All notable changes to this project will be documented in this file.
- Added new rules to support the new Windows eventchannel decoder. (#247)
- Extend Auditd decoder to support more fields. (#256)
- Added rule to alert when an agent is removed. (#2127)
- Now CDB lists are not prebuilt in the repository. (#249)
There are no changes for Wazuh Ruleset in this version.
- New Vulnerability detector rules to warn about version comparison issues. (#237)
- osquery: Rename alerts fields reference. (#196)
- update_ruleset is not available in worker nodes. (#225)
- Update composite rules to match only same_source_ip events. (#161)
- Fixed active response decoder in order to match with different dates. (#223)
- Removed deprecated rules for Syscheck.
- Silence rule about full disk for SNAP partitions. (#183)
- Fixed login abortion log mismatch in Dovecot decoder when optional parameter didn't appear. (#171)
- Fixed decoder for Debian packages. (#172)
- Fixed active response decoder. (#179)
- Rules for the new osquery integration.
- Rule to ignore syscollector events.
- CIS-CAT rules improved.
- Rules and decoders for the new Kaspersky integration.
- CIS rootchecks for Windows 2012 R2 (by @Bob-Andrews).
- Extract port name for Sysmon event 3. (#127)
- Improve Shellshock detection. (#115)
- Decreased agent upgrade failure rules level.
- Windows rules: Fix SID syntax for group membership changes. (#125).
- Windows decoders: Match "Subject :" format (#128).
- Decoder for syscheck integration with audit.
- Removed offset of the
frequency
attribute in rules. (#145)
- Rule to detect when agents are unable to unmerge shared files. (#143)
There are no changes for Wazuh Ruleset in this version.
There are no changes for Wazuh Ruleset in this version.
- GDPR (General Data Protection Regulation) mapping.
- Improve GeoIP and composite rule support for AWS events.
- Pfsense rules.
- Error handling in update ruleset script using python3.
- Syntax error in cis_rhel7_linux_rcl.txt.
- OpenLDAP decoders to extract the IP address properly.
- Owncloud rules compatible with JSON logs.
- Postfix decoders and rules.
- Sendmail decoders to extract the IP address properly.
- False positives in SLES 11 rootchecks.
- Removed alert_by_email for rule 1002 and 9704.
- OpenVAS decoders and rules.
- Pfsense decoders.
- Mysql rules for Percona and Mcafee.
- MariaDB decoders and rules.
- Added rootcheck file for apache 2.2/2.4 (by @Bob-Andrews).
- Rules to detect USB devices disconnected.
- Silence rules about OpenSCAP and CIS-CAT scan status.
- Add compatibility between versions for CIS-CAT rules.
- Sudo decoders extract commands with spaces.
- Added new rules for Vulnerability detector.
- Removed svchost.exe and inetsrv.exe processes checking outside SysNative due to false positive.
- Fixed
update_ruleset
script.
- New rules for VULS integration
- New rules for CIS-CAT integration
- New features for "update_ruleset.py": custom URL and branch name
- New users added to list of known malicious user agents
- OwnCloud (Rules and decoders)
- Updated scap content from https://github.com/OpenSCAP/scap-security-guide
- Rules for VirusTotal integration
- Add GPG13 mappings to rules (gpg13.com)
- Removed "MJ12bot" from list of known malicious user agents
- SSH decoders
- OpenVPN decoders
- RoundCube (Rules and decoders)
- Decoders and rules for anti-flooding mechanism
- Fixed Windows decoders to extract the proper fields
- Rules/decoders:
- Microsoft Windows Defender
- Microsoft log related events
- Microsoft SQL Server
- Identity guard
- Sysmon events 11 and 15
- MongoDB
- Docker
- Jenkins
- AWS S3
- update_ruleset.py accepts a custom download URL
- web-accesslog_decoders.xml
- Amazon rules
- Rootcheck references
- Sysmon uses dynamic fields
- getawslog.py: Ignore digest files
- Fortigate decoders
- Apache decoders
- Bug in update_ruleset.py
- Netstat command
- SSH rootchecks
- Rules/decoders:
- OpenSCAP
- Switch HP 5500
- Chrome Remote Desktop
- Fortigate
- OpenVPN
- ModSecurity for Nginx
- Barracuda
- OpenWRT
- RSA Authentication Manager
- Imperva
- Sophos
- FreeIPA
- Cisco eStreamer
- Rootchecks:
- CIS SLES 11 and 12
- SCAP content
- cve-debian-oval.xml
- cve-redhat-6-ds.xml
- cve-redhat-7-ds.xml
- ssg-centos-6-ds.xml
- ssg-centos-7-ds.xml
- ssg-debian-8-ds.xml
- ssg-fedora-ds.xml
- ssg-rhel-6-ds.xml
- ssg-rhel-7-ds.xml
- ssg-ubuntu-1604-ds.xml
- ossec_ruleset.py renamed to update_ruleset.py with new features.
- New directory structure.
- Improvements in several decoders/rules.
- RH7 rootchecks.
- Improved getgetawslog.py.
- IP version-independent regexs.
- Decoders and rules for Amazon
- Amazon directory structure.
- Minor changes:
- Apache and Nginx rules.
- RH7 rootchecks.
- Redis decoders and rules.
- Rootchecks for RedHat 7.
- SUDO and SSH decoders.
- SSH and OSSEC rules.
- Minor changes in ossec_ruleset.py.
- Decoders and rules:
- ossec-auth
- OpenBSD SMTP
- SSH
- Postfix
- ossec_ruleset.py: Option -d to update the ruleset from local files.
- Apache Decoders
- getawslogs.py: Executing with standard users.
- Rules for Amazon VPC
- USB Decoder and Rules
- PCI Tagging for SSH rootchecks
- ossec_ruleset.py: New interface.
- Directory structure of Rootcheck
- Netscreen Firewall decoder
- Syntax error in rootchecks.
- ossec_ruleset.py:
- Problem with installation path
- New path: /var/ossec/**update/ruleset/**ossec_ruleset.py
- New Rootcheck: SSH Hardening
- New rules: ossec_ruleset.py rules
- Alerts related to the execution of script ossec_ruleset.py
- New rules and PCI Tagging for:
- Amazon IAM
- Amazon EC2
- ossec_ruleset.py:
- New format for ossec_ruleset.log
- New path: /var/ossec/updater/ruleset
- All files generated by the script are stored in this directory.
- We recommend this path to the script: /var/ossec/updater/ruleset/ossec_ruleset.py
- Amazon Decoders & Rules:
- EC2
- IAM
- Auditd Rules
- Shellshock rules
- New rules for sudo
- New rules for system
- New decoder: web-accesslog-iis-default decoder
- Folder tools:
- amazon: Script getawslog.py to download the JSON file from S3 Bucket.
- file-testing: Script file_test.py to check if a log file generates alerts
- rules-testing: Script runtests.py to run unitary tests. Created by OSSEC.
- Auditd Decoders
- Minor changes in some decoders and rules.
- Netscaler updated
- ossec_ruleset.py fixes
- Serv-U Decoders & Rules.
- Directory structure: Decoders have been split.
- Script ossec_ruleset.py v2:
- Bug fixes.
- Python 2.6 compatibility.
- OSSEC 2.8.x compatibility.
- Restore backups automatically.
- Some issues with windows decoder have been solved.
- All sysmon decoders have windows as parent.
- Puppet Decoders & Rules.
- Compliance mapping with PCI DSS v3.1.
- Netscaler Decoders & Rules.
- ClamAV:
- New decoder: Extract main fields (path, virus name, hash) when a virus is detected.
- New rule: ClamAV Stopped.
- New rule: Virus detected multiple times.
- Sysmon decoders:
- Decoder for the new log format of Event 1
- Decoders for Events 2 - 8.
- Script ossec_ruleset.py for installing and updating rules, decoders and rootcheck.
- SSH Decoder modified to extract user name when invalid/illegal users trying to log in.
- Sysmon Decoder for Event 1 modified (It allows use the new decoder added for this event).
- Inital version: OSSEC out-of-the-box rules, decoders and rootchecks.