ConfigurationPermalink to this headline
Basic usagePermalink to this headline
To configure the options for OpenSCAP go to ossec.conf, or for more details about specific options, see the OpenSCAP section.
In this example, we configure ThreatLockDown to run OpenSCAP each day, with a timeout of 30 minutes.
<wodle name="open-scap">
<disabled>no</disabled>
<timeout>1800</timeout>
<interval>1d</interval>
<scan-on-start>yes</scan-on-start>
<content type="xccdf" path="ssg-centos-7-ds.xml">
<profile>xccdf_org.ssgproject.content_profile_pci-dss</profile>
<profile>xccdf_org.ssgproject.content_profile_common</profile>
</content>
</wodle>
Evaluate PCI-DSS compliance on RHEL7Permalink to this headline
This section describes how to evaluate the Payment Card Industry Data Security Standard (PCI-DSS) compliance on Red Hat Enterprise Linux 7 agents.
Step 1: Configure the agents
Each agent must be properly identified in order to know which policy and profile to execute. To do this, configure <config-profile>
with the desired identifier.
Modify the ossec.conf
file in the agent side to apply the desired profile:
<client>
<server>
<address>10.0.1.4</address>
<port>1514</port>
<protocol>tcp</protocol>
</server>
<config-profile>redhat7</config-profile>
</client>
After this, restart the agents to apply the configuration.
# /var/ossec/bin/agent_control -R -a
If you prefer, you can restart a specific agent with option -u <id>
.
Step 2: Configure shared settings
We want to execute the PCI-DSS profile of the SSG RH7 policy only on Red Hat 7 agents.
To do this, modify the /var/ossec/etc/shared/default/agent.conf
file in the manager (assuming that the agent is on the default
group):
<agent_config profile="redhat7">
<wodle name="open-scap">
<content type="xccdf" path="ssg-rhel7-ds.xml">
<profile>xccdf_org.ssgproject.content_profile_pci-dss</profile>
</content>
</wodle>
</agent_config>
When the agents receive this configuration, they will restart to apply the changes and start the evaluation.
Step 3: See alerts
When the evaluation is complete, you will see the results as OSSEC alerts:
/var/ossec/logs/alerts/alerts.log
Wazuh dashboard
Note that each field is extracted to facilitate searches and analysis.

Step 4: Dashboards
Finally, you can explore all results using the OpenSCAP module.

Auditing Security Vulnerabilities of Red Hat ProductsPermalink to this headline
The Red Hat Security Response Team provides OVAL definitions for all vulnerabilities (identified by CVE name) that affect Red Hat Enterprise Linux 3, 4, 5, 6, and 7. This enables users to perform a vulnerability scan and diagnose whether a system is vulnerable or not.
Step 1: Configure the agents
Each agent must be properly identified in order to know which policy and profile to execute. To do this, configure <config-profile>
with the desired identifier.
Modify the ossec.conf
file in the agent side to apply the desired profile:
<client>
<server>
<address>10.0.1.4</address>
<port>1514</port>
<protocol>tcp</protocol>
</server>
<config-profile>redhat7</config-profile>
</client>
After this, restart the agents to apply the configuration.
# /var/ossec/bin/agent_control -R -a
If you prefer, you can restart a specific agent with option -u <id>
.
Step 2: Configure the manager
We only want to execute the RedHat security policy on Red Hat 7 agents.
To do this, modify the /var/ossec/etc/shared/default/agent.conf
file in the manager (assuming that the agent is on the default
group):
<agent_config profile="redhat7">
<wodle name="open-scap">
<content type="xccdf" path="com.redhat.rhsa-RHEL7.ds.xml"/>
</wodle>
</agent_config>
When the agents receive this configuration, they will restart to apply the changes and start the auditing.
Step 3: See alerts
When the evaluation is completed, you will see the results as OSSEC alerts:
/var/ossec/logs/alerts/alerts.log
Wazuh dashboard
Note that each field is extracted to facilitate searches and analysis.


Step 4: Dashboards
Finally, you can explore all scan results using the OpenSCAP module.

Overwriting the timeoutPermalink to this headline
It is possible to overwrite the timeout for a specific evaluation:
<wodle name="open-scap">
<timeout>1800</timeout>
<content type="xccdf" path="ssg-centos-7-ds.xml">
<timeout>120</timeout>
</content>
<content type="xccdf" path="ssg-centos-6-ds.xml"/>
</wodle>
Using profilesPermalink to this headline
We can limit the evaluation to only specific profiles of a policy:
<wodle name="open-scap">
<content type="xccdf" path="ssg-centos-7-ds.xml">
<profile>xccdf_org.ssgproject.content_profile_standard</profile>
<profile>xccdf_org.ssgproject.content_profile_pci-dss</profile>
</content>
<content type="xccdf" path="ssg-centos-6-ds.xml"/>
</wodle>
Using CPE dictionaryPermalink to this headline
You can also optionally specify the CPE dictionary file, which is used to determine which checks are relevant to specific platforms.
<wodle name="open-scap">
<content type="xccdf" path=policy="ssg-centos-7-ds.xml">
<cpe>file.xml</cpe>
</content>
<content type="xccdf" path="ssg-centos-6-ds.xml" />
</wodle>
Using IDsPermalink to this headline
You can select a specific ID of the datastream file:
<wodle name="open-scap">
<content type="xccdf" path="ssg-centos-7-ds.xml">
<datastream-id>id</datastream-id>
<xccdf-id>id</xccdf-id>
</content>
<content type="xccdf" path="ssg-centos-6-ds.xml" />
</wodle>