OSSEC Wazuh fork
Перейти к файлу
Vikman Fdez-Castro 0472a17fe9 Removed FTS bitfield from JSON output 2017-01-05 22:06:23 +01:00
active-response Silent curl to fix issue #959 2016-12-21 15:52:06 +01:00
contrib Change wazuh_ruleset.py directory and new file ruleset version 2016-12-22 16:42:42 +00:00
doc Merge branch 'rule_ids_update' of https://github.com/ddpbsd/ossec-hids into random_decoders_rules 2014-07-21 11:11:31 -04:00
etc Add subversion. 2016-12-30 16:51:15 +01:00
extensions Added commented SSL settings for Filebeat and Logstash 2016-12-23 17:42:33 +01:00
integrations Integrator daemon with default integrations for Slack and PagerDuty 2016-03-17 16:04:55 +01:00
src Removed FTS bitfield from JSON output 2017-01-05 22:06:23 +01:00
wodles/oscap Update SCAP content from wazuh-ruleset repository 2016-12-23 13:06:47 +00:00
.gitignore Renamed service "wazuh-moduled" for "wazuh-modulesd" 2016-12-20 20:10:31 +01:00
.travis.yml mingw32 compiler used by travis ci can't find glob.h 2016-03-28 17:49:18 +02:00
BUGS Replaced OSSEC HIDS for OSSEC Wazuh and updated version number 2016-09-15 17:47:40 +02:00
CHANGELOG.md Updated Changelog 2016-12-21 19:02:28 +01:00
CONFIG Replaced OSSEC HIDS for OSSEC Wazuh and updated version number 2016-09-15 17:47:40 +02:00
CONTRIBUTORS Replaced OSSEC HIDS for OSSEC Wazuh and updated version number 2016-09-15 17:47:40 +02:00
INSTALL Replaced OSSEC HIDS for OSSEC Wazuh and updated version number 2016-09-15 17:47:40 +02:00
Jenkinsfile-daily Renaming JenkinsFile. Testing webhooks 2016-11-30 11:09:37 -08:00
Jenkinsfile-instant New jenkinsfile for instant tests 2016-11-30 20:39:36 +01:00
LICENSE [2.7.1-alpha] up version to v2.7.1-alpha 2013-03-28 14:49:38 -07:00
README.md Updated ruleset updater and some links 2016-11-23 10:22:14 +01:00
add_localfiles.sh Remove not used variables. 2016-12-15 12:03:37 +01:00
gen_ossec.sh Add subversion. 2016-12-30 16:51:15 +01:00
install.sh Change function 'GenerateInitConf' output. 2016-12-21 19:21:33 +01:00

README.md

OSSEC Wazuh fork

OSSEC is a full platform to monitor and control your systems. It mixes together all the aspects of HIDS (host-based intrusion detection), log monitoring and SIM/SIEM together in a simple, powerful and open source solution.

This fork provides compliance support, extended logging, and additional management features. These capabilities are required for the integration with ELK Stack and OSSEC Wazuh RESTful API (also included in this repository).

Wazuh Open Source modules and contributions

Wazuh team is currently supporting OSSEC enterprise users, and decided to develop and publish additional modules as a way to contribute back to the Open Source community. Find below a list and description of these modules:

  • OSSEC Wazuh Ruleset: Includes compliance mapping with PCI DSS v3.1, CIS and additional decoders and rules. Users can contribute to this rule set by submitting pull requests to our Github repository. Our team will continue to maintain and update it periodically.

  • OSSEC Wazuh fork with extended JSON logging capabilities, for easy integration with ELK Stack and third party log management tools. The manager also include modifications in OSSEC binaries needed by the OSSEC Wazuh RESTful API.

  • OSSEC Wazuh RESTful API: Used to monitor and control your OSSEC installation, providing an interface to interact with the manager from anything that can send an HTTP request.

  • Pre-compiled installation packages, both for OSSEC agent and manager: Include repositories for RedHat, CentOS, Fedora, Debian, Ubuntu and Windows.

  • Puppet scripts for automatic OSSEC deployment and configuration.

  • Docker containers to virtualize and run your OSSEC manager and an all-in-one integration with ELK Stack.

Documentation

Branches

  • stable branch on correspond to the last OSSEC Wazuh stable version.
  • master branch contains the latest code, be aware of possible bugs on this branch.
  • development branch includes all the new features we're adding and testing.

Contribute

If you want to contribute to our project please don't hesitate to send a pull request. You can also join our users mailing list, by sending an email to wazuh+subscribe@googlegroups.com, to ask questions and participate in discussions.

Software and libraries used

  • Modified version of Zlib and a small part of OpenSSL (SHA1 and Blowfish libraries).
  • OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).
  • Cryptographic software written by Eric Young (eay@cryptsoft.com).
  • Software developed by the Zlib project (Jean-loup Gailly and Mark Adler).
  • Software developed by the cJSON project (Dave Gamble).
  • Node.js (Ryan Dahl).
  • NPM packages Body Parser, Express, HTTP-Auth and Moment.

Credits and Thank you

OSSEC Copyright (C) 2015 Trend Micro Inc. (License GPLv2)

References