Comment on page
OSSEC Variants (OSSEC/WAZUH/ATOMIC)
Apica Ascent supports ingesting security events logs directly from OSSEC compatible agents. OSSEC (Open Source Security) is a powerful, open-source host-based intrusion detection system (HIDS) developed to detect and prevent malicious activities on systems. It has the ability to monitor all types of environments, including Windows, Mac OS X, Linux and Solaris systems. OSSEC works by monitoring the system.
The OSSEC architecture consists of three main components: the manager, the agent, and the local OSSEC server.
The manager is responsible for managing the agents, which monitor system activity and report back to the manager. The manager then compiles the agent reports, combines them with its own rules and tests, and alerts if there are any security issues.
The agents watch files, directories and network connections for changes or anomalies in data flow that could signify a malicious attack. Agents can detect attacks from worms, viruses, hacking tools, and more. The agent also looks for any unauthorized changes to critical system files or configurations that could indicate an attempted breach of security.
The local OSSEC server is responsible for analyzing the data from the agents and taking appropriate action depending on the type of attack detected. This can involve sending out alerts, blocking traffic, performing forensic analysis, and more.
OSSEC is an incredibly powerful tool that can be used to detect and prevent malicious activities on systems. It is an invaluable asset for any organization looking to secure their networks from threats both outside and within the company.
Apica Ascent takes over the functions of the manager and the local OSSEC server and makes it easy to bring together security related events into your data fabric for instant consumption.
Launching the Apica Ascent OSSEC components is accomplished by launching the OSSEC Input "App Extension" which can be found under "Explore"
Launch the OSSEC HIDS components in Apica Ascent
You can now provide the credentials that the agents can use to connect to Apica Ascent instance
OSSEC Agent auth token
- HostName - Enter a name for the app extension.
- AuthToken - The user chooses a 32-digit hex number, for example '2DAEF3165265A....FB793126B780BA4'.
- Resources - The user enters CPU and MEM usage limit, format adopted from Kubernetes resource notation - see explanation here, https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ Example setting,
cpu/cpu_limit = 1000m,
Shortly after the user configures all of the above, he will see the assigned manager IP address appears in the display below. This IP is needed for setting up the agent next.
OSSEC Manager Configuration Display
OSS (open source software) OSSEC/Automic agent variation Wazuh agent is used for capturing host observability data. Wazuh agent is better than the OSSEC agent in terms of performance, functionality and scalability. Wazuh agent has a better rules engine that is more efficient for large-scale deployments. It also offers enhanced logging capabilities with the ability to tag events and generate alerts in real-time. Furthermore, Wazuh can collect data from multiple sensors, such as Windows hosts, Linux systems, cloud platforms, and network devices.
Wazuh agent can easily be installed on both Linux and Windows platforms. Please follow the simple installation steps below,
OSSEC/Automic OSS agent variation Wazuh agents can connect to the Apica Ascent instance using the agent-auth tool once after successfully installed. For Debian-style Linux distribution, the command below is used to link the agent to the manager.
sudo /var/ossec/bin/agent-auth -m <manager IP address> -p 1515 -P <AuthToken> -A <user-assigned agent name>
Windows system runs similarly from cmd or power shell window with Administrator privileges.
PS C:\Program Files (x86)\ossec-agent> .\agent-auth.exe -m <manager IP address> -p 1515 -P <AuthToken> -A <user-assigned agent name>
Wazuh agent supports automatic vulnerability scans, file integrity monitoring, and policy compliance features. With the Apica Ascent server manager activated, the platform will provide comprehensive visibility across the entire environment with centralized management of security policies and events.