- Instant OSSEC Host-based Intrusion Detection System
- Brad Lhotsky
- 162字
- 2021-08-13 16:28:01
How it works...
The simple configuration options we've specified for our server simply enable the secure communication over the UDP port 1514 between OSSEC clients and the server. We also configured the server to accept connections from our internal networks.
The best practice is to whitelist any IP addresses of potential agents as well as any known external business-critical resources. By whitelisting critical resources, we can ensure that OSSEC never interrupts service to those resources. Any resource that is critical in an emergency should be whitelisted, which is why we have whitelisted the external mail server.
Imagine being under attack and suddenly losing access to e-mail! The last two blocks configure OSSEC to send an e-mail on our network. If we need a specific SMTP server, we can tweak it here. Once we have our e-mail configured, we establish the thresholds for alerting at events whose level is 7
or higher. We will log any events whose level is 1
or higher.
- Android應用安全實戰(zhàn):Frida協議分析
- 網絡空間攻防技術原理
- Kali Linux Social Engineering
- API安全實戰(zhàn)
- 腦洞大開:滲透測試另類實戰(zhàn)攻略
- 網絡安全應急管理與技術實踐
- 特種木馬防御與檢測技術研究
- Testing and Securing Android Studio Applications
- Spring Security(Third Edition)
- 網絡安全與攻防入門很輕松(實戰(zhàn)超值版)
- 網絡安全大數據分析與實戰(zhàn)
- Hands-On Artificial Intelligence for Cybersecurity
- INSTANT Kali Linux
- 網絡安全攻防技術實戰(zhàn)
- 大數據時代的智慧城市與信息安全