diff --git a/README.md b/README.md index 674b70c..417b36e 100644 --- a/README.md +++ b/README.md @@ -17,6 +17,13 @@ Role Variables - ossec_enable_email: enable/disable email notifications, use "y" or "n" - ossec_clean_previous: clean previous installation +Integrations + +- ossec_wazuh_integrator_slack_hook_url: +- ossec_wazuh_integrator_pagerduty_api_key: +- ossec_wazuh_integrator_slack_level: 4 +- ossec_wazuh_integrator_pagerduty_level: 7 + Dependencies ------------ diff --git a/defaults/main.yml b/defaults/main.yml index 56d7b4d..0c3ba6e 100644 --- a/defaults/main.yml +++ b/defaults/main.yml @@ -5,10 +5,20 @@ ossec_wazuh_version: 1.1.1 ossec_wazuh_api_version: 1.2.1 ossec_email_from: "" ossec_email_address: "" +ossec_smtp_server: localhost ossec_enable_email: "n" ossec_clean_previous: true + +# ResfulAPI ossec_wazuh_api: true ossec_wazuh_api_config_https: "no" ossec_wazuh_api_config_basic_auth: "no" ossec_wazuh_api_config_port: "55000" ossec_wazuh_api_config_https: "no" + +# integrator +ossec_wazuh_integrator: true +#ossec_wazuh_integrator_slack_hook_url: "" +ossec_wazuh_integrator_slack_level: 4 +ossec_wazuh_integrator_pagerduty_level: 7 +# ossec_wazuh_integrator_pagerduty_api_key: "" diff --git a/handlers/main.yml b/handlers/main.yml index 5ee21ca..7749d32 100644 --- a/handlers/main.yml +++ b/handlers/main.yml @@ -6,6 +6,11 @@ state=started enabled=yes +- name: restart ossec + service: name=ossec + state=restarted + enabled=yes + - name: restart wazuh-api service: name=wazuh-api state=restarted diff --git a/tasks/api.yml b/tasks/api.yml index ed07748..abdd385 100644 --- a/tasks/api.yml +++ b/tasks/api.yml @@ -18,6 +18,7 @@ - name: init script for wazuh api template: src=wazuh_api.j2 dest=/etc/init.d/wazuh-api owner=root group=root mode=0755 + when: ansible_os_family == "RedHat" - name: service enabled ( wazuh api ) service: name=wazuh-api state=started enabled=yes diff --git a/tasks/install.yml b/tasks/install.yml index 4354e3f..ad8d773 100644 --- a/tasks/install.yml +++ b/tasks/install.yml @@ -47,3 +47,8 @@ chdir="/root/wazuh-{{ ossec_wazuh_version }}" creates=/var/ossec/etc notify: start ossec + +- name: ossec config + template: src=ossec.conf.j2 + dest=/var/ossec/etc/ossec.conf + notify: restart ossec diff --git a/tasks/integrator.yml b/tasks/integrator.yml new file mode 100644 index 0000000..b0db3cf --- /dev/null +++ b/tasks/integrator.yml @@ -0,0 +1,4 @@ +--- + +- name: enable integrator + command: /var/ossec/bin/ossec-control enable integrator diff --git a/tasks/main.yml b/tasks/main.yml index 90f043a..f26970e 100644 --- a/tasks/main.yml +++ b/tasks/main.yml @@ -7,3 +7,7 @@ - include: install.yml - include: api.yml + when: ossec_wazuh_api + +- include: integrator.yml + when: ossec_wazuh_integrator diff --git a/templates/ossec.conf.j2 b/templates/ossec.conf.j2 new file mode 100644 index 0000000..87324f4 --- /dev/null +++ b/templates/ossec.conf.j2 @@ -0,0 +1,194 @@ + + + yes +{% if ossec_enable_email == "y" %} + yes + {{ ossec_email_address }} + {{ ossec_smtp_server }} + {{ ossec_email_from }} +{% else %} + no +{% endif %} + + +{% if ossec_wazuh_integrator_slack_hook_url is defined %} + + slack + {{ ossec_wazuh_integrator_slack_hook_url }} + {{ ossec_wazuh_integrator_slack_level }} + +{% endif %} +{% if ossec_wazuh_integrator_pagerduty_api_key is defined %} + + pagerduty + {{ ossec_wazuh_integrator_pagerduty_api_key }} + {{ ossec_wazuh_integrator_pagerduty_level }} + +{% endif %} + + + etc/ossec_decoders + etc/wazuh_decoders + rules_config.xml + pam_rules.xml + sshd_rules.xml + telnetd_rules.xml + syslog_rules.xml + arpwatch_rules.xml + symantec-av_rules.xml + symantec-ws_rules.xml + pix_rules.xml + named_rules.xml + smbd_rules.xml + vsftpd_rules.xml + pure-ftpd_rules.xml + proftpd_rules.xml + ms_ftpd_rules.xml + ftpd_rules.xml + hordeimp_rules.xml + roundcube_rules.xml + wordpress_rules.xml + cimserver_rules.xml + vpopmail_rules.xml + vmpop3d_rules.xml + courier_rules.xml + web_rules.xml + web_appsec_rules.xml + apache_rules.xml + nginx_rules.xml + php_rules.xml + mysql_rules.xml + postgresql_rules.xml + ids_rules.xml + squid_rules.xml + firewall_rules.xml + apparmor_rules.xml + cisco-ios_rules.xml + netscreenfw_rules.xml + sonicwall_rules.xml + postfix_rules.xml + sendmail_rules.xml + imapd_rules.xml + mailscanner_rules.xml + dovecot_rules.xml + ms-exchange_rules.xml + racoon_rules.xml + vpn_concentrator_rules.xml + spamd_rules.xml + msauth_rules.xml + mcafee_av_rules.xml + trend-osce_rules.xml + ms-se_rules.xml + + zeus_rules.xml + solaris_bsm_rules.xml + vmware_rules.xml + ms_dhcp_rules.xml + asterisk_rules.xml + ossec_rules.xml + attack_rules.xml + openbsd_rules.xml + clam_av_rules.xml + dropbear_rules.xml + sysmon_rules.xml + auditd_rules.xml + opensmtpd_rules.xml + local_rules.xml + + + + + 79200 + + + /etc,/usr/bin,/usr/sbin + /bin,/sbin,/boot + + + /etc/mtab + /etc/mnttab + /etc/hosts.deny + /etc/mail/statistics + /etc/random-seed + /etc/adjtime + /etc/httpd/logs + /etc/utmpx + /etc/wtmpx + /etc/cups/certs + /etc/dumpdates + /etc/svc/volatile + + + C:\WINDOWS/System32/LogFiles + C:\WINDOWS/Debug + C:\WINDOWS/WindowsUpdate.log + C:\WINDOWS/iis6.log + C:\WINDOWS/system32/wbem/Logs + C:\WINDOWS/system32/wbem/Repository + C:\WINDOWS/Prefetch + C:\WINDOWS/PCHEALTH/HELPCTR/DataColl + C:\WINDOWS/SoftwareDistribution + C:\WINDOWS/Temp + C:\WINDOWS/system32/config + C:\WINDOWS/system32/spool + C:\WINDOWS/system32/CatRoot + + + + /var/ossec/etc/shared/rootkit_files.txt + /var/ossec/etc/shared/rootkit_trojans.txt + /var/ossec/etc/shared/system_audit_rcl.txt + /var/ossec/etc/shared/cis_debian_linux_rcl.txt + /var/ossec/etc/shared/cis_rhel_linux_rcl.txt + /var/ossec/etc/shared/cis_rhel5_linux_rcl.txt + + + + yes + + + + + syslog + + + + secure + + + + 1 + 7 + + + + + syslog + /var/log/messages + + + + syslog + /var/log/secure + + + + syslog + /var/log/maillog + + + + command + df -P + + + + full_command + netstat -tan |grep LISTEN |grep -v 127.0.0.1 | sort + + + + full_command + last -n 5 + +