Hi,
We are trying monitor our sonicwall in wazuh. So far the syslog has been set up and we know we are receiving messages because they are in our ossec archive log. Example entry:
[root@wazuhmanager archives]# grep "Administrator login denied" archives.log
2019 Oct 15 14:39:51 wazuhmanager->192.168.xx.xxx id=SonicWall sn=XXXXXXXXXX time="2019-10-15 14:39:51 UTC" fw=XXX.XXX.XXX.XXX pri=1 c=32 m=30 msg="Administrator login denied due to bad credentials" sess="Web" dur=0 n=21 usr="admin" src=192.168.xx.xxx:56733:X0 dst=192.168.xx.xxx:80:X0 proto=tcp/http note=" - authentication failed: admin"
I run the ossec-testrule and it shows a level 8 alert will be generated, so it should show up in my security alerts, but it does not. I search by
decoder.name: sonicwall and nothing. I search by time and agent name, nothing. We looked in the alert log and do not see it there either (there were no sonicwall alerts).
Here is an example of the ossec-testrule output
ossec-testrule: Type one log per line.
id=SonicWall sn=XXXXXXXXXXXX time="2019-10-14 17:12:49 UTC" fw=XXX.XXX.XXX.XXX pri=1 c=32 m=30 msg="Administrator login denied due to bad credentials" sess="Web" dur=0 n=17 usr="admin" src=192.168.xx.xxx:58989:X0 dst=192.168.xx.xxx:80:X0 proto=tcp/http note=" - authentication failed: admin"
**Phase 1: Completed pre-decoding.
full event: 'id=SonicWall sn=XXXXXXXXXXXX time="2019-10-14 17:12:49 UTC" fw=XXX.XXX.XXX.XXX pri=1 c=32 m=30 msg="Administrator login denied due to bad credentials" sess="Web" dur=0 n=17 usr="admin" src=192.168.xx.xxx:58989:X0 dst=192.168.XX.XXX:80:X0 proto=tcp/http note=" - authentication failed: admin"'
timestamp: '(null)'
hostname: 'wazuhmanager'
program_name: '(null)'
log: 'id=SonicWall sn=XXXXXXXXXXXX time="2019-10-14 17:12:49 UTC" fw=XXX.XXX.XXX.XXX pri=1 c=32 m=30 msg="Administrator login denied due to bad credentials" sess="Web" dur=0 n=17 usr="admin" src=192.168.xx.xxx:58989:X0 dst=192.168.xx.xxx:80:X0 proto=tcp/http note=" - authentication failed: admin"'
**Phase 2: Completed decoding.
decoder: 'sonicwall'
status: '1'
action: 'Administrator login denied due to bad credentials'
srcip: '192.168.xx.xxx'
srcport: '58989'
dstip: '192.168.xx.xxx'
dstport: '80'
**Phase 3: Completed filtering (rules).
Rule id: '4801'
Level: '8'
Description: 'SonicWall critical message.'
**Alert to be generated.
Any help would be greatly appreciated.
Thanks,
Dave