- Instant OSSEC Host-based Intrusion Detection System
- Brad Lhotsky
- 198字
- 2021-08-13 16:28:00
How it works...
So, what just happened? There's a lot of output, so let's cover the highlights. The script configures and builds the OSSEC binaries. Once the compilation has completed, the OSSEC users and groups are created on the system if they do not exist. The OSSEC installation directory is created, and the binaries and configuration files we complied are copied into their permanent location on the filesystem. The script then verifies and repairs permissions in the OSSEC installation directory to ensure a working installation. If everything completes successfully, the last step starts the OSSEC daemons and begins analyzing your logs.
It's important that system administrators are aware of the user and group creation as they might be utilizing configuration management software and may wish to create the users and groups prior to running the installation script. The users created are:
ossec
: This is the default OSSEC userossecm
: This is the OSSEC mailer daemonossecr
: This is the OSSEC remote daemon
A single group named ossec
containing all these users is also created.
The end result of the process is a default configuration of OSSEC. By now, OSSEC is already gathering log data and analyzing your filesystem.
- Learning Python for Forensics
- 等級保護測評理論及應用
- 計算機病毒原理與防范(第2版)
- 網絡安全能力成熟度模型:原理與實踐
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- SQL Injection Strategies
- 電腦安全與攻防入門很輕松(實戰超值版)
- 網絡安全大數據分析與實戰
- 黑客攻防實戰從入門到精通
- Cybersecurity Threats,Malware Trends,and Strategies
- Web安全攻防從入門到精通
- 數字銀行安全體系構建
- 隱私保護機器學習
- 動態賦能網絡空間防御
- Hands-On Bug Hunting for Penetration Testers