Applies to Product: | USM Appliance™ | LevelBlue OSSIM® |
You can deploy an LevelBlue HIDS agent to a host
-
Through the Getting Started Wizard
This option supports deployment to Windows hosts and agentless deployment to Linux hosts. For instructions, see Deploying HIDS to Servers, in the Getting Started Wizard topic.
-
From the Asset List View
This option supports deployment to Microsoft Windows servers only. For instructions, see Deploying HIDS Agents, in Asset Management.
-
From the HIDS management view
This option supports deployment to Windows and Linux hosts.
For Microsoft Windows hosts, USM Appliance generates a binary file containing the appropriate server configuration and authentication key. You can choose to let USM Appliance install the file for you, or download the file and install it on the host yourself.
Before you can deploy a HIDS agent to the Windows machine, make sure that it meets the following requirements.
- If using any network accelerator devices in the environment, you must add USM Appliance Sensor to their allowlist. This is because the USM Appliance Sensor utilizes SMB (Server Message Block) to transfer the HIDS agent installation package to the Windows machine. If the network accelerator tries to optimize the traffic from the USM Appliance Sensor, it may cause the HIDS deployment to fail.
-
The operating system must be one of the following
- Microsoft Windows XP
- Windows 7, 8, or 10
- Windows Server 2003, 2008R2, or 2012R2
-
You need to use a user account that belongs to the same Administrators group as the local Administrator account.
Note: For security reasons, the local Administrator account is disabled by default on all versions of Windows currently in mainstream support. In order for the HIDS deployment to succeed, you need to enable the local Administrator account (not recommended), or create a user account and add it to the built-in Administrators group.
-
You must have changed the target Windows machine based on the steps below.
To change the settings on Windows XP- Go to Control Panel > Folder Options > View.
- Deselect Use simple file sharing.
- Go to Control Panel > Windows Firewall > Exceptions.
- Select File and Printer Sharing.
To change the settings on Windows 7- Go to Control Panel > Folder Options > View.
- Deselect Use Sharing Wizard (Recommended).
- Go to Control Panel > System and Security > Windows Firewall > Advanced Settings > Inbound Rules.
- Enable File and Printer Sharing (SMB-In).
- Go to Control Panel > User Accounts > Change User Account Control Settings.
- Move the slider to Never notify.
To change the settings on Windows Server 2003, 2008 R2, and 2012 R2- Go to Control Panel > Windows Firewall > Advanced Settings > Inbound Rules.
- Enable File and Printer Sharing (SMB-In).
- To allow NTLMv2 security, run gpedit.msc.
-
Go to Local Security > Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options and change these settings.
- Network Security: Minimum session security for NTLMSPP based (including secure RPC) clients, select
- Require NTLMv2 session security
- Require 128-bit encryption
- Network Security: Minimum session security for NTLMSPP based (including secure RPC) servers, select
- Require NTLMv2 session security
- Require 128-bit encryption
- Network Security: LAN Manager Authentication level, select
- Send NTLMv2 response only\refuse LM & NTLM
- Network Security: Minimum session security for NTLMSPP based (including secure RPC) clients, select
To change the settings on Windows 8 and 10- Go to Control Panel > Folder Options > View.
- Deselect Use Sharing Wizard (Recommended).
- Go to Control Panel > System and Security > Windows Firewall > Advanced Settings > Inbound Rules.
- Enable File and Printer Sharing (SMB-In).
- Enable Windows Management Instrumentation (WMI) entry.
- Go to Control Panel > User Accounts > Change User Account Control Settings.
- Move the slider to Never notify.
-
Open Group Policy.
- Go to Local Policies > Security Options
- Set Network access: Shares that can be accessed anonymously to IPC.
- Set User Account Control: Run all administrators in Admin Approval Mode to Disabled (recommended).
- Apply changes and restart the machine.
Note: The Winexe installation utility may trigger a false positive alert as a “potential hacking tool” during an authorized application installation, even though the Winexe remote installation is an authorized action. In this instance, the best practices are to either allowlist the IP address of USM Appliance, or temporarily disable the antivirus software during the installation.
To deploy the LevelBlue HIDS agent to a Windows host
- Go to Environment > Detection.
-
Go to HIDS > Agents > Agent Control > Add Agent.
-
On New HIDS Agent, select the host from the asset tree.
USM Appliance populates Agent Name with the host name, and IP/CIDR with the host IP address automatically.
-
Click Save.
USM Appliance adds the new agent to the list.
- To deploy the agent, click the button in the Actions column.
-
In Automatic Deployment for Windows, type the Domain (optional), User, and Password of the host; then click Save.
USM Appliance assembles a preconfigured binary file and deploys it to the host.
-
Alternatively, to download the preconfigured binary file, click the button in the Actions column.
Your browser downloads the file automatically or prompts you for the download.
-
Transfer the file, named ossec_installer_<agent_id>.exe, to the Microsoft Windows host.
-
On the Windows host, double-click to run the executable.
The installer runs in a console briefly, then displays a progress bar until completion.
Important: For Linux hosts, depending on which distribution of Linux you use, LevelBlue recommends that you download the corresponding ossec-hids-agent installer file from the OSSEC's Downloads page directly, and then follow their instructions to complete the installation.
After you have successfully installed the HIDS agent on the Linux host, perform the steps below to connect it to USM Appliance.
To add the HIDS agent to USM Appliance
- Go to Environment > Detection.
- Go to HIDS > Agents > Agent Control > Add Agent.
-
On New HIDS Agent, select the host from the asset tree.
USM Appliance populates Agent Name with the host name, and IP/CIDR with the host IP address automatically.
-
Click Save.
USM Appliance adds the new agent to the list.
-
To extract the key for the agent, click the button in the Actions column, and then copy the key that displays.
-
Login to the Linux host, run /var/ossec/bin/manage_agents, and then enter I to import the key you copied in the previous step.
Note: On some installations, Centos, for example, the command may be manage_client instead of manage_agents.
- Edit /var/ossec/etc/ossec-agent.conf to change the server IP address to the USM Appliance.
-
Start the HIDS agent if it is not already running:
service ossec start
chkconfig ossec-hids on
- On the USM Appliance, go to Environment > Detection, click HIDS Control, and then Restart.
You can verify the deployment both on the HIDS agent and in USM Appliance.
On the HIDS agents, you can check the ossec.log file to make sure that a message similar to the following exists:
2015/09/18 09:07:38 ossec-agent: INFO: Started (pid: 3440).
2015/09/18 09:07:38 ossec-agent(4102): INFO: Connected to the server (10.47.30.100:1514).
To check the agent log file on the Windows hosts
- Go to Start > OSSEC > Manage Agent.
-
In OSSEC Agent Manager, click View and select View Logs.
This opens the ossec.log file on the agent.
To check the agent log file on the Linux hosts
- Login to the Linux host.
-
In a console, enter the following:
more /var/ossec/logs/ossec.log
On the USM Appliance, make sure there are LevelBlue HIDS events.
To verify the HIDS deployment in USM Appliance
-
Go to Environment > Detection.
The Overview page for HIDS displays.
-
Ensure that the Status column for the deployed agents display Active, and the Trend chart is not empty.
- To see the LevelBlue HIDS events from a specific agent, go to Analysis > Security Events (SIEM).
-
In Data Sources, select LevelBlue HIDS; change Event Name to Src IP, enter the IP addresses of the HIDS agent, and then click Go.
The LevelBlue HIDS events from the particular agent display.
By default, USM Appliance updates the HIDS Agent information in its database every 60 minutes. If you want to increase the frequency, you can change the refresh rate under Configuration > Administration > Main > Detection.
You may see the following messages in the web UI when deploying LevelBlue HIDS agents in USM Appliance.
Message |
Explanation |
---|---|
Agent ID '<agent_id>' is not valid. Agent ID has to be 1-4 digital characters. | The HIDS agent ID provided is not valid. |
Cannot create HIDS agent '<agent_name>' on the sensor '<sensor_id}>'. | The HIDS agent cannot be added to the given sensor. |
Cannot get HIDS agents related to asset <asset_id>. | The HIDS agent information cannot be retrieved. |
Cannot resolve the given asset <asset_id>. | The asset ID is not a valid UUID. |
Cannot resolve the given sensor <sensor_id>. | The sensor ID is not found in the database. |
Deployment IP '<ip_address>' is not valid IP address. | The IP address provided is not a valid IP address. |
HIDS Agent cannot be deployed. Reason: <error_msg>. | The errors received from the commands used to deploy the HIDS agent in the target host. |
HIDS agent successfully deployed. | The HIDS agent deployment is successful. |
Invalid Credentials: '<username>' is not valid username. | The username contains characters that are not allowed. |
Invalid Credentials: Password is not valid. | The password contains characters that are not allowed. |
Sorry, deployment job cannot be launched due to an error when sending the request. Please try again. | The job to deploy the HIDS agent cannot be launched. |