- Instant OSSEC Host-based Intrusion Detection System
- Brad Lhotsky
- 162字
- 2021-08-13 16:28:01
How it works...
The simple configuration options we've specified for our server simply enable the secure communication over the UDP port 1514 between OSSEC clients and the server. We also configured the server to accept connections from our internal networks.
The best practice is to whitelist any IP addresses of potential agents as well as any known external business-critical resources. By whitelisting critical resources, we can ensure that OSSEC never interrupts service to those resources. Any resource that is critical in an emergency should be whitelisted, which is why we have whitelisted the external mail server.
Imagine being under attack and suddenly losing access to e-mail! The last two blocks configure OSSEC to send an e-mail on our network. If we need a specific SMTP server, we can tweak it here. Once we have our e-mail configured, we establish the thresholds for alerting at events whose level is 7
or higher. We will log any events whose level is 1
or higher.
- Android應用安全實戰:Frida協議分析
- 攻守道:企業數字業務安全風險與防范
- 工業互聯網安全防護與展望
- 網絡安全保障能力研究
- Applied Network Security
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 網絡用戶行為的安全可信分析與控制
- 電腦安全與攻防入門很輕松(實戰超值版)
- Bug Bounty Hunting Essentials
- 白話零信任
- 聯邦學習原理與算法
- 隱私保護機器學習
- CTF網絡安全競賽入門教程
- 黑客攻防從入門到精通:絕招版(第2版)