- Instant OSSEC Host-based Intrusion Detection System
- Brad Lhotsky
- 107字
- 2021-08-13 16:28:01
Getting ready
In this example, we assume that the:
- OSSEC server is 192.168.0.1
- Our servers live on 192.168.0.0/23 (192.168.0.1 to 192.168.1.254)
- We have an external MS Exchange server at 1.2.3.4
We also assume that you have successfully installed OSSEC. Otherwise, you can install it from the source or with a binary installer. To install from a source, use the install.sh
command and select server
as the installation type in the first step. Binary installers will label their server packages as ossec-hids-server
.
In order to run OSSEC in server mode, you need to open up the UDP port 1514 on your firewalls from and to your OSSEC server.
推薦閱讀
- 計(jì)算機(jī)使用安全與防護(hù)
- 深入淺出隱私計(jì)算:技術(shù)解析與應(yīng)用實(shí)踐
- 等級(jí)保護(hù)測(cè)評(píng)理論及應(yīng)用
- 同態(tài)密碼學(xué)原理及算法
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)(第2版)
- 網(wǎng)絡(luò)安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實(shí)踐
- Learning Pentesting for Android Devices
- 黑客攻防從入門到精通
- INSTANT Apple Configurator How-to
- 白話零信任
- Kali Linux高級(jí)滲透測(cè)試(原書(shū)第4版)
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專供版)
- Mastering Metasploit