date: 2015-03-26
I have been testing Palo Alto Traps Endpoint Protection (of which I’m extremely satisfied with) and today decided to forward the logs to OSSIM by alienvault.
My sandbox was the following,
OSSIM Installed; AlienVault_OSSIM_64bits_4.15.2.iso
VM Platform; VirtualBox 4.3.20 on Windows 7
Prerequisite
Install OSSIM with two host only interfaces, configure eth0 192.168.56.200/24 eth1 192.168.56.222/24
Login to OSSIM Vm console with root, choose jail break from the menu option.
Once you get a full shell run the following command
# adduser –s /bin/bash sadmin
Change the password
# passwd sadmin
Now add this user to the /etc/sudoers file under; root ALL=(ALL) ALL
sadmin ALL=(ALL) ALL
Now on your windows host open putty and ssh onto ossim.
Syslog Config
We will create a new config file to catch and redirect to specific logfile.
# sudo nano /etc/rsyslogd/192.168.56.140.conf
if $fromhost == ‘192.168.56.140’ and $rawmsg contains ‘Palo Alto Networks|EndpointSecurityManager’ then /var/log/ossim/paloalto-endpoint.log
if $fromhost == ‘192.168.56.140’ ~
# service rsyslog restart
Plugin config
We now need to create a new plugin. I used http://www.rubular.com/ to help with the regex
# sudo nano /etc/ossim/agent/plugins/paloalto-endpoint.cfg
# Alienvault plugin
# Author: martyn from blogsploit.co.uk
# Plugin paloalto-endpoint id:9007 version: 0.0.1
# Last modification: 2015-03-26 12:37
#
# Accepted products:
# syslog - syslog -
# Description:
#
#
#[DEFAULT]
plugin_id=9007[config]
type=detector
enable=yessource=log
location=/var/log/ossim/paloalto-endpoint.logcreate_file=true
process=
start=no
stop=no#;[translation]
#;Some thing=2
#;ACCEPT=1
#;REJECT=2
#;DROP=3
#;DENY=3
#;Inbound=4
#;Outbound=5
#;Terminate=3#;WARNING=3
# Sample Log
# Mar 24 15:18:37 Host CEF: 0|Palo Alto Networks|EndpointSecurityManager|3.2.0.3328|7|Prevention from machine|9|dhost=USER-PC4 msg=Prevention details: User=USER-PC4\user PreventionMode=Terminate ProcessName=AcroRd32 EPM= Cycode=S01 PreventionKey=74ff476a-6752-49a6-b750-12b11c1f6713 Arguments=”C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe” “C:\Users\user\Desktop\adobe_cooltype_sing.pdf”.[paloalto - endpoint event]
event_type=event
regexp=”^(?P(\\S+\\s+\\d+\\s+\\d\\d:\\d\\d:\\d\\d)\\s+.+dhost=(?P \\S+).+User=(?P \\S+)\\s+PreventionMode=(?P \\S+)(?P<logged\_event>.+))$" device={resolv($host)} date={normalize\_date($1)} plugin\_sid=3 username={$username} src\_ip={resolv($host)} dst\_ip={resolv($host)} userdata1={md5sum($logline)} userdata3={$host} userdata4={$action} userdata5={$logged\_event}
Back on the vm console in the alienvault menu goto option 1’configure sensor’ then to option 4 ‘configure data source plugins’ and select your new plugin.
You may have to from putty
# /etc/init.d/ossim-server restart
# /etc/init.d/ossim-agent restart
Login to your ossim web portal and goto ‘configuration’ > ‘deployment’ > ‘Alienvault center’ > double click ‘alienvault’ object > ‘sensor configuration’ > click ‘collection’
Search for palo and add ‘paloalto-endpoint’ to the enabled plugins.
Now to get your events into the dashboard we need to create a sql file and import it. Back on putty!
# sudo nano /usr/share/doc/ossim-mysql/contrib./plugins/paloalto-endpoint.sql
-- paloalto endpoint
-- plugin_id: 9007DELETE FROM plugin WHERE id = “9007”;
DELETE FROM plugin_sid where plugin_id = “9007”;INSERT IGNORE INTO plugin (id, type, name, description) VALUES (9007, 1, ‘paloalto-endpoint’, ‘Palo Alto Endpoint plugin with md5 checksum logging’);
INSERT IGNORE INTO plugin_sid (plugin_id, sid, category_id, class_id, name, priority, reliability) VALUES (9007, 3, NULL, NULL, ‘PaloAlto-Endpoint: Terminate Event’ , 5, 5);
Back on the vm console in a jail broken full shell;
# cat /usr/share/doc/ossim-mysql/contrib./plugins/paloalto-endpoint.sql | ossim-db |
Best to redo from putty
# /etc/init.d/ossim-server restart
# /etc/init.d/ossim-agent restart
!troubleshooting in putty
# sudo cat /var/log/alienvault/agent/agent.log | grep 9007 |