Accenture MDR Quick Start Guide for OSSEC
This quick start guide will help Accenture MDR customers configure OSSEC to send logs to the Log collection Platform (LCP).
The document includes the following topics:
Supported Versions
A list of supported versions is available in the Accenture MDR Supported Products List document (Accenture_MDR_Supported_Products_List.xlsx) which can be found in
Accenture MDR Portal - https://mss.accenture.com/PortalNextGen/Reports/Documents
Port Requirements
Table 1-1: Port requirements for LCP communication.
Source | Destination | Port | Description |
OSSEC server | LCP | 514 (UDP) or 601 (TCP) | Default port |
Configuring OSSEC
The syslog output allows an OSSEC manager to send OSSEC alerts to the LCP server. As OSSEC sends alerts via syslog, these options are only for server or local installations.
Note: OSSEC supports only Linux/Mac/Solaris for server. Syslog configurations should be done only on the server. OSSEC supports Windows systems as agents not as servers.
To configure OSSEC, follow the steps below:
Login to the server by the SSH console with a root user, on which OSSEC Server (Manager) is installed.
2. Open the OSSEC configuration using the path: /var/ossec/etc/ossec.conf
3. Append the following syslog configuration module: (the sample can be found in /var/ossec/etc/ossec.conf.sample)
<syslog_output>
<server><LCP/Syslog Server IP></server>
<port>514</port>
<format>cef</format>
</syslog_output>
4. By Default, OSSEC monitors the below locations for logs:
/var/log/messages
/var/log/authlog
/var/log/xferlog
/var/log/maillog
/var/www/logs/access_log
/var/www/logs/error_log
You can add entries for specific log files which are to be monitored on OSSEC server/agent.
Example entries for OSSEC system events and active response alerts in /var/ossec/etc/ossec.conf are as follows:
<localfile>
<location>/var/ossec/logs/ossec.log</location>
<log_format>syslog</log_format>
</localfile>
<localfile>
<location>/var/ossec/logs/active-responses.log</location>
<log_format>syslog</log_format>
</localfile>
5. For specific log monitoring on agent computers, location entries should be added to the client’s (where agent is installed) configuration file, that is at/var/ossec/etc/ossec.conf, same as the server’s configuration mentioned in Step4.
6. After this change has been made, the client-syslog process should be enabled using the command: # /var/ossec/bin/ossec-control enable client-syslogFinally restart the OSSEC processes using the command: # /var/ossec/bin/ossec-control restart
LCP Configuration Parameters
Table 1-2: The OSSEC event collector(Syslog-3770) properties to be configured by MDR are shown in the table.
Property | Default value | Description |
Protocol | UDP | The default protocol for syslog. The collector can also accept logs in TCP. |
IP Addresses | OSSEC server interface IP address | Logging device IP address mentioned in the Pre-Installation Questionnaire (PIQ). Note: If the device sends logs using multiple interfaces, contact the Accenture MDR onboarding team. |
Signatures | Trend Micro Inc.|OSSEC HIDS | MDR recommended signatures processed by the OSSEC event collector. |
Port Number | 514 | The default port number for syslog. For TCP, the default port is 601. Note: The LCP can be configured to listen on a non-standard port, please advise the Accenture MDR onboarding team if this is a requirement. |
Legal Notice
Copyright © 2021 Accenture. All rights reserved.
Accenture, the Accenture Logo, and DeepSight Intelligence are trademarks or registered trademarks of Accenture in the U.S. and other countries. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Accenture and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. ACCENTURE SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Accenture as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.