Configuration for monitoring log files
You can use a local configuration file on the ThreatLockDown agent or ThreatLockDown server to monitor log files. There is also a centralized configuration file on the ThreatLockDown server to monitor log files across multiple endpoints. These two configuration options for monitoring log files are explained below.
Local configuration: The ossec.conf file is the main configuration file on the ThreatLockDown server and the ThreatLockDown agent. The ThreatLockDown agent collects logs from monitored endpoints and forwards these logs to the ThreatLockDown server for analysis. You can configure the ThreatLockDown agent
ossec.conf
file to collect logs from specific log files on a monitored endpoint. The table below shows the location of theossec.conf
file on different operating systems.
Operating systems |
Location of the ossec.conf file |
---|---|
Windows |
|
Linux/Unix |
|
macOS |
|
Centralized configuration: The agent.conf file on the ThreatLockDown server enables centralized distribution of configuration settings to multiple monitored endpoints in the same operating system or group. For example, you can configure the
agent.conf
file to distribute configuration settings to all monitored Windows endpoints. Configuration settings in theagent.conf
file take precedence over the settings in theossec.conf
file.
Note
The ThreatLockDown agent is designed to be a lightweight application that minimizes RAM and CPU usage on the endpoint where it is installed. On the ThreatLockDown server side, the CPU and memory consumption is influenced by the number of events per second (EPS) that the server needs to analyze.
Monitoring basic log files
You can configure the ThreatLockDown agent ossec.conf
file on Windows, Linux, and macOS endpoints to monitor basic log files. For example, perform the following steps to monitor the file file.log
.
Add the following settings in between the
<ossec_config>
tags of the ThreatLockDown agent configuration file:Linux:
/var/ossec/etc/ossec.conf
Windows:
C:\Program Files (x86)\ossec-agent\ossec.conf
macOS:
/Library/Ossec/etc/ossec.conf
<localfile> <location>/<FILE_PATH>/file.log</location> <log_format>syslog</log_format> </localfile>
Where:
location
: is the full path of the monitored file.log_format
: represents the format of the log. Refer to the log format documentation to learn more about the different types oflog_format
you can configure.
Refer to the localfile documentation to learn more about the options of the
<localfile>
configuration block.Restart the ThreatLockDown agent with administrator privileges to apply the configuration change:
Linux:
systemctl restart wazuh-agent
Windows (PowerShell):
Restart-Service -Name wazuh
macOS:
/Library/Ossec/bin/wazuh-control restart
Monitoring date-based log files
You can configure ThreatLockDown to dynamically monitor log files on endpoints, adapting to changes based on the date. It employs the strftime
format to accurately represent date-based log files, encompassing day, month, year, and other relevant information. Perform the following steps to monitor a date-based log file file-23-06-15.log
.
Add the following settings in between the
<ossec_config>
tags of the ThreatLockDown agent configuration file:Linux:
/var/ossec/etc/ossec.conf
Windows:
C:\Program Files (x86)\ossec-agent\ossec.conf
macOS:
/Library/Ossec/etc/ossec.conf
<localfile> <location>/<FILE_PATH>/file-%y-%m-%d.log</location> <log_format>syslog</log_format> </localfile>
Note
In the file name
file-23-06-15.log
,23
is the last two digits of the year,06
is the month, and15
is the day.Restart the ThreatLockDown agent with administrator privileges to apply the configuration change:
Linux:
systemctl restart wazuh-agent
Windows (PowerShell):
Restart-Service -Name wazuh
macOS:
/Library/Ossec/bin/wazuh-control restart
Monitoring log files using wildcard patterns
ThreatLockDown offers support for wildcard patterns when monitoring log files, allowing for flexible file selection. For example, you can monitor all files ending with .log
within a monitored endpoint’s directory. Perform the following steps to monitor every log file that starts with file
and ends with .log
in a directory of a monitored endpoint.
Add the following settings in between the
<ossec_config>
tags of the ThreatLockDown agent configuration file:Linux:
/var/ossec/etc/ossec.conf
Windows:
C:\Program Files (x86)\ossec-agent\ossec.conf
macOS:
/Library/Ossec/etc/ossec.conf
<localfile> <location>/<FILE_PATH>/file*.log</location> <log_format>syslog</log_format> </localfile>
Restart the ThreatLockDown agent with administrator privileges to apply the configuration change:
Linux:
systemctl restart wazuh-agent
Windows (PowerShell):
Restart-Service -Name wazuh
macOS:
/Library/Ossec/bin/wazuh-control restart
Monitoring log files with environment variables
Note
You can use environment variables in the log file path only on Windows endpoints.
ThreatLockDown leverages Windows environment variables like %WINDIR%
and %ProgramFiles%
to monitor log files. For example, perform the following steps to monitor C:\Windows\Logs\StorGroupPolicy.log
file.
Add the following configuration in between the
<ossec_config>
tags of the ThreatLockDown agentC:\Program Files (x86)\ossec-agent\ossec.conf
file:<localfile> <location>%WINDIR%\Logs\StorGroupPolicy.log</location> <log_format>syslog</log_format> </localfile>
Note
%WINDIR%
in%WINDIR%\Logs\StorGroupPolicy.log
representsC:\Windows
. Hence,%WINDIR%\Logs\StorGroupPolicy.log
is equivalent toC:\Windows\Logs\StorGroupPolicy.log
.Restart the ThreatLockDown agent via PowerShell with administrator privileges to apply the configuration change:
> Restart-Service -Name wazuh