It’s been a while since we updated on AV, and that’s because we’ve been busy with some POCs and Installations.
Since the last post, quite a lot has changed about AV – and all to make it a lot easier to set it up. Before we go into a detail post on it, here are some extra tricks in creating some helpful shortcuts:
Create in /etc/bash.bashrc
alias avsql='cd /usr/share/doc/ossim-mysql/contrib/plugins' alias avplugins='cd /etc/ossim/agent/plugins' alias avdevicelog='cd /var/log/alienvault/devices' alias avagentlog='cd /var/log/alienvault/agent' alias avhidslog='cd /var/ossec/logs/alerts/' alias ossimlog='cd /var/ossim/logs/' alias configyml='more /etc/ossim/agent/config.yml' alias ossecdecoder='cd /var/ossec/alienvault/decoders/' alias ossecrule='cd /var/ossec/alienvault/rules/' alias avarchivelog='cd /var/ossec/logs/archives/'
Each of these basically will have a lot of use, and you will be going back and forth if you are implementing AV or troubleshooting it – so its best we set these aliases early.
What these mean is that instead of typing cd etc etc, we just type in avsql, avplugins etc to go to their respective directories.
AVSQL = this leads to the sql directory for the plugins, where you will need to go when you implement a plugin and put in the cfg and sql file..
AVPLUGINS = this is where you need to go for the cfg file for the plugin
AVDEVICELOG = very useful directory. Basically any log devices (devices sending logs to AV), will appear here. This is big move away from the traditional rsyslog setup whereby we need to go through all the crazy set up = over here, we just enable the plugin on the asset detail page -> Plugins and voila, it’s auto set up for you. I must say, this is well done, AV for making it less painful.
AVAGENTLOG = this is for troubleshooting the HIDS or even plugins. Agent.log should show whether your plugins are working or not. Just cat agent.log | grep <pluginid> for an idea whether the plugin is correctly loading.
Now, this is a quick one, but the new version 5.2 is out already and it really solves some issues.
Here is a snapshot!
- Underlying OS upgrade
- AlienVault USM and OSSIM v5.2 include an update to the underlying operating system to improve general performance, stability, and reliability. The AlienVault OS is based on Debian, which will update from Debian 6 ‘Squeeze’ to Debian 8 ‘Jessie’. All libraries, kernel, and software will be updated; therefore the update option is only available from the AlienVault Setup menu (both online and offline), not from the web interface. Note: Please read the instructions prior to upgrading.
Improvements for USM only:
- Rapid report delivery
- Updates to existing reports will now be delivered separately from platform updates. The new reporting framework will allow for more frequent updates and improvements to report used to prove compliance and measure security status.
- Reporting improvements
- Simplified user interface in reports list and report module list
- Enhanced visual design of PDF and HTML report output
- Ability to “print” pages in the UI for customers so that customers can share information with other team members without giving them access to the system
- Audit-ready compliance reports
- Based on feedback from auditors and compliance experts, AlienVault delivers over 30 new audit-ready reports for PCI-DSS 3.1 and HIPAA to answer the most common questions from auditors.
- OTX reports
- Identify emerging threats targeting you environment by reporting on events that contain suspicious IP addresses from the OTX IP Reputation database and report on events generated from IOC’s that have been identified in OTX pulses.