owlh_documentation Documentation

Size: px
Start display at page:

Download "owlh_documentation Documentation"

Transcription

1 owlh_documentation Documentation Release Cloud and Bro owlh team Sep 13, 2018

2

3 Contents 1 What is OwlH? 1 2 A few topics 3 i

4 ii

5 CHAPTER 1 What is OwlH? This is OwlH, open source solution. OwlH is born to help security engineers to manage, visualize, analyze and respond to threats detected from Open Source Network IDS like Suricata and BroIDS, offering: Manage Network IDS (suricata and broids) nodes at scale SoftwareTAP for cloud and on-premises environments Centralized Rule Management Centralized Visualization Network Data Collection and Big Data Storage Compliance Mapping and Dashboards Incident Response Automation 1

6 2 Chapter 1. What is OwlH?

7 CHAPTER 2 A few topics 2.1 About OwlH Security world is not related to a tool. It is related to a continuous process that must be able to evolve and adapt to your network, systems, and software as they do. Also, Security and cyber-security terms are a really big and complex world with a huge amount sub-worlds, regions, areas, or whatever how you would like to call them OwlH is born to help with one piece of this galaxy. We can summarize it as help to implement and maintain Network Traffic Analysis process based in Network IDS open source solutions. But a process is not just a tool or a solution, it will contain tasks, tools, solutions and it must evolve and adapt. So, OwlH is about that, a platform to provide process definitions that will use 3rd party tools or solutions, our own tools, and our tasks definition to successfully implement them. This picture will summarize the process we are working in. 3

8 Our target right now is to provide help for: Network IDS integrated with Host IDS solution On-Premises Network IDS Cloud Network IDS Software TAP Network IDS Orchestration Alert Enrichment Data Visualization Adapt and response 4 Chapter 2. A few topics

9 2.1.1 If you need help: our support team - support@owlh.net visit our mailing list - OwlH mailing list (owlh@googlegroups.com) OwlH - current v0.4 - May : Bro integration and AWS and GCloud support documentation last updated - Sep 13, What are we thinking about -= Roadmap = BackLog - There is something else to be done, always. Area Description Version Orchestration Cloud Orchestrator 0.5 BigData OwlH ELK own Indices 0.5 Services Support and PS 0.5 Web and Documentation Documentation What are we thinking about -= Roadmap =- 5

10 2.2.2 v0.4 - Release notes (May) Area Description Version Cloud Support AWS + Suricata + Wazuh 0.4 Cloud Support GCloud + Suricata + Wazuh 0.4 Cloud Support Software TAP (vtap) 0.4 NIDS Support BRO + Wazuh 0.4 PCI Compliance Suricata-PCI mapper script 0.4 Web and Documentation Documentation v0.3 - Release notes (February end) Area Description Version NIDS Support Suricata + Wazuh 0.3 PCI Compliance Suricata + PCI Mapping 0.3 Web and Documentation Documentation 0.3 If you need help: our support team - support@owlh.net visit our mailing list - OwlH mailing list (owlh@googlegroups.com) OwlH - current v0.4 - May : Bro integration and AWS and GCloud support documentation last updated - Sep 13, Chapter 2. A few topics

11 2.3 How does it work? Main components OwlH NIDS node OwlH Master node Elastic stack OwlH NIDS node This appliance run the Network IDS software. OwlH supports Suricata Network IDS and will support BroIDS on next releases. Usually, best approach is to run a network IDS node as only network IDS so there is no other services or production environment tools working on it that are not related with traffic collection and analysis. Main role of this appliance is to listen traffic, analyze captured traffic using the ruleset provided and send the alerts to the master node. Also OwlH will include a capability to run actions in response to detected alerts. With OwlH you can deploy this OwlH NIDS node from scratch or you can include an integrate any deployed Network IDS node. Supported platforms are Debian Stretch and CentOS 7. deploy as appliance deploy as a service in a running Network IDS probe OwlH Master node Centralized management will provide you an easy way to maintain your Network IDS probes. Among others, Master node will provide centralized rule management based on Open Rules solution, probes status Monitoring, configuration 2.3. How does it work? 7

12 management, etc. This should be an appliance, you can deploy different managers in parallel as a cluster. The OwlH master software can also run into Wazuh Manager if you will use OwlH together with Wazuh Elastic Stack Data Transport is done in two possible ways. By using Wazuh agent By using OwlH forwarder and collector tools By using Beat solutions like filebeat or logstash If you need help: our support team - support@owlh.net visit our mailing list - OwlH mailing list (owlh@googlegroups.com) OwlH - current v0.4 - May : Bro integration and AWS and GCloud support documentation last updated - Sep 13, OwlH - Suricata and Wazuh How to easily integrate Suricata with Wazuh This will introduce an easy way to integrate your Suricata output into Wazuh world. this is a one-way integration process, from your Suricata node to your Wazuh Dashboard. OwlH will help also to manage your Suricata nodes configuration and rules, and many other things. but right now, let s integrate your Suricata node with Wazuh. As usual, please keep in contact if there is any clarification or help needed. our support team - support@owlh.net visit our mailing list - OwlH mailing list (owlh@googlegroups.com) Main steps Deploy Suricata or use a Current Suricata deployment Configure Suricata to store output in JSON format - EVE log configuration Install Wazuh stack if you are not done yet Install Wazuh Agent in the suricata system Configure Wazuh Suricata rules to create right alarms Configure Wazuh Agent to read the eve.json output file If you require PCI. Configure OwlH PCI mapping Modify Elastic template And what s next? 8 Chapter 2. A few topics

13 OwlH Network IDS Dashboards OwlH Network IDS Configuration management OwlH Network IDS Rule management Deploy Suricata or use a Current Suricata deployment We assume that you will use a new Suricata deployment or you will use a current one. Both will work. In this procedure, we relay on Wazuh agent to do the collection work, so if your platform supports wazuh agent you should be able to integrate your Suricata too. Most usual environments are supported by both, but anyway, please, verify Suricata and Wazuh-agent requirements to find the right match Configure Suricata to store output in JSON format - EVE log configuration By default Suricata configuration file suricata.yaml has the EVE (Extensible Event Format) enabled and configured to store the output in JSON format. But, anyway is a good idea to review that configuration and verify that we have all the info we want in the output file. Output file is usually - /var/log/suricata/eve.json a tail -f /var/log/suricata/eve.json will help you to verify that configuration is working. Here you have a SAMPLE eve-log configuration. Please, there are great configuration settings to use, so expend some time, review your Suricata documentation and find the right configuration for your needs. outputs: - eve-log: enabled: yes filetype: regular #regular syslog unix_dgram unix_stream redis filename: eve.json types: - alert: metadata: yes tagged-packets: yes xff: enabled: yes mode: extra-data - http: extended: yes - dns: query: yes # enable logging of DNS queries (continues on next page) 2.4. OwlH - Suricata and Wazuh 9

14 answer: yes # enable logging of DNS answers - tls: extended: yes # enable this for extended logging information - files: force-magic: no # force logging magic on all logged files - smtp: extended: yes # enable this for extended logging information - ssh - flow Suricata eve-log sample file (continued from previous page) Remember to restart your Suricata service after any change in your configuration file and check your Suricata logs Install Wazuh stack if you are not done yet We are integrating Suricata with Wazuh, so we need to have Wazuh Manager and elastic stack running before to end our configuration. At least we will need a Wazuh Manager connected to the elastic stack. Please, follow Wazuh install guide to deploy manager and elastic stack. If you have this done, you can skip this step Install Wazuh Agent in the suricata system Wazuh Agent will be the transporter of our Suricata output. It provides a secure communication channel between our Suricata node and Wazuh Manager and the storage repository. Of course, Wazuh Agent does a lot more, it will help us to take care of our Suricata security by providing FIM, OS and audit Log Monitoring, and many others. Check Wazuh Agent doc if you are not familiar with its capabilities. To install it please read and follow the install instructions from Wazuh. Or request our help. our support team - support@owlh.net visit our mailing list - OwlH mailing list (owlh@googlegroups.com) Configure Wazuh Suricata rules to create right alarms By default, Wazuh will use the JSON decoder to parse any JSON log entry from a wazuh agent. This decoder works really great, so we don t need to care about parsing. To create an alert from collected logs, Wazuh uses rules. Each rule has an alert value so if the logs match with a rule and the rule s alert value is equal or higher than alert level umbral defined in wazuh manager, then you will have an alert. # Default alert level configuration defined in manager ossec.conf file <alerts> <log_alert_level>3</log_alert_level> < _alert_level>12</ _alert_level> </alerts> So, by default, most Suricata rules will have a 0 value level to prevent noisy events. we suggest to modify this values just to be sure that everything is collected, you can then adjust the alert level as needed in the future, as well as you can modify rules also as you may need. If you are not familiar with decoders and rules, this may help - Wazuh decoders and rules. 10 Chapter 2. A few topics

15 # Sample rule modified to create an alert <rule id="86600" level="4"> <decoded_as>json</decoded_as> <field name="timestamp">\.+</field> <field name="event_type">\.+</field> <description>suricata messages.</description> </rule> Remember to restart your Wazuh Manager service after any change in your configuration file and check your Wazuh Manager logs Configure Wazuh Agent to read the eve.json output file We need to tell our Wazuh Agent to read the Suricata output file. This will be done in the ossec.conf file under /var/ossec/etc folder (Linux systems). Check your <ossec_config> tag and include following lines. # Modify ossec.conf - read localfile suricata EVE json log <localfile> <log_format>syslog</log_format> <location>/var/log/suricata/eve.json</location> </localfile> Remember to restart your Wazuh Agent service after any change in your configuration file and check your Wazuh Agent logs If you require PCI. Configure OwlH PCI mapping This must be run on every Wazuh logstash server and it will: Modify logstash configuration file to include OwlH PCI-DSS 3.2 mapping schema Copy OwlH suricata PCI-DSS mapping to config folder Restart logstash Please, download configuration script $ curl -so /tmp/owlhconfig.sh wazuhenrichment/master/owlhconfig.sh and then run it $ sudo bash /tmp/owlhconfig.sh Please, let us know if you need help. our support team - support@owlh.net visit our mailing list - OwlH mailing list (owlh@googlegroups.com) Modify IP data mapping Suricata json format includes fields like src_ip, src_port, dest_ip and dest_port. but wazuh elastic index is using srcip, srcport, dstip and dstport. so we will do the mapping modification in logstash by including the following in the wazuh logstash filter OwlH - Suricata and Wazuh 11

16 filter { if [data][src_ip] { mutate{ add_field => [ "[data][srcip]","%{[data][src_ip]"] remove_field => [ "[data][src_ip]" ] if [data][dest_ip] { mutate{ add_field => [ "[data][dstip]","%{[data][dest_ip]"] remove_field => [ "[data][dest_ip]" ] if [data][dest_port] { mutate{ add_field => [ "[data][dstport]","%{[data][dest_port]"] remove_field => [ "[data][dest_port]" ] if [data][src_port] { mutate{ add_field => [ "[data][srcport]","%{[data][src_port]"] remove_field => [ "[data][src_port]" ] Modify Elastic template Elasticsearch Wazuh index template is based on agent fields and doesn t include all the new fields types that Suricata will provide. This is not a real problem as an index refresh into kibana will allow you to manage Suricata without a problem. But some useful things may happen if we use the right field type as for example an amazing flow dashboard with useful traffic graphics. These are some fields that will require template customization. "flow": { "properties": { "bytes_toclient" : { "type": "long", "doc_values": "true", "bytes_toserver": { "type": "long", "doc_values": "true", Note: As there can be some issues when modifying elasticsearch indices and templates, please request our help to do it. We are working to prepare a full index template and instructions. 12 Chapter 2. A few topics

17 If you need help: our support team - support@owlh.net visit our mailing list - OwlH mailing list (owlh@googlegroups.com) OwlH - current v0.4 - May : Bro integration and AWS and GCloud support documentation last updated - Sep 13, OwlH - Bro and Wazuh Integration Logical Diagram Components Bro Node - Bro IDS and Wazuh Agent Wazuh Manger Logstash Server Elastic and Kibana Server Let s see what we need to modify on each component to be able to manage this Bro and Wazuh integration OwlH - Bro and Wazuh 13

18 2.5.2 Configure - Bro Node This system will require Bro working of course, and Wazuh agent installed. OwlH instructions will help to configure both Bro and Wazuh agent Bro Logs Output format to JSON Option 1 - Modify ASCII writer output you can load the json_logs.bro configuration that will tell ASCII writer to write output in JSON format. You must include following line in your.bro configuration files. It can be /etc/bro/site/local.bro or you can follow our recomendation and write the configs in owlh.bro file (please, see below). This will modify output and will store just json output, you won t have ASCII tuning/json_logs.bro Option 2 - Use add-json package Usually, you would like to have both outputs, ASCII and JSON. You can use add-json packet ( J-Gras/add-json) and load it in your local.bro or packages/add-json/add-json.bro To install add-json package you can use bro-pkg tool :: bro-pkg install add-json Note: bro-pkg installation ( Note: Thanks to C.L.Martinez and Jan.Grashoefer Bro Event Enritchment to help Wazuh ruleset It is a good idea to help wazuh rules to do their job, to include a field that will identify what kind of log line we are analyzing. Bro output doesn t include that info per line by default, so we are going to help wazuh by including the field bro_engine that will tell wazuh what kind of log is it. We are using redef function to include a custom field for each ::Info record of each Protocol. Here are just a few of them, we will include more by default in next releases. redef record DNS::Info += { bro_engine: string &default="dns" &log; ; redef record Conn::Info += { bro_engine: string &default="conn" &log; ; redef record Weird::Info += { bro_engine: string &default="weird" &log; ; (continues on next page) 14 Chapter 2. A few topics

19 redef record SSL::Info += { bro_engine: string &default="ssl" &log; ; redef record SSH::Info += { bro_engine: string &default="ssh" &log; ; (continued from previous page) Loading Bro customizations at Bro start We include all OwlH customizations in OwlH_*.bro files, that helps to have a clear view of what OwlH does as well as we hope it will simplify configuration management. Under /etc/bro/site we will create two files owlh.bro - Will include JSON call for bro_engine field definition. owlh_types.bro - Will include all redef statments You will only need to load OwlH.bro at the end of your local.bro file to include all these /etc/bro/site/owlh.bro owlh.bro looks like: # Select prefered output #@load /etc/bro/site/owlh_types.bro and owlh_types.bro: redef record DNS::Info += { bro_engine: string &default="dns" &log; ; redef record Conn::Info += { bro_engine: string &default="conn" &log; ; redef record Weird::Info += { bro_engine: string &default="weird" &log; ; redef record SSL::Info += { bro_engine: string &default="ssl" &log; ; redef record SSH::Info += { bro_engine: string &default="ssh" &log; ; Wazuh Agent configuration Note: Remember we are on Bro Node component.* Modify your Wazuh agent to read the Bro Logs files 2.5. OwlH - Bro and Wazuh 15

20 <localfile> <log_format>syslog</log_format> <location>/path/to/bro/logs/*.log</location> </localfile> Note: if needed, You can specify files instead of all.log ones <localfile> <log_format>syslog</log_format> <location>/path/to/bro/logs/weird.log</location> </localfile> <localfile> <log_format>syslog</log_format> <location>/path/to/bro/logs/conn.log</location> </localfile> Configure - Wazuh Manager Good news is that Wazuh s JSON decoder works really great, so using JSON output from BRO allow us to save time developing an specific decoder for its standard ASCII out. We only need to create a few rules to identify the Bro events and forward them to ELK Wazuh Bro IDS Rules Include the Wazuh rules into your /var/ossec/etc/rules/local-rules.xml file to manage your BRO logs <group name="bro"> <rule id="99001" level="5"> <field name="bro_engine">ssh</field> <description>bro: SSH Connection</description> </rule> <rule id="99001" level="5"> <field name="bro_engine">ssl</field> <description>bro: SSL Connection</description> </rule> <rule id="99002" level="5"> <field name="bro_engine">dns</field> <description>bro: DNS Query</description> </rule> <rule id="99004" level="5"> <field name="bro_engine">conn</field> <description>bro: Connection detail</description> </rule> </group> Note: remember restart your wazuh agent after change.* 16 Chapter 2. A few topics

21 2.5.7 Configure - Logstash Server Logstash Filter We need to modify Logstash filters (/etc/logstash/conf.d/) to allow JSON record cleaning from Bro to Wazuh-alert index parsing. It is necesary because bro uses [id] field to group network src and dest addresses and ports info and parsing will fail Also, it is done so we can store IP-PORT data in the right fields for wazuh index filter { if [data][id][orig_h] { mutate { add_field => [ "[data][srcip]", "%{[data][id][orig_h]" ] add_field => [ "[data][dstip]", "%{[data][id][resp_h]" ] add_field => [ "[data][srcport]", "%{[data][id][orig_p]" ] add_field => [ "[data][dstport]", "%{[data][id][resp_p]" ] remove_field => [ "[data][id]" ] Review your Kibana Dashboard You will need to refresh your Wazuh-alerts-3.x indeces to include the new Bro fields. from your kibana console, go to Management -> index -> select right wazuh-alerts index -> click top-right refresh icon to refresh And that s all folks. If you need help: our support team - support@owlh.net 2.5. OwlH - Bro and Wazuh 17

22 visit our mailing list - OwlH mailing list (owlh@googlegroups.com) OwlH - current v0.4 - May : Bro integration and AWS and GCloud support documentation last updated - Sep 13, OwlH for PCI OwlH can help you to demonstrate compliance with requirements: Download OwlH PCI-DSS v3.2 Mapping - owlh_pcidss_3.2.pdf Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Requirement 4: Encrypt transmission of cardholder data across open, public networks Requirement 5: Use and regularly update anti-virus software or programs Requirement 6: Develop and maintain secure systems and applications Requirement 8: Assign a unique ID to each person with computer access Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes How to apply Suricata PCI Mapping This must be run on every Wazuh logstash server and it will: 18 Chapter 2. A few topics

23 Modify logstash configuration file to include OwlH PCI-DSS 3.2 mapping schema Copy OwlH suricata ET ruleset PCI-DSS mapping to config folder Restart logstash Please, download configuration script $ curl -so /tmp/owlhconfig.sh wazuhenrichment/master/owlhconfig.sh and then run it $ sudo bash /tmp/owlhconfig.sh How to manage and custom your Suricata PCI Mapping Please download the script that will allow you to manage your compliance mapping $ curl -so /tmp/owlh-suri2pci.sh owlh/owlhpci/master/owlh-suri2pci.sh usage:./owlh-suri2pci.sh -a ls lc m d -s sid -c pci-controls -b bulk_file file pci_map_ -a --append -d --delete -ls --listsid (grep) -lc --listctrl -m --modify -s --sid -c --control - append sid and pci-dss related controls to map file - sid and pci-dss related controls from map file - list pci controlers related with a sid or group of sids - list sids that are associated with pci control - modify sid and pci mapping - sid number - list of controls comma separated If you need help: our support team - support@owlh.net visit our mailing list - OwlH mailing list (owlh@googlegroups.com) OwlH - current v0.4 - May : Bro integration and AWS and GCloud support documentation last updated - Sep 13, Software TAP for AWS and GCloud OwlH Software TAP to monitor traffic in AWS and GCLOUD environments img/softwaretap.png 2.7. Software TAP for AWS and GCloud 19

24 OwlH Software TAP (stap) will collect full or specific traffic from your instances and forward it to OwlH Master that will run the Network IDS tool to do the analysis. This doc will describe a basic configuration using CentOS instances, Bro and Suricata Network IDS and Wazuh Integration. (other Linux distributions as well as Windows Support is available) There are a lot of moving pieces, feel free to ask for help support@owlh.net. This doc will try to simplify deployment but for sure it will need some customization as well as may need some architecture understanding. Main steps: Introduction: How does it work? Prepare your environment Option: Create an administration network OwlH Master Suricata NIDS BRO NIDS Wazuh Integration Default configuration settings Register your instances Enjoy it Define Instances settings Configure your instance Introduction: What does SotwareTAP do and how does it work? Software TAP is for capture traffic in remote instances, transport captured traffic to a central analysis platform, analyze the traffic and alert. It works in any environment, but it is really useful when you need this visibility in a cloud environment Main Components There are different components. OwlH Master Orchestration Dummy Interface Network IDS Target Instances Storage and Visualization 20 Chapter 2. A few topics

25 Wazuh Integration Note: For cloud like AWS or Google Cloud should be good idea to deploy our instances with two different network interfaces, so we can use main interface as public service interface and secondary for management propouses, as traffic forward from instances to OwlH system A more detailed block diagram img/softwaretapgcaws.png OwlH Master Orchestration Prepare OwlH Master software # sudo curl TAP/ config.sh > /tmp/configure_owlhmaster.sh # sudo bash /tmp/configure_owlhmaster.sh # rm /tmp/configure_owlhmaster.sh 2.7. Software TAP for AWS and GCloud 21

26 OwlH Master ssh Key Copy your owlh master ssh key to your instances /tmp folder. Be sure it is in the right place. # scp /home/owlh/.ssh/owlhmaster.pub user@ :/tmp/owlhmaster.pub Note: change user and as required or please, follow your own deployment process to ensure that the owlh master pub key is in place on each instance. Create Dummy interface for Network IDS # sudo curl centos7 > /tmp/dummy.sh # sudo bash /tmp/dummy.sh # rm /tmp/dummy.sh Network IDS support Continuous Network IDS monitor and sniffing We will help to have a better continuous monitoring by using a configuration based on a dummy network interface and running Network IDS solutions continuously. PCAPS will be injected using TCPREPLAY script in the dummy interface. Deploy Suricata as Network IDS Suricata deployment script will help you to deploy Suricata from source code in a CentOS 7 box. If you prefer a different way to deploy suricata, please follow Suricata documentation. Run Suricata IDS 22 Chapter 2. A few topics

27 Deploy Bro as Network IDS Bro deployment script will help you to deploy Bro IDS from source code in a CentOS 7 box. If you prefer a different way to deploy Bro, please follow Bro documentation. Run Bro IDS OwlH Master Configuration OwlH Master Configuration for Software TAP We call flock Controller the main process that will drive Software TAP functionality. This is the default configuration file that you will find in your /etc/owlh/ folder. { "pidfile" : "/tmp/flock.pid", "logfile" : "/var/log/owlh/flock.log", "inventory" : "/etc/owlh/inventory.conf", "owlh_user" : "owlh", "owlh_user_key" : "/home/owlh/.ssh/owlhmaster", "max_cpu" : "25", "max_mem" : "25", "max_storage" : "80", "capture_time" : "60", "default_interface" : "ens33", "filter_path" : "/etc/owlh/filter.bpf", "local_pcap_path" : "/usr/share/owlh/in_queue/", "pcap_path" : "/usr/share/owlh/pcap/", "owlh_interface" : "owlh", "suricata_on" : "True", "bro_on" : "True" BPF filter You can specify what traffic to be captured if you don t want to capture everything. Main and default configuration will provide filter to not collect management traffic from OwlH master to your agents. Remember this filter must be deployed into each one agent. be sure it is on each one of your servers. Your bpf filter should be at least something like this not host and not port 22 Where must be replaced with your OwlH master ip that will connect to your server Target Instances We will need some tools and a user in each one of your servers in order to coordinate the traffic capture functionality Create and configure owl user in your servers The owlh user will be use by OwlH Master Orchestrator to run traffic capture and collect pcap files. to create user and configure it please follow this script: 2.7. Software TAP for AWS and GCloud 23

28 #!/bin/bash # Created # v master@owlh.net # tested in amazon Linux instance # tested GCLOUD - centos7 - CIS version # NOTE -- run this script in a server using # sudo bash owluser-setup.sh sudo adduser owlh echo "create owlh user ssh folder" sudo -u owlh mkdir /home/owlh/.ssh echo "setting ssh folder permissions" sudo -u owlh chmod 700 /home/owlh/.ssh echo "create authorized keys file" sudo -u owlh touch /home/owlh/.ssh/authorized_keys echo "setting authorized keys permissions" sudo -u owlh chmod 600 /home/owlh/.ssh/authorized_keys echo "include owlmaster key" echo "be sure you have your owlh master pub key in /tmp/owlhmaster.pub file" sudo cat /tmp/owlhmaster.pub >> /home/owlh/.ssh/authorized_keys echo "Allow owlh user to login with ssh" sudo sed -i '/^AllowUsers/s/$/ owlh/' /etc/ssh/sshd_config sudo systemctl restart sshd echo "install tcpdump" if! sudo yum list installed tcpdump ; then sudo yum -y install tcpdump fi # Allow owlh use tcpdump with sudo without password echo "allow user owlh to use tcpdump and chown" #sudo sed -i '/^%wheel/a owlh ALL=(ALL) NOPASSWD: /usr/sbin/tcpdump' /etc/ sudoers sudo echo "owlh ALL=(ALL) NOPASSWD: /usr/sbin/tcpdump, /usr/bin/chown" >> / etc/sudoers.d/owlh # Prepare owlh related stuff folder echo "prepare owlh stuff folders /etc, /var/log, /usr/share" sudo mkdir /etc/owlh sudo mkdir /var/log/owlh sudo mkdir /usr/share/owlh sudo mkdir /usr/share/owlh/pcap sudo chown owlh /etc/owlh sudo chgrp owlh /etc/owlh sudo chown owlh /var/log/owlh sudo chgrp owlh /var/log/owlh sudo chown -R owlh /usr/share/owlh sudo chgrp -R owlh /usr/share/owlh #sudo echo "not host and not port 22" > /etc/owlh/filter.bpf # clean and end echo "should be done. Enjoy your day." 24 Chapter 2. A few topics

29 Script also includes tcpdump installation as part of the traffic capture stuff. Please be sure you have tcpdump running before continue. This step is only needed if you don t have tcpdump installed yet. echo "install tcpdump" if! sudo yum list installed tcpdump ; then sudo yum -y install tcpdump fi # Allow owlh use tcpdump with sudo without password echo "allow user owlh to use tcpdump and chown" #sudo sed -i '/^%wheel/a owlh ALL=(ALL) NOPASSWD: /usr/sbin/tcpdump' /etc/ sudoers sudo echo "owlh ALL=(ALL) NOPASSWD: /usr/sbin/tcpdump, /usr/bin/chown" >> / etc/sudoers.d/owlh Modify your bpf filter file Register your servers We need to know a little bit about your network. At least, we need to know what are the servers that you want to capture traffic from. Please, include in your OwlH server inventory file all your servers /etc/owlh/inventory.json. Define them as needed but keep json format. [ ] {, { "id" : "1", "name" : "agent-1-openrules", "ip" : " ", "enabled" : "true", "active" : "true" "id" : "2", "name" : "agent-2-217", "ip" : " ", "enabled" : "true", "active" : "true" Wazuh system Be sure you have at least one Wazuh manager and elastic stack working before to continue. Please follow Wazuh documentation Integrate OwlH master with Wazuh Integrate OwlH master with Wazuh is pretty easy. We only need to deploy our Wazuh agent into the OwlH master. Follow Wazuh agent deploy instructions for RPM packets to deploy the agent. in summary, you will set up the repository by running the following command: 2.7. Software TAP for AWS and GCloud 25

30 # cat > /etc/yum.repos.d/wazuh.repo <<\EOF [wazuh_repo] gpgcheck=1 gpgkey= enabled=1 name=wazuh repository baseurl= protect=1 EOF and now, install wazuh agent # yum install wazuh-agent now, lest register agent into your Wazuh Manager. if you are using authd on your manager: # register agent /var/ossec/bin/agent-auth -m A owlhmaster A few things here: # is your wazuh manager ip -A # option means that you want to specify a name other than hostname. # This command suppose tcp/1515 port used, # if not, you should change command to include the right port. Please review, authd documentation or find a different way to register your agent. Register agent documentation Finally, modify your ossec.conf file to monitor your suricata output <localfile> <log_format>syslog</log_format> <location>/var/log/suricata/eve.json</location> </localfile> And restart your wazuh agent $ systemctl restart wazuh-agent Enjoy It Start Software TAP # is everything in place? # start Wazuh # start Suricata # start Bro # start Flock Controller If you need help: our support team - support@owlh.net visit our mailing list - OwlH mailing list (owlh@googlegroups.com) 26 Chapter 2. A few topics

31 OwlH - current v0.4 - May : Bro integration and AWS and GCloud support documentation last updated - Sep 13, Network IDS support OwlH works with Suricata IDS - OwlH - Suricata and Wazuh - ( suricata ) Bro IDS - OwlH - Bro and Wazuh - ( broids ) If you need help: our support team - support@owlh.net visit our mailing list - OwlH mailing list (owlh@googlegroups.com) OwlH - current v0.4 - May : Bro integration and AWS and GCloud support documentation last updated - Sep 13, If you need help: our support team - support@owlh.net visit our mailing list - OwlH mailing list (owlh@googlegroups.com) OwlH - current v0.4 - May : Bro integration and AWS and GCloud support documentation last updated - Sep 13, Network IDS support 27

EveBox Documentation. Release. Jason Ish

EveBox Documentation. Release. Jason Ish EveBox Documentation Release Jason Ish Jan 25, 2018 Contents: 1 Installation 1 2 Server 3 2.1 Running................................................. 3 2.2 Oneshot Mode..............................................

More information

EveBox Documentation. Jason Ish

EveBox Documentation. Jason Ish Jason Ish May 29, 2018 Contents: 1 Installation 1 2 Server 3 2.1 Running................................................. 3 2.2 Oneshot Mode.............................................. 4 2.3 Authentication..............................................

More information

Securing AWS with HIDS. Gaurav Harsola Mayank Gaikwad

Securing AWS with HIDS. Gaurav Harsola Mayank Gaikwad Securing AWS with HIDS» Gaurav Harsola Mayank Gaikwad IDS What? Why? How? Intrusion Detection System An IDS is a software application that monitors network or system activities for malicious activities.

More information

Cisco Stealthwatch Cloud. Private Network Monitoring Advanced Configuration Guide

Cisco Stealthwatch Cloud. Private Network Monitoring Advanced Configuration Guide Cisco Stealthwatch Cloud Private Network Monitoring Advanced Configuration Guide TOC About Stealthwatch Cloud Private Network Monitor Sensor 3 Checking Your Sensor Version 4 Manually Installing the Package

More information

HOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS

HOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS HOW TO SECURELY CONFIGURE A LINUX HOST TO RUN CONTAINERS How To Securely Configure a Linux Host to Run Containers To run containers securely, one must go through a multitude of steps to ensure that a)

More information

Infrastructure at your Service. Elking your PostgreSQL Database Infrastructure

Infrastructure at your Service. Elking your PostgreSQL Database Infrastructure Infrastructure at your Service. About me Infrastructure at your Service. Arnaud Berbier Senior Consultant +41 79 128 91 45 arnaud.berbier@dbi-services.com Page 2 Agenda 1.Playground Infrastructure 2.Elastic

More information

Azure Marketplace. Getting Started Tutorial. Community Edition

Azure Marketplace. Getting Started Tutorial. Community Edition Azure Marketplace Getting Started Tutorial Community Edition Introduction NooBaa software provides a distributed storage solution for unstructured data such as analytics data, multi-media, backup, and

More information

Monitor your containers with the Elastic Stack. Monica Sarbu

Monitor your containers with the Elastic Stack. Monica Sarbu Monitor your containers with the Elastic Stack Monica Sarbu Monica Sarbu Team lead, Beats team monica@elastic.co 3 Monitor your containers with the Elastic Stack Elastic Stack 5 Beats are lightweight shippers

More information

Azure Marketplace Getting Started Tutorial. Community Edition

Azure Marketplace Getting Started Tutorial. Community Edition Azure Marketplace Getting Started Tutorial Community Edition Introduction NooBaa software provides a distributed storage solution for unstructured data such as analytics data, multi-media, backup, and

More information

Deploying Rubrik Datos IO to Protect MongoDB Database on GCP

Deploying Rubrik Datos IO to Protect MongoDB Database on GCP DEPLOYMENT GUIDE Deploying Rubrik Datos IO to Protect MongoDB Database on GCP TABLE OF CONTENTS INTRODUCTION... 1 OBJECTIVES... 1 COSTS... 2 BEFORE YOU BEGIN... 2 PROVISIONING YOUR INFRASTRUCTURE FOR THE

More information

ThoughtSpot on AWS Quick Start Guide

ThoughtSpot on AWS Quick Start Guide ThoughtSpot on AWS Quick Start Guide Version 4.2 February 2017 Table of Contents Contents Chapter 1: Welcome to ThoughtSpot...3 Contact ThoughtSpot... 4 Chapter 2: Introduction... 6 About AWS...7 Chapter

More information

Lab Exercises: Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools

Lab Exercises: Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools Lab Exercises: Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools Fill in the details of your MHN Server info. If you don t have this, ask your instructor. These details

More information

Jumping from Tenable's SecurityCenter CV to production environments

Jumping from Tenable's SecurityCenter CV to production environments 23 MAY, 2017 Jumping from Tenable's SecurityCenter CV to production environments OLEKSANDR KAZYMYROV Introduction What is SecurityCenter CV? 3 Source: https://www.softcart.co.il/en/tenable-securitycenter-continuous-view

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

Agility2018-TCPdump Documentation

Agility2018-TCPdump Documentation Agility2018-TCPdump Documentation Release.01 David Larsen Aug 10, 2018 Switches 1 F5 tcpdump and Wireshark 3 1.1 tcpdump Switches............................................ 3 1.2 tcpdump Filters..............................................

More information

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time.

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. Running your own server lets you play together with your friends and family with your own set

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix Version 1.1 Table of Contents About BigFix Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 About Support for Dual Stack Environments... 5 Concepts, Components,

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...

More information

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting

More information

ForeScout CounterACT. Configuration Guide. Version 1.2

ForeScout CounterACT. Configuration Guide. Version 1.2 ForeScout CounterACT Endpoint Module: Linux Plugin Version 1.2 Table of Contents About This Plugin... 4 Accessing and Managing Endpoints... 4 Remote Inspection... 4 SecureConnector... 5 What to Do... 5

More information

New Generation SIEM. Solution Development

New Generation SIEM. Solution Development New Generation SIEM Solution Development Big Picture of Solution Actions Flow NewGen SIEM Agents Events/Artifacts Data Flow vciso Indicator of Compromise Сollector Solution/Service Title Indicator of Compromise

More information

Ansible Tower Quick Setup Guide

Ansible Tower Quick Setup Guide Ansible Tower Quick Setup Guide Release Ansible Tower 2.4.5 Red Hat, Inc. Jun 06, 2017 CONTENTS 1 Quick Start 2 2 Login as a Superuser 3 3 Import a License 4 4 Examine the Tower Dashboard 6 5 The Setup

More information

Configure Sensu and other Actions to Register Clients

Configure Sensu and other Actions to Register Clients Configure Sensu and other Actions to Register Clients Contents Introduction Prerequisites Requirements Components Used Background Information Configure Install Epel Repository Install Erlang Install Redis,

More information

DEVOPS COURSE CONTENT

DEVOPS COURSE CONTENT LINUX Basics: Unix and linux difference Linux File system structure Basic linux/unix commands Changing file permissions and ownership Types of links soft and hard link Filter commands Simple filter and

More information

AALOK INSTITUTE. DevOps Training

AALOK INSTITUTE. DevOps Training DevOps Training Duration: 40Hrs (8 Hours per Day * 5 Days) DevOps Syllabus 1. What is DevOps? a. History of DevOps? b. How does DevOps work anyways? c. Principle of DevOps: d. DevOps combines the best

More information

PVS Deployment in the Cloud. Last Updated: June 17, 2016

PVS Deployment in the Cloud. Last Updated: June 17, 2016 PVS Deployment in the Cloud Last Updated: June 17, 2016 Contents Amazon Web Services Introduction 3 Software Requirements 4 Set up a NAT Gateway 5 Install PVS on the NAT Gateway 11 Example Deployment 12

More information

Monitor your infrastructure with the Elastic Beats. Monica Sarbu

Monitor your infrastructure with the Elastic Beats. Monica Sarbu Monitor your infrastructure with the Elastic Beats Monica Sarbu Monica Sarbu Team lead, Beats team Email: monica@elastic.co Twitter: 2 Monitor your servers Apache logs 3 Monitor your servers Apache logs

More information

Carbon Black QRadar App User Guide

Carbon Black QRadar App User Guide Carbon Black QRadar App User Guide Table of Contents Carbon Black QRadar App User Guide... 1 Cb Event Forwarder... 2 Overview...2 Requirements...2 Install Cb Event Forwarder RPM...2 Configure Cb Event

More information

Puppet on the AWS Cloud

Puppet on the AWS Cloud Puppet on the AWS Cloud Quick Start Reference Deployment AWS Quick Start Reference Team March 2016 This guide is also available in HTML format at http://docs.aws.amazon.com/quickstart/latest/puppet/. Contents

More information

Total Security Management PCI DSS Compliance Guide

Total Security Management PCI DSS Compliance Guide Total Security Management PCI DSS Guide The Payment Card Industry Data Security Standard (PCI DSS) is a set of regulations to help protect the security of credit card holders. These regulations apply to

More information

CounterACT Macintosh/Linux Property Scanner Plugin

CounterACT Macintosh/Linux Property Scanner Plugin CounterACT Macintosh/Linux Property Scanner Plugin Version 7.0.1 and Above Table of Contents About the Macintosh/Linux Property Scanner Plugin... 4 Requirements... 4 Supported Operating Systems... 4 Accessing

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

COMS 6100 Class Notes 3

COMS 6100 Class Notes 3 COMS 6100 Class Notes 3 Daniel Solus September 1, 2016 1 General Remarks The class was split into two main sections. We finished our introduction to Linux commands by reviewing Linux commands I and II

More information

Ingesting Data from Kafka Queues Deployed On-Prem into jsonar Cloud Systems

Ingesting Data from Kafka Queues Deployed On-Prem into jsonar Cloud Systems Ingesting Data from Kafka Queues Deployed On-Prem into jsonar Cloud Systems Most jsonar systems are deployed on the Cloud yet consume data generated within enterprise data centers. Since Kafka has emerged

More information

SmartCash SmartNode Setup Guide V1.2 Windows 10 13/01/2018 By (Jazz) yoyomonkey Page 1

SmartCash SmartNode Setup Guide V1.2 Windows 10 13/01/2018 By (Jazz) yoyomonkey Page 1 SmartCash SmartNode Setup Guide v1.2 Date: Introduction Welcome to this step by step guide that will take you through the process of creating your own SmartCash SmartNode. This guide is aimed at the casual

More information

Amazon Elasticsearch Service

Amazon Elasticsearch Service Amazon Elasticsearch Service Fully managed, reliable, and scalable Elasticsearch service. Have Your Frontend & Monitor It Too Scalable Log Analytics Inside a VPC Lab Instructions Contents Lab Overview...

More information

Sputnik Installation and Configuration Guide

Sputnik Installation and Configuration Guide Sputnik Installation and Configuration Guide Contents Introduction... 2 Installing Sputnik (Local Linux Machine)... 2 Sputnik Operation... 2 Creating an Amazon EC2 instance for Sputnik... 3 Configuring

More information

CNIT 50: Network Security Monitoring. 6 Command Line Packet Analysis Tools

CNIT 50: Network Security Monitoring. 6 Command Line Packet Analysis Tools CNIT 50: Network Security Monitoring 6 Command Line Packet Analysis Tools Topics SO Tool Categories Running Tcpdump Using Dumpcap and Tshark Running Argus and the Ra Client SO Tool Categories Three Types

More information

DC/OS on Google Compute Engine

DC/OS on Google Compute Engine DC/OS on Google Compute Engine You can configure a DC/OS cluster on Google Compute Engine (GCE) by using these scripts. Configure bootstrap node Install the DC/OS GCE scripts Configure parameters Important:

More information

MeshCentral 2. Installer s Guide. Version July 31, 2018 Ylian Saint-Hilaire

MeshCentral 2. Installer s Guide. Version July 31, 2018 Ylian Saint-Hilaire MeshCentral 2 MeshCentral 2 Installer s Guide Version 0.0.4 July 31, 2018 Ylian Saint-Hilaire Table of Contents 1. Abstract... 1 2. Amazon Linux 2... 1 2.1 Getting the AWS instance setup... 1 2.2 Installing

More information

Precursor Steps & Storage Node

Precursor Steps & Storage Node Precursor Steps & Storage Node In a basic HPC cluster, the head node is the orchestration unit and possibly the login portal for your end users. It s one of the most essential pieces to get working appropriately.

More information

Intro to Linux. this will open up a new terminal window for you is super convenient on the computers in the lab

Intro to Linux. this will open up a new terminal window for you is super convenient on the computers in the lab Basic Terminal Intro to Linux ssh short for s ecure sh ell usage: ssh [host]@[computer].[otheripstuff] for lab computers: ssh [CSID]@[comp].cs.utexas.edu can get a list of active computers from the UTCS

More information

Malware Analysis: Suricata & Splunk for better rule writing

Malware Analysis: Suricata & Splunk for better rule writing Malware Analysis: Suricata & Splunk for better rule writing Anthony Tellez, CISSP, CEH, CNDA Lead Consultant, Emerging Technologies Splunk November 2017 Forward-Looking Statements During the course of

More information

SmartCash SmartNode Setup Guide v1.2. Windows 10. Date: 13/01/2018. By (Jazz) yoyomonkey

SmartCash SmartNode Setup Guide v1.2. Windows 10. Date: 13/01/2018. By (Jazz) yoyomonkey SmartCash SmartNode Setup Guide v1.2 Date: Introduction Welcome to this step by step guide that will take you through the process of creating your own SmartCash SmartNode. This guide is aimed at the casual

More information

ForeScout CounterACT Linux Plugin

ForeScout CounterACT Linux Plugin ForeScout CounterACT Linux Plugin Version 1.1.0 Table of Contents About This Plugin... 4 Accessing and Managing Endpoints... 4 Remote Inspection... 4 SecureConnector... 5 What to Do... 5 Requirements...

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

About this course 1 Recommended chapters... 1 A note about solutions... 2

About this course 1 Recommended chapters... 1 A note about solutions... 2 Contents About this course 1 Recommended chapters.............................................. 1 A note about solutions............................................... 2 Exercises 2 Your first script (recommended).........................................

More information

Cassandra Database Security

Cassandra Database Security Cassandra Database Security Author: Mohit Bagria NoSQL Database A NoSQL database (sometimes called as Not Only SQL) is a database that provides a mechanism to store and retrieve data other than the tabular

More information

If you had a freshly generated image from an LCI instructor, make sure to set the hostnames again:

If you had a freshly generated image from an LCI instructor, make sure to set the hostnames again: Storage Node Setup A storage node (or system as your scale) is a very important unit for an HPC cluster. The computation is often about the data it produces and keeping that data safe is important. Safe

More information

AppGate for AWS Step-by-Step Setup Guide. Last revised April 28, 2017

AppGate for AWS Step-by-Step Setup Guide. Last revised April 28, 2017 AppGate for AWS Step-by-Step Setup Guide Last revised April 28, 2017 Contents Welcome & Overview... 2 Getting Started... 3 Pre-Requisites... 4 But what about Security Groups?... 5 Browser Compatibility:...

More information

Setting up a Chaincoin Masternode

Setting up a Chaincoin Masternode Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version

More information

netcat Johannes Franken

netcat Johannes Franken netcat Johannes Franken On this page I show example uses of netcat - a command line tool to create network connections over tcp or udp. Contents 1. Intended purpose 2. Usage as client

More information

Verteego VDS Documentation

Verteego VDS Documentation Verteego VDS Documentation Release 1.0 Verteego May 31, 2017 Installation 1 Getting started 3 2 Ansible 5 2.1 1. Install Ansible............................................. 5 2.2 2. Clone installation

More information

Installing SmartSense on HDP

Installing SmartSense on HDP 1 Installing SmartSense on HDP Date of Publish: 2018-07-12 http://docs.hortonworks.com Contents SmartSense installation... 3 SmartSense system requirements... 3 Operating system, JDK, and browser requirements...3

More information

Relay. Getting Started

Relay. Getting Started Relay Getting Started What is Blue Jeans Relay? Blue Jeans Relay is a software solution that integrates customer-premise components and applications with the Blue Jeans cloud. Relay Touch, the first solution

More information

Hiptest on-premises - Installation guide

Hiptest on-premises - Installation guide Hiptest on-premises - Installation guide Owner: Hiptest Version: 1.4.3 Released: 2017-01-27 Author: Hiptest Contributors: Module: Hiptest enterprise ID: Link: Summary This guide details the installation

More information

OSSEC 3.0 Preview OSSEC CON Scott Shinn OSSEC Project Manager

OSSEC 3.0 Preview OSSEC CON Scott Shinn OSSEC Project Manager OSSEC 3.0 Preview OSSEC CON 2018 Scott Shinn OSSEC Project Manager WHAT S NEW WITH OSSEC 3.0 A Preview of the Latest Release What s New in OSSEC 3.0 New linux distribution, snapshot and docker repo support

More information

Sharing is Caring: Improving Detection with Sigma

Sharing is Caring: Improving Detection with Sigma SANS Tactical Detection and Data Analytics Summit 2018 Sharing is Caring: Improving Detection with Sigma John Hubbard (@SecHubb) The Blue Team's Journey Sharing is Caring - John Hubbard @SecHubb 2 Blue

More information

Monitoring MySQL Performance with Percona Monitoring and Management

Monitoring MySQL Performance with Percona Monitoring and Management Monitoring MySQL Performance with Percona Monitoring and Management Santa Clara, California April 23th 25th, 2018 MIchael Coburn, Product Manager Your Presenter Product Manager for PMM (also Percona Toolkit

More information

VMware AirWatch Content Gateway Guide for Linux For Linux

VMware AirWatch Content Gateway Guide for Linux For Linux VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Unifying logs and metrics data with Elastic Beats. Monica Sarbu Team lead, Elastic Beats

Unifying logs and metrics data with Elastic Beats. Monica Sarbu Team lead, Elastic Beats Unifying logs and metrics data with Elastic Beats Monica Sarbu Team lead, Elastic Beats # Who am I Team lead at Elastic Beats Software engineer Joined Elastic 1 year ago @monicasarbu http://github.com/monicasarbu

More information

Hackproof Your Cloud Responding to 2016 Threats

Hackproof Your Cloud Responding to 2016 Threats Hackproof Your Cloud Responding to 2016 Threats Aaron Klein, CloudCheckr Tuesday, June 30 th 2016 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Changing Your Perspective Moving

More information

Backing Up And Restoring Nagios Log Server. This document describes how to backup and restore a Nagios Log Server cluster.

Backing Up And Restoring Nagios Log Server. This document describes how to backup and restore a Nagios Log Server cluster. Backing Up And Restoring Purpose This document describes how to backup and restore a cluster. Target Audience This document is intended for use by Administrators who wish to understand the different backup

More information

in PCI Regulated Environments

in PCI Regulated Environments in PCI Regulated Environments JULY, 2018 PCI COMPLIANCE If your business accepts payments via credit, debit, or pre-paid cards, you are required to comply with the security requirements of the Payment

More information

The Wonderful World of Services VINCE

The Wonderful World of Services VINCE The Wonderful World of Services VINCE Agenda definitions services for Windows and Linux breaks? auditing Linux logs for Linux useful tools Goals develop a better understanding of Linux and Windows services

More information

MQ Monitoring on Cloud

MQ Monitoring on Cloud MQ Monitoring on Cloud Suganya Rane Digital Automation, Integration & Cloud Solutions Agenda Metrics & Monitoring Monitoring Options AWS ElasticSearch Kibana MQ CloudWatch on AWS Prometheus Grafana MQ

More information

Setting up my Dev Environment ECS 030

Setting up my Dev Environment ECS 030 Setting up my Dev Environment ECS 030 1 Command for SSHing into a CSIF Machine If you already have a terminal and already have a working ssh program (That is, you type ssh into the terminal and it doesn

More information

Streamline AWS Security Incidents

Streamline AWS Security Incidents IMF 2018 Streamline AWS Security Incidents Asif Matadar @d1r4c #whoami Director of Endpoint Detection & Response (EDR), EMEA at Tanium Seasoned Incident Response professional with over 7 years experience

More information

Tutorial 1. Account Registration

Tutorial 1. Account Registration Tutorial 1 /******************************************************** * Author : Kai Chen * Last Modified : 2015-09-23 * Email : ck015@ie.cuhk.edu.hk ********************************************************/

More information

AWS Service Catalog. User Guide

AWS Service Catalog. User Guide AWS Service Catalog User Guide AWS Service Catalog: User Guide Copyright 2017 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in

More information

Copyright Heraflux Technologies. Do not redistribute or copy as your own. 1

Copyright Heraflux Technologies. Do not redistribute or copy as your own. 1 @kleegeek davidklee.net heraflux.com in/davidaklee Specialties / Focus Areas / Passions: Performance Tuning Business Continuity Virtualization & Cloud Infrastructure Architecture Health & Efficiency Capacity

More information

TangeloHub Documentation

TangeloHub Documentation TangeloHub Documentation Release None Kitware, Inc. September 21, 2015 Contents 1 User s Guide 3 1.1 Managing Data.............................................. 3 1.2 Running an Analysis...........................................

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become

More information

Linux Administration

Linux Administration Linux Administration This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. It is designed for professionals

More information

SQL Server Administration on Linux 2017

SQL Server Administration on Linux 2017 @kleegeek davidklee.net heraflux.com davidaklee Specialties / Focus Areas / Passions: Performance Tuning Business Continuity Virtualization & Cloud Infrastructure Architecture Health & Efficiency Capacity

More information

Information Security Policy

Information Security Policy Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated

More information

VMware vrealize Log Insight Getting Started Guide

VMware vrealize Log Insight Getting Started Guide VMware vrealize Log Insight Getting Started Guide vrealize Log Insight 2.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

About the Tutorial. Audience. Prerequisites. Copyright and Disclaimer. Logstash

About the Tutorial. Audience. Prerequisites. Copyright and Disclaimer. Logstash About the Tutorial is an open-source, centralized, events and logging manager. It is a part of the ELK (ElasticSearch,, Kibana) stack. In this tutorial, we will understand the basics of, its features,

More information

CNIT 121: Computer Forensics. 9 Network Evidence

CNIT 121: Computer Forensics. 9 Network Evidence CNIT 121: Computer Forensics 9 Network Evidence The Case for Network Monitoring Types of Network Monitoring Types of Network Monitoring Event-based alerts Snort, Suricata, SourceFire, RSA NetWitness Require

More information

Virtual Box Build Guide May Doc Version 2.0

Virtual Box Build Guide May Doc Version 2.0 Virtual Box Build Guide May 2018 Doc Version 2.0 1 TABLE OF CONTENTS 1 Authors Preface... 3 2 Introduction... 4 3 Build Installation Architecture Overview... 5 4 V3 Happy Snap Features... 6 5 Configuration

More information

BPPM Patrol Agent Installation Steps on Linux and Automation Integration

BPPM Patrol Agent Installation Steps on Linux and Automation Integration BPPM Patrol Agent Installation Steps on Linux and Automation Integration Author: Karlis Peterson, Software Consultant, BMC Software Version: 1.0 Date: May 12, 2013 DISCLAIMER NOTICE This is Field Developed

More information

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version... Contents Note: pay attention to where you are........................................... 1 Note: Plaintext version................................................... 1 Hello World of the Bash shell 2 Accessing

More information

Take Your SIEM to the Next Level with 3rd Party Tools and Scripts

Take Your SIEM to the Next Level with 3rd Party Tools and Scripts Take Your SIEM to the Next Level with 3rd Party Tools and Scripts SIEM & Tactical Analytics SUMMIT November 2017 Who Am I? Austin Taylor Chief Security Research Engineer @ IronNet Cybersecurity Cyber Warfare

More information

Eucalyptus User Console Guide

Eucalyptus User Console Guide Eucalyptus 3.4.1 User Console Guide 2013-12-11 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...5 Install the Eucalyptus User Console...6 Install on Centos / RHEL 6.3...6 Configure

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

VM Build Guide May Doc Version 2.0

VM Build Guide May Doc Version 2.0 VM Build Guide May 2018 Doc Version 2.0 1 TABLE OF CONTENTS 1 Authors Preface... 3 2 Introduction... 4 3 Build Installation Architecture Overview... 5 4 Version 3 Happy Snap Features... 6 5 Configuration

More information

AWS Deployment Guide. for Version

AWS Deployment Guide. for Version for Version 10.6.4 Contact Information RSA Link at https://community.rsa.com contains a knowledgebase that answers common questions and provides solutions to known problems, product documentation, community

More information

Open Source Database Performance Optimization and Monitoring with PMM. Fernando Laudares, Vinicius Grippa, Michael Coburn Percona

Open Source Database Performance Optimization and Monitoring with PMM. Fernando Laudares, Vinicius Grippa, Michael Coburn Percona Open Source Database Performance Optimization and Monitoring with PMM Fernando Laudares, Vinicius Grippa, Michael Coburn Percona Fernando Laudares 2 Vinicius Grippa 3 Michael Coburn Product Manager for

More information

Table of Contents. Table of Contents License server installation guide - Linux. Download SCL

Table of Contents. Table of Contents License server installation guide - Linux. Download SCL Table of Contents Table of Contents License server installation guide - Linux Download SCL Download Synopsys Installer Install SCL - RHEL and CentOS Install SCL - Debian and Ubuntu Customizing the License

More information

Forescout. Configuration Guide. Version 3.5

Forescout. Configuration Guide. Version 3.5 Forescout Version 3.5 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Disclaimer: I haven t gone through RHCSA/RHCE EL 7. I am preparing for upgrade of my RHCE certificate from RHCE EL4 to RHCE EL7. I don

More information

Upgrade Guide. This document details the upgrade process for customers moving from the full version of OnApp Cloud v2.3.1 to v2.3.2.

Upgrade Guide. This document details the upgrade process for customers moving from the full version of OnApp Cloud v2.3.1 to v2.3.2. Upgrade Guide v2.3.2 This document details the upgrade process for customers moving from the full version of OnApp Cloud v2.3.1 to v2.3.2. It explains important changes to the backup system, network config

More information

Containers: Exploits, Surprises, And Security

Containers: Exploits, Surprises, And Security Containers: Exploits, Surprises, And Security with Elissa Shevinsky COO at SoHo Token Labs Editor of Lean Out #RVASec @ElissaBeth on twitter @Elissa_is_offmessage on Instagram this was Silicon Valley in

More information

Community Edition Getting Started Guide. July 25, 2018

Community Edition Getting Started Guide. July 25, 2018 Community Edition Getting Started Guide July 25, 2018 Copyright 2018 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the

More information

Network Security: Firewall, VPN, IDS/IPS, SIEM

Network Security: Firewall, VPN, IDS/IPS, SIEM Security: Firewall, VPN, IDS/IPS, SIEM Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Deploying the Cisco CSR 1000v on Amazon Web Services

Deploying the Cisco CSR 1000v on Amazon Web Services Deploying the Cisco CSR 1000v on Amazon Web Services This section contains the following topics: Prerequisites, page 1 Information About Launching Cisco CSR 1000v on AWS, page 1 Launching the Cisco CSR

More information

System Requirements ENTERPRISE

System Requirements ENTERPRISE System Requirements ENTERPRISE Hardware Prerequisites You must have a single bootstrap node, Mesos master nodes, and Mesos agent nodes. Bootstrap node 1 node with 2 cores, 16 GB RAM, 60 GB HDD. This is

More information

Red Hat Enterprise Linux Atomic Host 7 Getting Started with Cockpit

Red Hat Enterprise Linux Atomic Host 7 Getting Started with Cockpit Red Hat Enterprise Linux Atomic Host 7 Getting Started with Cockpit Getting Started with Cockpit Red Hat Atomic Host Documentation Team Red Hat Enterprise Linux Atomic Host 7 Getting Started with Cockpit

More information

Cloud Security Whitepaper

Cloud Security Whitepaper Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4

More information

2016 OPSWAT, Inc. All rights reserved. OPSWAT, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc.All other trademarks, trade names,

2016 OPSWAT, Inc. All rights reserved. OPSWAT, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc.All other trademarks, trade names, 2016 OPSWAT, Inc. All rights reserved. OPSWAT, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc.All other trademarks, trade names, service marks, service names, and images mentioned and/or

More information