Title
Introductions
Mark Allen
Technical Sales Engineer
Garrett Gross
Sr. Technical PMM
Resources for OSSIM Users
AlienVault Forums:
https://www.alienvault.com/forums/discussions/tagged/ossim
LinkedIn Group: https://www.linkedin.com/groupInvitation?gid=3793
USM & OSSIM On-Demand Training Archives:
https://www.alienvault.com/product-training
AlienVault Blog – Analysis from the AlienVault Labs research team, practical
tips to secure your environment & industry trends
Agenda
How to deploy & configure OSSEC agents
Best practices for configuring syslog and
enabling plugins
Scanning your network for assets and
vulnerabilities
Lets get started!
Host IDS Configuration
OSSIM comes with OSSEC host-based IDS, which
provides:
• Log monitoring and collection
• Rootkit detection
• File integrity checking
• Windows registry integrity checking
• Active response
OSSEC uses authenticated server/agent architecture.
Host IDS
OSSIM Sensor
OSSEC Server
Servers
OSSEC Agent
OSSIM Server
UDP 1514
Normalized events
Deploying HIDS
1. Add an agent in OSSIM
2. Deploy HIDS agent to the target system.
3. Optionally change configuration file on the agent.
4. Verify HIDS operations.
Add an
agent.
Save agent.
Specify name
and IP address.
Add Agent in OSSIM
Required task for
all operating
systems
Can also be
added through the
manage_agents
script
Environment > Detection > HIDS > Agents
Specify domain, username and
password of the target system.
Download preconfigured
agent for Windows.
Automatic deployment
for Windows.
Extract key.
Deploy HIDS Agent to Target System
Automated
deployment for
Windows
machines
Manual
installation for
other OS
Key extraction
is required for
manual
installation
Configuration
file.
Log
file.
Change Configuration File on Agent
OSSEC
configuration is
controlled by a
text file.
Agent needs to
be restarted after
configuration
changes.
Log file is
available for
troubleshooting.
Agent status
should be active.
Verify HIDS Operations
Displays overview of
OSSEC events and
agent information
Environment > Detection > HIDS > Overview
OSSEC events.
Verify HIDS Operations (Cont.)
Verify if OSSEC events
are displayed in the
SIEM console.
Utilize search filter to
display only events
from OSSEC data
source.
Analysis > Security Events (SIEM) > SIEM
Verify HIDS Operations (Cont.)
Environment > Detection > HIDS > Agents > Agent Control
Verify registry
integrity.
Verify presence
of rootkits.
Verify file
integrity.
Syslog & Plugins
Syslog Forwarding
Syslog configuration will vary based on
source device/application but, usually,
the necessary parameters are:
• Destination IP
• Source IP
• Port (default is UDP 514)
Enabling Plugins
Enable plugin at the
asset level
General > Plugins > Edit
Plugins
Green light under
“Receiving Data” will
confirm successful log
collection
Vulnerability Assessment
Vulnerability Assessment
Uses a built-in OpenVAS scanner
Detects vulnerabilities in assets
• Vulnerabilities are correlated with
events‘ cross-correlation rules
• Useful for compliance reports and
auditing
Managed from the central SIEM
console:
• Running and scheduling
vulnerability scans
• Examining reports
• Updating vulnerability signatures
Advanced Options
Vulnerability assessment can be:
• Authenticated (SSH and SMB)
• Unauthenticated
Predefined profiles can be selected:
• Non destructive full and slow scan
• Non destructive full and fast scan
• Full and fast scan including destructive tests
Custom profiles can be created.
Vulnerability Assessment Config
1. (Optionally) tune global vulnerability assessment settings.
2. (Optionally) create a set of credentials.
3. (Optionally) create a scanning profile.
4. Create a vulnerability scan job.
5. Examine scanning results.
6. Optionally create a vulnerability or compliance report.
Update
configuration.
Select vulnerability
ticket threshold.
Tune Global Vulnerability Assessment Settings
The vulnerability
assessment
system opens a
ticket for found
vulnerabilities.
Start with a high
threshold and fix
important
vulnerabilities first.
Configuration > Administration > Main
Specify login
username.
Specify credential
set name.
Select
authentication type.
Click settings.
Create Set of Credentials
Used to log into a
machine for
authenticated scan
Supports the
DOMAIN/USER
username
Environment > Vulnerabilities > Overview
Examine 3 default
profiles.
Enable/disable
plugin family.
Create a
new profle.
Edit profiles.
Create Scanning Profile
Enable profiles that
apply to assets you
are scanning.
Environment > Vulnerabilities > Overview
Create a new
scan job.
Import Nessus
scan report.
Select schedule
method.
Specify scan
job name.
Select profile.
Select server.
Select assets.
Select credential set for
authenticated scan.
Save job.
Create Vulnerability Scan Job
Environment > Vulnerabilities > Scan Jobs
Examine vulnerability
statistics.
View vulnerability
report for all assets.
Examine reports for
all scan jobs.
Examine Vulnerabilities Results
Environment > Vulnerabilities > Overview
OSSIM vs. USM
How is USM different?
Correlation Directives: Over 2,000 built-in correlation directives developed by the
AlienVault Labs Threat Research Team, and updated weekly
Reporting: 150+ Customizable Reports, including compliance-specific reports
Log Management: Robust Log Management, Log Search & Long-Term Log
Retention
Professional Support via phone & email as well as customer support portal
And more…view comparison chart here:
https://www.alienvault.com/products/compare-ossim-to-alienvault-usm
“I started out with OSSIM and I didn’t fully realize how much value I would get out of USM until I started using it.
The reporting is awesome, it’s been a big benefit for me. And, having a fully supported solution means I can get
answers to my questions much more quickly than before.”
– Matthew Frederickson, Director of Information Technology, Council Rock School District
USM + Free Installation Services
http://www.alienvault.com/marketing/smb-bundles
888.613.6023
ALIENVAULT.COM
CONTACT US
HELLO@ALIENVAULT.COM
Now for some Q&A
Resources for OSSIM Users
OSSIM vs. USM Comparison Chart
https://www.alienvault.com/products/compare-ossim-to-alienvault-usm
AlienVault Forum
https://www.alienvault.com/forums/discussions/tagged/ossim
LinkedIn Group
https://www.linkedin.com/groupInvitation?gid=3793
Subscribe to the AlienVault Blog
https://www.alienvault.com/blogs
Hands-on 5-day Training Classes, in-person or “Live on-line”
https://www.alienvault.com/support/classroom-training

More Related Content

PPTX
Splunk Overview
PDF
Splunk-Presentation
PPTX
Splunk Architecture
PPTX
Splunk Enterprise Security
PPT
SOC presentation- Building a Security Operations Center
PDF
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
 
PPTX
Azure Security Center- Zero to Hero
Splunk Overview
Splunk-Presentation
Splunk Architecture
Splunk Enterprise Security
SOC presentation- Building a Security Operations Center
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
 
Azure Security Center- Zero to Hero

What's hot (20)

PPTX
Beginner's Guide to SIEM
PPTX
Splunk for IT Operations
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PDF
Sécurité informatique - Etat des menaces
PPTX
Using a secured, cloud-delivered SD-WAN to transform your business network
PDF
Microsoft Defender and Azure Sentinel
PDF
SIEM Architecture
PPTX
Creating Correlation Rules in AlienVault
PPTX
Zero Trust Network Access
PDF
Azure Security Overview
PDF
Azure Monitoring Overview
PDF
Splunk
PPT
Ch04 Network Vulnerabilities and Attacks
PPTX
network monitoring system ppt
PDF
Vulnerability and Patch Management
PDF
Network Access Control (NAC)
PPTX
Federated Cloud Computing
PPTX
Splunk overview
PPTX
Splunk for Enterprise Security and User Behavior Analytics
PPTX
What the auditor need to know about cloud computing
Beginner's Guide to SIEM
Splunk for IT Operations
Adopting A Zero-Trust Model. Google Did It, Can You?
Sécurité informatique - Etat des menaces
Using a secured, cloud-delivered SD-WAN to transform your business network
Microsoft Defender and Azure Sentinel
SIEM Architecture
Creating Correlation Rules in AlienVault
Zero Trust Network Access
Azure Security Overview
Azure Monitoring Overview
Splunk
Ch04 Network Vulnerabilities and Attacks
network monitoring system ppt
Vulnerability and Patch Management
Network Access Control (NAC)
Federated Cloud Computing
Splunk overview
Splunk for Enterprise Security and User Behavior Analytics
What the auditor need to know about cloud computing
Ad

Similar to Best Practices for Configuring Your OSSIM Installation (20)

PDF
Creating a Single View Part 3: Securing Your Deployment
PPTX
Webinar: Creating a Single View: Securing Your Deployment
PDF
DevOps and CI/CD Security-Best-Practices
PPTX
SSecuring Your MongoDB Deployment
PPTX
Cloud Application Security: Lessons Learned
PDF
4 florin coada - dast automation, more value for less work
PDF
ISACA -Threat Hunting using Native Windows tools .pdf
PPTX
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PPS
Security testing
PPTX
Cloud Application Security: Lessons Learned
PPTX
Introduction to cyber security three .pptx
PDF
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
PPT
Securing the Cloud
PPTX
Overcoming Security Challenges in DevOps
PDF
DEFCON 23 - Nir Valtman and Moshe Ferber - from zero to secure in 1
PPTX
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
PDF
Azure Saturday: Security + DevOps + Azure = Awesomeness
PDF
5 howtomitigate
PDF
Security Framework from SANS
Creating a Single View Part 3: Securing Your Deployment
Webinar: Creating a Single View: Securing Your Deployment
DevOps and CI/CD Security-Best-Practices
SSecuring Your MongoDB Deployment
Cloud Application Security: Lessons Learned
4 florin coada - dast automation, more value for less work
ISACA -Threat Hunting using Native Windows tools .pdf
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
Security testing
Cloud Application Security: Lessons Learned
Introduction to cyber security three .pptx
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
Securing the Cloud
Overcoming Security Challenges in DevOps
DEFCON 23 - Nir Valtman and Moshe Ferber - from zero to secure in 1
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Azure Saturday: Security + DevOps + Azure = Awesomeness
5 howtomitigate
Security Framework from SANS
Ad

More from AlienVault (20)

PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PDF
Malware Invaders - Is Your OS at Risk?
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PPTX
Simplify PCI DSS Compliance with AlienVault USM
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PDF
Insider Threat Detection Recommendations
PPTX
Alienvault threat alerts in spiceworks
PDF
Open Source IDS Tools: A Beginner's Guide
PPTX
Malware detection how to spot infections early with alien vault usm
PDF
Security operations center 5 security controls
PDF
PCI DSS Implementation: A Five Step Guide
PPTX
Improve threat detection with hids and alien vault usm
PDF
The State of Incident Response - INFOGRAPHIC
PPTX
Incident response live demo slides final
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PPTX
How Malware Works
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Malware Invaders - Is Your OS at Risk?
How to Solve Your Top IT Security Reporting Challenges with AlienVault
Simplify PCI DSS Compliance with AlienVault USM
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Insider Threat Detection Recommendations
Alienvault threat alerts in spiceworks
Open Source IDS Tools: A Beginner's Guide
Malware detection how to spot infections early with alien vault usm
Security operations center 5 security controls
PCI DSS Implementation: A Five Step Guide
Improve threat detection with hids and alien vault usm
The State of Incident Response - INFOGRAPHIC
Incident response live demo slides final
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Security Visibility with AlienVault USM Correlation Directives
How Malware Works
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
AWS Security Best Practices for Effective Threat Detection & Response

Recently uploaded (20)

PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PPT
Geologic Time for studying geology for geologist
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Five Habits of High-Impact Board Members
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Module 1 Introduction to Web Programming .pptx
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Internet of Everything -Basic concepts details
OpenACC and Open Hackathons Monthly Highlights July 2025
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Geologic Time for studying geology for geologist
Enhancing plagiarism detection using data pre-processing and machine learning...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Five Habits of High-Impact Board Members
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
The influence of sentiment analysis in enhancing early warning system model f...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Basics of Cloud Computing - Cloud Ecosystem
Consumable AI The What, Why & How for Small Teams.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Module 1 Introduction to Web Programming .pptx
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Comparative analysis of machine learning models for fake news detection in so...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
A review of recent deep learning applications in wood surface defect identifi...
Internet of Everything -Basic concepts details

Best Practices for Configuring Your OSSIM Installation

  • 2. Introductions Mark Allen Technical Sales Engineer Garrett Gross Sr. Technical PMM
  • 3. Resources for OSSIM Users AlienVault Forums: https://www.alienvault.com/forums/discussions/tagged/ossim LinkedIn Group: https://www.linkedin.com/groupInvitation?gid=3793 USM & OSSIM On-Demand Training Archives: https://www.alienvault.com/product-training AlienVault Blog – Analysis from the AlienVault Labs research team, practical tips to secure your environment & industry trends
  • 4. Agenda How to deploy & configure OSSEC agents Best practices for configuring syslog and enabling plugins Scanning your network for assets and vulnerabilities
  • 7. OSSIM comes with OSSEC host-based IDS, which provides: • Log monitoring and collection • Rootkit detection • File integrity checking • Windows registry integrity checking • Active response OSSEC uses authenticated server/agent architecture. Host IDS OSSIM Sensor OSSEC Server Servers OSSEC Agent OSSIM Server UDP 1514 Normalized events
  • 8. Deploying HIDS 1. Add an agent in OSSIM 2. Deploy HIDS agent to the target system. 3. Optionally change configuration file on the agent. 4. Verify HIDS operations.
  • 9. Add an agent. Save agent. Specify name and IP address. Add Agent in OSSIM Required task for all operating systems Can also be added through the manage_agents script Environment > Detection > HIDS > Agents
  • 10. Specify domain, username and password of the target system. Download preconfigured agent for Windows. Automatic deployment for Windows. Extract key. Deploy HIDS Agent to Target System Automated deployment for Windows machines Manual installation for other OS Key extraction is required for manual installation
  • 11. Configuration file. Log file. Change Configuration File on Agent OSSEC configuration is controlled by a text file. Agent needs to be restarted after configuration changes. Log file is available for troubleshooting.
  • 12. Agent status should be active. Verify HIDS Operations Displays overview of OSSEC events and agent information Environment > Detection > HIDS > Overview
  • 13. OSSEC events. Verify HIDS Operations (Cont.) Verify if OSSEC events are displayed in the SIEM console. Utilize search filter to display only events from OSSEC data source. Analysis > Security Events (SIEM) > SIEM
  • 14. Verify HIDS Operations (Cont.) Environment > Detection > HIDS > Agents > Agent Control Verify registry integrity. Verify presence of rootkits. Verify file integrity.
  • 16. Syslog Forwarding Syslog configuration will vary based on source device/application but, usually, the necessary parameters are: • Destination IP • Source IP • Port (default is UDP 514)
  • 17. Enabling Plugins Enable plugin at the asset level General > Plugins > Edit Plugins Green light under “Receiving Data” will confirm successful log collection
  • 19. Vulnerability Assessment Uses a built-in OpenVAS scanner Detects vulnerabilities in assets • Vulnerabilities are correlated with events‘ cross-correlation rules • Useful for compliance reports and auditing Managed from the central SIEM console: • Running and scheduling vulnerability scans • Examining reports • Updating vulnerability signatures
  • 20. Advanced Options Vulnerability assessment can be: • Authenticated (SSH and SMB) • Unauthenticated Predefined profiles can be selected: • Non destructive full and slow scan • Non destructive full and fast scan • Full and fast scan including destructive tests Custom profiles can be created.
  • 21. Vulnerability Assessment Config 1. (Optionally) tune global vulnerability assessment settings. 2. (Optionally) create a set of credentials. 3. (Optionally) create a scanning profile. 4. Create a vulnerability scan job. 5. Examine scanning results. 6. Optionally create a vulnerability or compliance report.
  • 22. Update configuration. Select vulnerability ticket threshold. Tune Global Vulnerability Assessment Settings The vulnerability assessment system opens a ticket for found vulnerabilities. Start with a high threshold and fix important vulnerabilities first. Configuration > Administration > Main
  • 23. Specify login username. Specify credential set name. Select authentication type. Click settings. Create Set of Credentials Used to log into a machine for authenticated scan Supports the DOMAIN/USER username Environment > Vulnerabilities > Overview
  • 24. Examine 3 default profiles. Enable/disable plugin family. Create a new profle. Edit profiles. Create Scanning Profile Enable profiles that apply to assets you are scanning. Environment > Vulnerabilities > Overview
  • 25. Create a new scan job. Import Nessus scan report. Select schedule method. Specify scan job name. Select profile. Select server. Select assets. Select credential set for authenticated scan. Save job. Create Vulnerability Scan Job Environment > Vulnerabilities > Scan Jobs
  • 26. Examine vulnerability statistics. View vulnerability report for all assets. Examine reports for all scan jobs. Examine Vulnerabilities Results Environment > Vulnerabilities > Overview
  • 28. How is USM different? Correlation Directives: Over 2,000 built-in correlation directives developed by the AlienVault Labs Threat Research Team, and updated weekly Reporting: 150+ Customizable Reports, including compliance-specific reports Log Management: Robust Log Management, Log Search & Long-Term Log Retention Professional Support via phone & email as well as customer support portal And more…view comparison chart here: https://www.alienvault.com/products/compare-ossim-to-alienvault-usm “I started out with OSSIM and I didn’t fully realize how much value I would get out of USM until I started using it. The reporting is awesome, it’s been a big benefit for me. And, having a fully supported solution means I can get answers to my questions much more quickly than before.” – Matthew Frederickson, Director of Information Technology, Council Rock School District
  • 29. USM + Free Installation Services http://www.alienvault.com/marketing/smb-bundles
  • 30. 888.613.6023 ALIENVAULT.COM CONTACT US [email protected] Now for some Q&A Resources for OSSIM Users OSSIM vs. USM Comparison Chart https://www.alienvault.com/products/compare-ossim-to-alienvault-usm AlienVault Forum https://www.alienvault.com/forums/discussions/tagged/ossim LinkedIn Group https://www.linkedin.com/groupInvitation?gid=3793 Subscribe to the AlienVault Blog https://www.alienvault.com/blogs Hands-on 5-day Training Classes, in-person or “Live on-line” https://www.alienvault.com/support/classroom-training