Replies: 15 comments 8 replies
-
Adding to my previous post, all my hosts are Linux based and I cretead a new policy for adding nginx integration to some of our servers. But I notice that all the playbooks are windows related. Are there playbooks related to Linux? I have the default integrations on two servers (endpointd initial with osquery manager, elastic defend , system and windows integrations) and the elastic-defend, nginx, osquery manager and system integration on another policy with two servers assigned. Regards Ricardo |
Beta Was this translation helpful? Give feedback.
-
Hi. Again another update. With the help of: https://docs.securityonion.net/en/2.4/playbook.html I have included other rulesets like this: ![]() But nothing has happened. So I issued a sudo so-playbook-reset and now I don't have any playbook. But on playbook.log I have the following error: App 115 output: I, [2023-09-11T11:48:28.855365 #115] INFO -- : Current user: anonymous When trying to: App 115 output: I, [2023-09-11T11:48:28.846207 #115] INFO -- : Started POST "/playbook/issues.json" for 172.17.1.1 at 2023-09-11 11:48:28 +0000 Really don't know what to do. Regards RS |
Beta Was this translation helpful? Give feedback.
-
Don't know if this log (playbook.log) is important: App 114 output: I, [2023-09-11T14:26:57.449593 #114] INFO -- : Started POST "/playbook/issues.json" for 172.17.1.1 at 2023-09-11 14:26:57 +0000 <code class="yaml">\n\nany where (((process.command_line : "* /I*" and process.command_line : "gacutil") or (process.command_line : "* system.enterpriseservices.internal.publish*" and process.executable : "\\powershell.exe") or process.command_line : "appcmd.exe add module") and process.parent.executable : "\\w3wp.exe")\n\n}}"}, {"id"=>10, "name"=>"Level", "value"=>"high"}, {"id"=>20, "name"=>"Product", "value"=>"windows"}, {"id"=>3, "name"=>"Objective", "value"=>"Detects a suspicious IIS module registration as described in Microsoft threat report on IIS backdoors"}, {"id"=>2, "name"=>"Author", "value"=>"Florian Roth (Nextron Systems), Microsoft (idea)"}, {"id"=>8, "name"=>"References", "value"=>"https://www.microsoft.com/security/blog/2022/07/26/malicious-iis-extensions-quietly-open-persistent-backdoors-into-servers/"}, {"id"=>5, "name"=>"Analysis", "value"=>"False Positives\nAdministrative activity"}, {"id"=>11, "name"=>"PlayID", "value"=>"9c526e493"}, {"id"=>15, "name"=>"Tags", "value"=>["T1505"]}, {"id"=>12, "name"=>"Rule ID", "value"=>"043c4b8b-3a54-4780-9682-081cb6b8185c"}, {"id"=>9, "name"=>"Sigma", "value"=>"{{collapse(View Sigma)\n <code class="yaml">\n\ntitle: Suspicious IIS Module Registration\nid: 043c4b8b-3a54-4780-9682-081cb6b8185c\nstatus: test\ndescription: Detects a suspicious IIS module registration as described in Microsoft\n threat report on IIS backdoors\nreferences:\n- https://www.microsoft.com/security/blog/2022/07/26/malicious-iis-extensions-quietly-open-persistent-backdoors-into-servers/\nauthor: Florian Roth (Nextron Systems), Microsoft (idea)\ndate: 2022/08/04\nmodified: 2023/01/23\ntags:\n- attack.persistence\n- attack.t1505.004\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection_parent:\n ParentImage|endswith: \w3wp.exe\n selection_cli_1:\n CommandLine|contains: appcmd.exe add module\n selection_cli_2:\n CommandLine|contains: ' system.enterpriseservices.internal.publish'\n Image|endswith: \powershell.exe\n selection_cli_3:\n CommandLine|contains|all:\n - gacutil\n - ' /I'\n condition: selection_parent and 1 of selection_cli_*\nfalsepositives:\n- Administrative activity\nlevel: high\n\n\n}}"}, {"id"=>18, "name"=>"Ruleset", "value"=>"windows"}, {"id"=>19, "name"=>"Group", "value"=>"process_creation"}, {"id"=>26, "name"=>"License", "value"=>"DRL-1.0"}, {"id"=>28, "name"=>"Sigma URL", "value"=>"https://github.com/Security-Onion-Solutions/sigma/tree/master/rules/windows/process_creation/proc_creation_win_iis_susp_module_registration.yml"}, {"id"=>27, "name"=>"Sigma File", "value"=>"/SOCtopus/sigma/rules/windows/process_creation/proc_creation_win_iis_susp_module_registration.yml"}]}} App 114 output: I, [2023-09-11T14:26:57.459314 #114] INFO -- : Current user: anonymous App 114 output: I, [2023-09-11T14:26:57.465233 #114] INFO -- : Filter chain halted as :find_optional_project rendered or redirected App 114 output: I, [2023-09-11T14:26:57.465475 #114] INFO -- : Completed 401 Unauthorized in 12ms (ActiveRecord: 3.3ms) But here it is. Regards Ricardo |
Beta Was this translation helpful? Give feedback.
-
Last time I wasn't seeing alerts it was because the monitor interface ethernet jack was not plugged all the way in. |
Beta Was this translation helpful? Give feedback.
-
Thanks @Acewiza but it is a virtual machine. And this is alerts related to HIDS (Elastic Agent) not network. Also I receive the events from Elastic Agent, but no alerts are generated. |
Beta Was this translation helpful? Give feedback.
-
Yeah, I probably shoulda read the writeup more carefully. I get lost in the gobbldygook sometimes. ;-( |
Beta Was this translation helpful? Give feedback.
-
I have noticed the same behavior with alerts and this was one of the key reasons I switched back down to 2.3. Did adding playbooks ever add alerting for you? |
Beta Was this translation helpful? Give feedback.
-
Hi @kgoode517 . To be honest I haven't added any playbooks because I tried to install the linux ones and never came because of the error above. I also switched back to 2.3 with the wazuh agents. If I don't know the solution for this, maybe I try the wazuh server, in order to have upgrades going. RS |
Beta Was this translation helpful? Give feedback.
-
@kgoode517 Have you created a Discussion for what you are seeing? |
Beta Was this translation helpful? Give feedback.
-
@ricamz Is there a specific Play that you are expecting an alert for? If you post the Title or GUID, we can troubleshoot more effectively. I am also looking into the other issue you are seeing about rulesets. |
Beta Was this translation helpful? Give feedback.
-
I had the following rules generating alerts (rule.uuid): 31101 for example. RS |
Beta Was this translation helpful? Give feedback.
-
The alerting system for elastic agent is based on playbooks entirely, however there doesn't seem to be much documentation for it at the moment. i asked a very similar question before in this case #10556 |
Beta Was this translation helpful? Give feedback.
-
Any developments on these issues ? |
Beta Was this translation helpful? Give feedback.
-
@ricamz @8bitjoe @kgoode517 We are working on some detailed examples of how to do this. We will get them posted once we are past our conference (Security Onion Con this week, hope to see you there!) |
Beta Was this translation helpful? Give feedback.
-
Hi @defensivedepth . Do you already have the detailed examples on how to create playbooks for elastic agents rules? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Version
2.4.10
Installation Method
Security Onion ISO image
Description
configuration
Installation Type
Standalone
Location
on-prem with Internet access
Hardware Specs
Exceeds minimum requirements
CPU
8
RAM
32
Storage for /
1TB
Storage for /nsm
1TB
Network Traffic Collection
other (please provide detail below)
Network Traffic Speeds
Less than 1Gbps
Status
Yes, all services on all nodes are running OK
Salt Status
No, there are no failures
Logs
No, there are no additional clues
Detail
Dear Support.
I installed the new 2.4.10 from scratch, loosing all information from the 2.3.160 (or 2.3.260 don't remember well) but it's ok.
My environment is still purely on agents - previously wazuh and now elastic agent.
One thing I notice is that I don't have any alerts, and in the previous version, wthout doing anything I had plenty of them. For example, user creation, web server error codes, web attacks, SSH authentication failures, etc.
I notice that I don't have any playbook active and starting to activate some playbooks, but can't find all the alerts of the previous version and it is tedious to activate one playbook at a time.
is there a way of importing and activating all the active playbooks of the 2.3.x S.O. version?
Regards
Ricardo
Guidelines
Beta Was this translation helpful? Give feedback.
All reactions