The OSSEC Log Inspection Engine is integrated into Vulnerability ProtectionVulnerability ProtectionDeep Security Agents and gives Vulnerability ProtectionDeep Security the ability to inspect the logs and events generated by the operating system and applications running on the computer. Log Inspection Rules can be assigned directly to computers or can be made part of a Policy. Like Integrity Monitoring Events, Log Inspection events can be configured to generate Alerts in the Vulnerability ProtectionDeep Security Manager.
Log Inspection icons:
From the main page you can:
Clicking New (
) or Properties (
) displays the Log Inspection Rules Properties window.
The name and description of the Log Inspection Rule, and -- if the rule is issued by Trend Micro -- the minimum versions of the Agent and the Vulnerability ProtectionDeep Security Manager that are required for the Rule to function.
Date when the rule was first issued and when it was last updated, as well as a unique identifier for the rule.
In the Content tab, select the "Basic Rule" template.
Enter a Rule ID. A Rule ID is a unique identifier for the rule. OSSEC defines 100000 - 109999 as the space for User-defined rules. (Vulnerability ProtectionDeep Security Manager will pre-populate the field with a new unique Rule ID.)
Give the rule a level. Zero (0) means the rule never logs an event, although other rules that watch for this rule may fire. (See the dependency fields below.)
Optionally assign the rule to one or more comma-separated groups. This can come into play when dependency is used since you can create rules that fire on the firing of a rule, or a rule that belongs to a specific group.
This is the pattern the rule will look for in the logs. The rule will be triggered on a match. Pattern matching supports Regular Expressions or simpler String Patterns. The "String Pattern" pattern type is faster than RegEx but it only supports three special operations:
Frequency is the number of times the rule has to match within a specific time frame before the rule is triggered.
Time Frame is the period of time in seconds within which the rule has to trigger a certain number of times (the frequency, above) to log an event.
Setting a dependency on another rule will cause your rule to only log an event if the rule specified in this area has also triggered.
Type the full path to the file(s) you want your rule to monitor and specify the type of file it is.
Select whether this rule triggers an alert in the Vulnerability ProtectionDeep Security Manager or not.
The "Alert Minimum Severity" setting is only used if you have written "multiple rules" within your rule -- something that cannot be done using the "Basic" template. However, if after creating your rule using the "Basic' template, you edit the XML of the rule and add additional rules to the XML which have different severity levels, you can use the "Alert Minimum Severity Level" drop-down menu to set the minimum severity from the multiple rules which will trigger an Alert.
Lists which Security Profiles or computers are using this Log Inspection Rule.
Vulnerability ProtectionDeep Security can be configured to perform regular Recommendation Scans which scan a computer and make recommendations about the application of various Security Rules. Selecting this checkbox will automatically assign recommended Log Inspection Rules to the computer and automatically unassign rules that are not required.
To turn the recommendation engine on or off, go to Policy/Computer Editor > Settings > Scanning.