All notable changes to this project will be documented in this file.
- Let the Ruleset update tool to bypass the version check with the force option. (#773)
- Added new AWS Config-History rules to make it more granular by including every item status supported. (#775)
- FIM rules have been adapted to the improvements for Windows Registry monitoring. (#768)
- Updated MITRE techniques in web rules. (#810)
- Fixed Sonicwall predecoder to accept whitespaces at the beginning. (#503)
- Removed duplicated Windows rules for EventChannel. (#771)
- Changed compliance rules groups and removed
alert_by_email
option by default. (#559) - Let the Ruleset update tool pick up the current version branch by default. (#753)
- Added rules and decoders for macOS sshd logs (#593)
- Added TSC/SOC compliance mapping (#613)
- Added rules and decoders for PaloAlto logs (#658)
- Added rules and decoder to monitor the FIM database status. (#4717)
- Added rules for WAF. (#687)
- Fix the provider name so that Windows Eventlog logs match with the Wazuh rules. (#662)
- Fixed static filters related to the system_name field. (#684)
- Remove trailing whitespaces in the group name section of the ruleset. Thanks to Kevin Branch (@branchnetconsulting). (#667)
- Remove invalid zeroes from rules id. Thanks to @lucanus81. (#691)
- Fixed the Dropbear brute force rule entrypoint. (#589)
- Extend the rules to detect shellshock attacks (by @iasdeoupxe). (#459)
- Update Roundcube decoder to support versions greater than 1.4 (by @iasdeoupxe). (#537)
- Added Junos rules and decoders (#581)
- Fix GPG requirement in Windows rules. (#562)
- Improve Cisco decoders and fix Owlh rule's IDs conflict. (#570)
- Fixed checkpoint decoders to read events with a different format. (#156)
- Fixed permissions of the VERSION file. (#545)
- Add rules and decoders for McAfee EPO. (#467)
- Add PCI-DSS mapping to vulnerability detector rules. (#525)
- Add a new base rule for Microsoft Windows Firewall With Advanced Security/Firewalls. (#532)
- Let osquery daemon messages appear in alerts as the full log. (#531)
- Make double-point termination optional in the postfix decoder (by @iasdeoupxe). (#245)
- Fix typo in network checks for SCA Debian 8 and 9 policies. (#514)
- Fix path in audit checks for SCA Debian 8 and 9 policies. (#527)
- Fix last space in regular expression for SCA check about NTP. (#521)
- Unify SCA regular expressions about installed packages by dpkg. (#522)
- Add rules for VIPRE antivirus. (#327)
- Add decoders and rules for Panda-PAPS. (#437)
- Add decoders and rules for CheckPoint Smart-1 firewalls. (#440)
- Add Windows Software Restriction Policy rules. (#461)
- Add perdition (imap/pop3 proxy) rules (by @gkissand). (#407)
- Extend event detection for Windows Defender decoders (by @MarauderDueling). (#220)
- Add support for NAXSI web application firewall (by @kravietz). (#354)
- Improved postfix decoder (by @iasdeoupxe). (#410)
- Add rule to alert about changes in system time. (#239)
- Add rule to detect sudo actions from users other than root. (#149)
- Add Cisco-ASA rules and decoders. (#425)
- Add HIPAA compliance groups to ruleset. (#400)
- Add mapping for HIPAA and NIST_800_53 compliance to SCA policies. (#421)
- SCA policies have been improved and refactored. (#406)
- Add recon group to SSH rule (by @kravietz). (#323)
- Add rule to detect untrusted kernel modules being loaded (by @kravietz). (#323)
- Add rule for rndg failure (by @kravietz). (#323)
- Add rules for RAID and disk failure (by @kravietz). (#323)
- Add rule for ZFS error message (by @kravietz). (#323)
- Add rule for systemd status=1/FAILURE (by @kravietz). (#323)
- Fix Sonicwall decoders. (#274)
- Fix for Windows decoder. (#154)
- Fix regex to detect rootkit trojans (by @erinish). (#144)
- Fix rules about shellshock attack. (#458)
- NGINX Decoder: make "server" field optional. Thanks to @iasdeoupxe. (#243)
- Remove tailing quote from field "res" in Auditd decoder. Thanks to @branchnetconsulting. (#412)
- Fix conflict between fields "uid" and "auid" in Auditd decoder. Thanks to @tokibi. (#246)
- Prevent rules for AWS, Suricata, VirusTotal, OwnCloud, Vuls, CIS-CAT, Vulnerability Detector, MySQL, Osquery, and Azure from including the full log in JSON format. (#443)
- Fixed rule for the SCA check 5035 about SSH protocol. (#385)
- Fixed duplicated rules for the SCA policy cis_debianlinux7-8_L2. (#386)
- Fixed Windows Defender rule description. (#388)
- Fixed rules and requirements for SCA CIS policies of Mac OS X. (#387)
- Fixed Windows NT registries in Windows SCA policies. (#393)
- Fixed Windows EventChannel rules for Eventlog and Security Essentials. (#397)
- Fixed Windows rules to avoid filtering by erroneous provider names. (#403)
- Adapt Sysmon rules to new Windows eventchannel format. (#285)
- Added ruleset for the SCA module. (#288)
- Added policy files in YAML format for the SCA module. (#288)
- Added the policy cis_win2012r2_memberL2_rcl.yml for SCA. (#289) (Thanks to @Bob-Andrews)
- Improved rules for the docker listener. (#293) (#307)
- New options
same_field
andnot_same_field
to correlate dynamic fields in rules. (#302) - New rule to catch a logon success from a Windows workstation. (#304)
- Added rules about Application and System channels for the Windows eventchannel format. (#325)
- Added PCI-DSS and GDPR mapping to rules for the docker listener. (#333)
- Changed the eventchannel field names in rules. (#299)
- Redistribute the eventchannel rules by incoming channel. (#325)
- Prevent events invoked by AWS Internal from flooding alerts. (#351)
- Fixed the bruteforce attack rules for Windows Eventchannel. (#302)
- Updated links for Windows rules. (#311) (Credits to @atomicturtle (#1675))
- Several fixes for Windows rules for the eventlog format. (Thanks to @branchnetconsulting)
- Fixed the flow for Windows rule 18230. (#253) (Thanks to @wiredaem0n)
- Rework of the rules for Windows Eventchannel. (#277)
There are no changes for Wazuh Ruleset in this version.
- Added new rules to support the new Windows eventchannel decoder. (#247)
- Extend Auditd decoder to support more fields. (#256)
- Added rule to alert when an agent is removed. (#2127)
- Now CDB lists are not prebuilt in the repository. (#249)
There are no changes for Wazuh Ruleset in this version.
- New Vulnerability detector rules to warn about version comparison issues. (#237)
- osquery: Rename alerts fields reference. (#196)
- update_ruleset is not available in worker nodes. (#225)
- Update composite rules to match only same_source_ip events. (#161)
- Fixed active response decoder in order to match with different dates. (#223)
- Removed deprecated rules for Syscheck.
- Silence rule about full disk for SNAP partitions. (#183)
- Fixed login abortion log mismatch in Dovecot decoder when optional parameter didn't appear. (#171)
- Fixed decoder for Debian packages. (#172)
- Fixed active response decoder. (#179)
- Rules for the new osquery integration.
- Rule to ignore syscollector events.
- CIS-CAT rules improved.
- Rules and decoders for the new Kaspersky integration.
- CIS rootchecks for Windows 2012 R2 (by @Bob-Andrews).
- Extract port name for Sysmon event 3. (#127)
- Improve Shellshock detection. (#115)
- Decreased agent upgrade failure rules level.
- Windows rules: Fix SID syntax for group membership changes. (#125).
- Windows decoders: Match "Subject :" format (#128).
- Decoder for syscheck integration with audit.
- Removed offset of the
frequency
attribute in rules. (#145)
- Rule to detect when agents are unable to unmerge shared files. (#143)
There are no changes for Wazuh Ruleset in this version.
There are no changes for Wazuh Ruleset in this version.
- GDPR (General Data Protection Regulation) mapping.
- Improve GeoIP and composite rule support for AWS events.
- Pfsense rules.
- Error handling in update ruleset script using python3.
- Syntax error in cis_rhel7_linux_rcl.txt.
- OpenLDAP decoders to extract the IP address properly.
- Owncloud rules compatible with JSON logs.
- Postfix decoders and rules.
- Sendmail decoders to extract the IP address properly.
- False positives in SLES 11 rootchecks.
- Removed alert_by_email for rule 1002 and 9704.
- OpenVAS decoders and rules.
- Pfsense decoders.
- Mysql rules for Percona and Mcafee.
- MariaDB decoders and rules.
- Added rootcheck file for apache 2.2/2.4 (by @Bob-Andrews).
- Rules to detect USB devices disconnected.
- Silence rules about OpenSCAP and CIS-CAT scan status.
- Add compatibility between versions for CIS-CAT rules.
- Sudo decoders extract commands with spaces.
- Added new rules for Vulnerability detector.
- Removed svchost.exe and inetsrv.exe processes checking outside SysNative due to false positive.
- Fixed
update_ruleset
script.
- New rules for VULS integration
- New rules for CIS-CAT integration
- New features for "update_ruleset.py": custom URL and branch name
- New users added to list of known malicious user agents
- OwnCloud (Rules and decoders)
- Updated scap content from https://github.com/OpenSCAP/scap-security-guide
- Rules for VirusTotal integration
- Add GPG13 mappings to rules (gpg13.com)
- Removed "MJ12bot" from list of known malicious user agents
- SSH decoders
- OpenVPN decoders
- RoundCube (Rules and decoders)
- Decoders and rules for anti-flooding mechanism
- Fixed Windows decoders to extract the proper fields
- Rules/decoders:
- Microsoft Windows Defender
- Microsoft log related events
- Microsoft SQL Server
- Identity guard
- Sysmon events 11 and 15
- MongoDB
- Docker
- Jenkins
- AWS S3
- update_ruleset.py accepts a custom download URL
- web-accesslog_decoders.xml
- Amazon rules
- Rootcheck references
- Sysmon uses dynamic fields
- getawslog.py: Ignore digest files
- Fortigate decoders
- Apache decoders
- Bug in update_ruleset.py
- Netstat command
- SSH rootchecks
- Rules/decoders:
- OpenSCAP
- Switch HP 5500
- Chrome Remote Desktop
- Fortigate
- OpenVPN
- ModSecurity for Nginx
- Barracuda
- OpenWRT
- RSA Authentication Manager
- Imperva
- Sophos
- FreeIPA
- Cisco eStreamer
- Rootchecks:
- CIS SLES 11 and 12
- SCAP content
- cve-debian-oval.xml
- cve-redhat-6-ds.xml
- cve-redhat-7-ds.xml
- ssg-centos-6-ds.xml
- ssg-centos-7-ds.xml
- ssg-debian-8-ds.xml
- ssg-fedora-ds.xml
- ssg-rhel-6-ds.xml
- ssg-rhel-7-ds.xml
- ssg-ubuntu-1604-ds.xml
- ossec_ruleset.py renamed to update_ruleset.py with new features.
- New directory structure.
- Improvements in several decoders/rules.
- RH7 rootchecks.
- Improved getgetawslog.py.
- IP version-independent regexs.
- Decoders and rules for Amazon
- Amazon directory structure.
- Minor changes:
- Apache and Nginx rules.
- RH7 rootchecks.
- Redis decoders and rules.
- Rootchecks for RedHat 7.
- SUDO and SSH decoders.
- SSH and OSSEC rules.
- Minor changes in ossec_ruleset.py.
- Decoders and rules:
- ossec-auth
- OpenBSD SMTP
- SSH
- Postfix
- ossec_ruleset.py: Option -d to update the ruleset from local files.
- Apache Decoders
- getawslogs.py: Executing with standard users.
- Rules for Amazon VPC
- USB Decoder and Rules
- PCI Tagging for SSH rootchecks
- ossec_ruleset.py: New interface.
- Directory structure of Rootcheck
- Netscreen Firewall decoder
- Syntax error in rootchecks.
- ossec_ruleset.py:
- Problem with installation path
- New path: /var/ossec/**update/ruleset/**ossec_ruleset.py
- New Rootcheck: SSH Hardening
- New rules: ossec_ruleset.py rules
- Alerts related to the execution of script ossec_ruleset.py
- New rules and PCI Tagging for:
- Amazon IAM
- Amazon EC2
- ossec_ruleset.py:
- New format for ossec_ruleset.log
- New path: /var/ossec/updater/ruleset
- All files generated by the script are stored in this directory.
- We recommend this path to the script: /var/ossec/updater/ruleset/ossec_ruleset.py
- Amazon Decoders & Rules:
- EC2
- IAM
- Auditd Rules
- Shellshock rules
- New rules for sudo
- New rules for system
- New decoder: web-accesslog-iis-default decoder
- Folder tools:
- amazon: Script getawslog.py to download the JSON file from S3 Bucket.
- file-testing: Script file_test.py to check if a log file generates alerts
- rules-testing: Script runtests.py to run unitary tests. Created by OSSEC.
- Auditd Decoders
- Minor changes in some decoders and rules.
- Netscaler updated
- ossec_ruleset.py fixes
- Serv-U Decoders & Rules.
- Directory structure: Decoders have been split.
- Script ossec_ruleset.py v2:
- Bug fixes.
- Python 2.6 compatibility.
- OSSEC 2.8.x compatibility.
- Restore backups automatically.
- Some issues with windows decoder have been solved.
- All sysmon decoders have windows as parent.
- Puppet Decoders & Rules.
- Compliance mapping with PCI DSS v3.1.
- Netscaler Decoders & Rules.
- ClamAV:
- New decoder: Extract main fields (path, virus name, hash) when a virus is detected.
- New rule: ClamAV Stopped.
- New rule: Virus detected multiple times.
- Sysmon decoders:
- Decoder for the new log format of Event 1
- Decoders for Events 2 - 8.
- Script ossec_ruleset.py for installing and updating rules, decoders and rootcheck.
- SSH Decoder modified to extract user name when invalid/illegal users trying to log in.
- Sysmon Decoder for Event 1 modified (It allows use the new decoder added for this event).
- Inital version: OSSEC out-of-the-box rules, decoders and rootchecks.