|Latest development snapshots|
|Latest Stable Release (2.8.3)|
|Server/Agent Unix||ossec-hids-2.8.3.tar.gz – Release Notes||Unix Checksum|
|Agent Windows||ossec-agent-win32-2.8.3.exe||Win Checksum|
|Virtual Appliance||ossec-vm-2.8.3.ova – README||VA Checksum|
Available in the Atomicorp repository.
|All||6 - 20|
To install with yum do the following:
# wget -q -O – https://www.atomicorp.com/installers/atomic | sh # yum install ossec-hids ossec-hids-server (or ossec-hids-client for the agent)
Before you install any package from our project, we recommend that you verify it using our PGP key. Follow these two steps if you are not used to using gpg. You first need to import our public key:
ossec-test# wget https://ossec.github.io/files/OSSEC-PGP-KEY.asc ossec-test# gpg –import OSSEC-PGP-KEY.asc
And then verify each file against its signature:
ossec-test# gpg –verify file.sig file
You should get the following result:
gpg: Signature made Tue 19 Jul 2011 03:13:58 PM BRT using RSA key ID A3901351 gpg: Good signature from “Daniel B. Cid ” Primary key fingerprint: 6F11 9E06 487A AF17 C84C E48A 456B 17CF A390 1351
Note that the key expiration date was changed lately. If you get an warning saying “gpg: Note: This key has expired!”, make sure to update the key and run the “import” command again (as specified above).
Several of the OSSEC Project Team members have presented at conferences. Here is a collection of materials from some of those presentations.
|Decoding AWS CloudTrail with OSSEC|
|Log Analysis Using OSSEC|
|Making the Most of OSSEC|
|Malware Detection with OSSEC|
|Open Source Security|
|OSSEC Active Response and Self Healing|
|OSSEC and OSSIM Unified Open Source Security|
|OSSEC at Scale|
|OSSEC Con 2012 Day 1|
|OSSEC Con 2012 Day 2|
|OSSEC Log Management with Elasticsearch|
|OSSEC PCI Solution 2.0|
If you find ossec useful and would like to contribute back to the community, please contact us. We have a lot of work to do and any help is appreciated.