ossec-hids | Open Source Host-based Intrusion Detection System | File Utils library

 by   ossec C Version: 3.7.0 License: Non-SPDX

kandi X-RAY | ossec-hids Summary

kandi X-RAY | ossec-hids Summary

ossec-hids is a C library typically used in Utilities, File Utils applications. ossec-hids has no bugs, it has no vulnerabilities and it has medium support. However ossec-hids has a Non-SPDX License. You can download it from GitHub, GitLab.

OSSEC is a full platform to monitor and control your systems. It mixes together all the aspects of HIDS (host-based intrusion detection), log monitoring and SIM/SIEM together in a simple, powerful and open source solution. Visit our website for the latest information. www.ossec.net.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              ossec-hids has a medium active ecosystem.
              It has 3958 star(s) with 1000 fork(s). There are 333 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 306 open issues and 674 have been closed. On average issues are closed in 688 days. There are 29 open pull requests and 0 closed requests.
              It has a neutral sentiment in the developer community.
              The latest version of ossec-hids is 3.7.0

            kandi-Quality Quality

              ossec-hids has 0 bugs and 0 code smells.

            kandi-Security Security

              ossec-hids has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              ossec-hids code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              ossec-hids has a Non-SPDX License.
              Non-SPDX licenses can be open source with a non SPDX compliant license, or non open source licenses, and you need to review them closely before use.

            kandi-Reuse Reuse

              ossec-hids releases are available to install and integrate.
              It has 22648 lines of code, 5 functions and 128 files.
              It has high code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of ossec-hids
            Get all kandi verified functions for this library.

            ossec-hids Key Features

            No Key Features are available at this moment for ossec-hids.

            ossec-hids Examples and Code Snippets

            No Code Snippets are available at this moment for ossec-hids.

            Community Discussions

            Trending Discussions on ossec-hids

            QUESTION

            OSSEC windows agent configuration
            Asked 2019-Oct-02 at 09:47

            I am getting started with OSSEC and i want to configure windows agent. I have followed the documentation and this. My server is a VM ubuntu and I want to have an Windows Agent.

            This is the output of active agents.

            vm:/var/ossec/etc# /var/ossec/bin/list_agents -c ** No agent available.

            vm:~/ossec-hids-3.2.0# tcpdump -i ens3 src 192.168.8.69

            tcpdump: verbose output suppressed, use -v or -vv for full protocol decode

            listening on ens3, link-type EN10MB (Ethernet), capture size 262144 bytes

            13:44:30.979244 IP 192.168.8.69.55341 > 10.0.0.4.ssh: Flags [.], ack >1445060350, win 16319, length 0

            This is list of already added agents.

            Available agents: ID: 003, Name: WindowsAgent, IP: 192.168.8.69

            And here is my windows agent manager.

            On the server side I have droped the firewall.

            Maybe should I drop the firewall also on the client side? Also I am not so sure about server side IP address - but thats the output form ifconfig.

            ...

            ANSWER

            Answered 2019-Oct-02 at 09:47

            I made a mistake assuming that ifconfig ip is the one I should be connecting. My server is on the VM, which I connect via SSH to given IP and this IP is the OSSEC server IP.

            Here is the command to check whether the port 1514 is used.

            tcpdump -i ens3 -nn host 192.168.8.69 and port 1514

            It shows whether you are using a specific port.

            Also, I advise checking ossec.log in ossec-agent folder.

            Source https://stackoverflow.com/questions/55759206

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install ossec-hids

            You can download it from GitHub, GitLab.

            Support

            Join us on slack, ossec.slack.com: Invites to slack@ossec.net. Join us on Discord: https://discord.gg/BXzM75Xzq7.
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/ossec/ossec-hids.git

          • CLI

            gh repo clone ossec/ossec-hids

          • sshUrl

            git@github.com:ossec/ossec-hids.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular File Utils Libraries

            hosts

            by StevenBlack

            croc

            by schollz

            filebrowser

            by filebrowser

            chokidar

            by paulmillr

            node-fs-extra

            by jprichardson

            Try Top Libraries by ossec

            ossec-wui

            by ossecPHP

            ossec-docs

            by ossecHTML

            ossec-docker

            by ossecShell

            ossec-rules

            by ossecPython

            ossec.github.io

            by ossecHTML