|Latest development snapshots|
|Latest Stable Release (2.8.3)|
|Server/Agent Unix||ossec-hids-2.8.3.tar.gz – Release Notes||Unix Checksum||signature|
|Agent Windows||ossec-agent-win32-2.8.3.exe||Win Checksum|
|Virtual Appliance||ossec-vm-2.8.3.ova – README||VA Checksum|
Available in the Atomicorp repository.
|CentOS / Redhat|
|Legacy||6 - 22|
# wget -q -O – https://www.atomicorp.com/installers/atomic | sh # yum install ossec-hids ossec-hids-server (or ossec-hids-client for the agent)
Before you install any package from our project, we recommend that you verify it using our PGP key. Follow these two steps if you are not used to using gpg. You first need to import our public key:
# wget https://ossec.github.io/files/OSSEC-ARCHIVE-KEY.asc # gpg --import OSSEC-ARCHIVE-KEY.asc
And then verify each file against its signature:
ossec-test# gpg --verify file.asc
You should get the following result:
gpg: Signature made Tue 20 Dec 2016 11:35:58 AM EST using RSA key ID 2D8387B7 gpg: Good signature from "Scott R. Shinn <firstname.lastname@example.org>" Primary key fingerprint: B50F B194 7A0A E311 45D0 5FAD EE1B 0E6B 2D83 87B7
Note that the signing key was changed in December 2016. The previous signing key “6F11 9E06 487A AF17 C84C E48A 456B 17CF A390 1351” has expired. If you get an warning saying “gpg: Note: This key has expired!”, make sure to update the key and run the “import” command again (as specified above).
|Key||Manual Download Link|
Several of the OSSEC Project Team members have presented at conferences. Here is a collection of materials from some of those presentations.
|Decoding AWS CloudTrail with OSSEC|
|Log Analysis Using OSSEC|
|Making the Most of OSSEC|
|Malware Detection with OSSEC|
|Open Source Security|
|OSSEC Active Response and Self Healing|
|OSSEC and OSSIM Unified Open Source Security|
|OSSEC at Scale|
|OSSEC Con 2012 Day 1|
|OSSEC Con 2012 Day 2|
|OSSEC Log Management with Elasticsearch|
|OSSEC PCI Solution 2.0|
If you find ossec useful and would like to contribute back to the community, please contact us. We have a lot of work to do and any help is appreciated.