp":"2023-09-13T11:26:37Z","tags":["error","opensearch","data"],"pid":1062,"message":"[ResponseError]: Response Error"}
Sep 13 16:26:39 sapt-wazhu opensearch-dashboards[1062]: {"type":"log","@timestamp":"2023-09-13T11:26:39Z","tags":["error","opensearch","data"],"pid":1062,"message":"[ResponseError]: Response Error"}
Sep 13 16:26:42 sapt-wazhu opensearch-dashboards[1062]: {"type":"log","@timestamp":"2023-09-13T11:26:42Z","tags":["error","opensearch","data"],"pid":1062,"message":"[ResponseError]: Response Error"}
Sep 13 16:26:44 sapt-wazhu opensearch-dashboards[1062]: {"type":"log","@timestamp":"2023-09-13T11:26:44Z","tags":["error","opensearch","data"],"pid":1062,"message":"[ResponseError]: Response Error"}
Sep 13 16:26:47 sapt-wazhu opensearch-dashboards[1062]: {"type":"log","@timestamp":"2023-09-13T11:26:47Z","tags":["error","opensearch","data"],"pid":1062,"message":"[ResponseError]: Response Error"}
Sep 13 16:26:50 sapt-wazhu opensearch-dashboards[1062]: {"type":"log","@timestamp":"2023-09-13T11:26:50Z","tags":["info","savedobjects-service"],"pid":1062,"message":"Starting saved objects migrations"}
Sep 13 16:26:50 sapt-wazhu opensearch-dashboards[1062]: {"type":"log","@timestamp":"2023-09-13T11:26:50Z","tags":["info","plugins-system"],"pid":1062,"message":"Starting [45] plugins: [alertingDashboards,usageCollection,opensearchDashbo>
Sep 13 16:26:53 sapt-wazhu opensearch-dashboards[1062]: {"type":"log","@timestamp":"2023-09-13T11:26:53Z","tags":["listening","info"],"pid":1062,"message":"Server running at
https://10.10.90.55:443"}
Sep 13 16:26:53 sapt-wazhu opensearch-dashboards[1062]: {"type":"log","@timestamp":"2023-09-13T11:26:53Z","tags":["info","http","server","OpenSearchDashboards"],"pid":1062,"message":"http server running at
https://10.10.90.55:443"}
[root@sapt-wazhu alerts]#
###################################################################################################
[root@sapt-wazhu alerts]# filebeat test output
elasticsearch: https://127.0.0.1:9200...
parse url... OK
connection...
parse host... OK
dns lookup... OK
addresses: 127.0.0.1
dial up... ERROR dial tcp
127.0.0.1:9200: connect: connection refused
[root@sapt-wazhu alerts]#
###################################################################################################
[root@sapt-wazhu filebeat]# more filebeat
2023-09-13T16:56:43.689+0500 INFO instance/beat.go:698 Home path: [/usr/share/filebeat] Config path: [/etc/filebeat] Data path: [/var/lib/filebeat] Logs path: [/var/log/filebeat] Hostfs Path: [/]
2023-09-13T16:56:43.689+0500 INFO instance/beat.go:706 Beat ID: 1f71401c-497b-4eda-bef9-c831fbb6038f
2023-09-13T16:56:43.689+0500 WARN [cfgwarn] template/config.go:88 DEPRECATED: Please migrate your JSON templates from legacy template format to composable index template. Will be removed in version: 8.0.0
2023-09-13T16:56:43.690+0500 INFO [index-management] idxmgmt/std.go:184 Set output.elasticsearch.index to 'filebeat-7.17.12' as ILM is enabled.
2023-09-13T16:56:43.690+0500 WARN [cfgwarn] tlscommon/config.go:100 DEPRECATED: Treating the CommonName field on X.509 certificates as a host name when no Subject Alternative Names are present is going to be removed. Please u
pdate your certificates if needed. Will be removed in version: 8.0.0
2023-09-13T16:56:43.690+0500 INFO [esclientleg] eslegclient/connection.go:105 elasticsearch url:
https://127.0.0.1:9200[root@sapt-wazhu filebeat]# systemctl status filebeat.service
● filebeat.service - Filebeat sends log files to Logstash or directly to Elasticsearch.
Loaded: loaded (/usr/lib/systemd/system/filebeat.service; enabled; vendor preset: disabled)
Active: active (running) since Wed 2023-09-13 16:28:31 PKT; 33min ago
Docs:
https://www.elastic.co/beats/filebeat Main PID: 1164 (filebeat)
Tasks: 9 (limit: 49020)
Memory: 26.9M
CGroup: /system.slice/filebeat.service
└─1164 /usr/share/filebeat/bin/filebeat --environment systemd -c /etc/filebeat/filebeat.yml --path.home /usr/share/filebeat --path.config /etc/filebeat --path.data /var/lib/filebeat --path.logs /var/log/filebeat
Sep 13 16:28:31 sapt-wazhu systemd[1]: Started Filebeat sends log files to Logstash or directly to Elasticsearch..
[root@sapt-wazhu filebeat]#
###################################################################################################
[root@sapt-wazhu alerts]# tail /var/ossec/logs/ossec.log
2023/09/13 16:25:04 wazuh-modulesd:control: INFO: Starting control thread.
2023/09/13 16:25:04 wazuh-modulesd:download: INFO: Module started.
2023/09/13 16:25:04 wazuh-modulesd:database: INFO: Module started.
2023/09/13 16:25:04 wazuh-modulesd:task-manager: INFO: (8200): Module Task Manager started.
2023/09/13 16:25:04 wazuh-modulesd:syscollector: INFO: Module started.
2023/09/13 16:25:04 wazuh-modulesd:syscollector: INFO: Starting evaluation.
2023/09/13 07:25:06 wazuh-analysisd: INFO: EPS limit disabled
2023/09/13 16:25:13 wazuh-modulesd:syscollector: INFO: Evaluation finished.
2023/09/13 16:26:03 wazuh-syscheckd: INFO: (6009): File integrity monitoring scan ended.
2023/09/13 16:27:42 rootcheck: INFO: Ending rootcheck scan.
[root@sapt-wazhu alerts]#
[root@sapt-wazhu alerts]# cat /var/ossec/logs/ossec.log | grep -i -E "error|warn"
2023/09/13 16:24:19 wazuh-syscheckd: WARNING: (1230): Invalid element in the configuration: 'database_output'.
2023/09/13 16:25:01 wazuh-syscheckd: WARNING: (1230): Invalid element in the configuration: 'database_output'.
2023/09/13 16:25:01 wazuh-syscheckd: WARNING: The check_unixaudit option is deprecated in favor of the SCA module.
[root@sapt-wazhu alerts]#