-
Notifications
You must be signed in to change notification settings - Fork 563
[Rule Tuning] Changes to rules due to lack of file changes events in Linux Endpoint Security #1673
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Leaving this one in draft until we discuss the implications |
note = """## Config | ||
|
||
This rule requires an additional setup in Auditbeat to log changes to the files specified in the query. | ||
|
||
In the file_integrity module on Auditbeat configuration file, add these values to the paths section: | ||
|
||
``` | ||
- /etc/pam.d | ||
``` | ||
""" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can suggest changes to auditbeat configurations in file_integrity or audit_rules section. I'll be using file_integrity to paths and audit_rules for specific files
Closing this one as I'm trying to figure out alternative ways of dealing with the issue, some rules aim to monitor files that are located in multiple directories. The file integrity module can solve this with the recursive option. Still, it doesn't contain any information related to the process responsible for the modification, making it impossible to make exclusions. |
Issues
Resolves #1608
Summary
The current endpoint security for Linux does not log file changes, which cause our rules to not fire when they should.
Here are some points that this PR aims to discuss and solve: