- Instant OSSEC Host-based Intrusion Detection System
- Brad Lhotsky
- 198字
- 2021-08-13 16:28:00
How it works...
So, what just happened? There's a lot of output, so let's cover the highlights. The script configures and builds the OSSEC binaries. Once the compilation has completed, the OSSEC users and groups are created on the system if they do not exist. The OSSEC installation directory is created, and the binaries and configuration files we complied are copied into their permanent location on the filesystem. The script then verifies and repairs permissions in the OSSEC installation directory to ensure a working installation. If everything completes successfully, the last step starts the OSSEC daemons and begins analyzing your logs.
It's important that system administrators are aware of the user and group creation as they might be utilizing configuration management software and may wish to create the users and groups prior to running the installation script. The users created are:
ossec
: This is the default OSSEC userossecm
: This is the OSSEC mailer daemonossecr
: This is the OSSEC remote daemon
A single group named ossec
containing all these users is also created.
The end result of the process is a default configuration of OSSEC. By now, OSSEC is already gathering log data and analyzing your filesystem.
- CTF實戰:技術、解題與進階
- SASE原理、架構與實踐
- Practical Network Scanning
- CSO進階之路:從安全工程師到首席安全官
- 計算機網絡安全基礎(第5版)
- 從實踐中學習Kali Linux滲透測試
- Building a Home Security System with BeagleBone
- 學電腦安全與病毒防范
- 信息技術基礎:提高篇·實驗與習題
- Hands-On Artificial Intelligence for Cybersecurity
- 黑客攻防與電腦安全從新手到高手(超值版)
- Metasploit 5.0 for Beginners
- 網絡安全設計
- CCNA Security 210-260 Certification Guide
- Web安全之機器學習入門