Downloads

Source Downloads

Latest development snapshots
Server/Agent https://github.com/ossec/ossec-hids/releases
Web UI https://github.com/ossec/ossec-wui/releases
Docs https://github.com/ossec/ossec-docs
Latest Stable Release (2.9.0) Checksum Signature
Server/Agent Unix ossec-hids-2.9.0.tar.gzRelease Notes   GPG Unix
Agent Windows ossec-agent-win32-2.9.0.exe   GPG Windows
Virtual Appliance ossec-vm-2.8.3.ovaREADME VA Checksum  
Docker Container wazuh/docker-ossec    

Ubuntu, and Debian and others

Ubuntu
12 (precise) https://updates.atomicorp.com/channels/ossec/ubuntu/pool/main/o/
14 (trusty) https://updates.atomicorp.com/channels/ossec/ubuntu/pool/main/o/
16 (xenial) https://updates.atomicorp.com/channels/ossec/ubuntu/pool/main/o/
Debian
7 (wheezy) https://updates.atomicorp.com/channels/ossec/debian/pool/main/o/
8 (jessie) https://updates.atomicorp.com/channels/ossec/debian/pool/main/o/

Yum/DNF Automated Installation on Centos, Redhat, or Fedora

Automated installer:

# Add Yum repo configuration
wget -q -O - https://updates.atomicorp.com/installers/atomic | sudo bash

# Server
sudo yum install ossec-hids-server

# Agent
sudo yum install ossec-hids-agent

Manual Yum/DNF installation on Centos, Redhat, Amazon Linux or Fedora

  1. Download the atomic-release file for your distribution
  2. Install the atomic-relase package (Note: This includes the OSSEC GPG key)
sudo rpm -Uvh atomic-release*rpm
  1. Install ossec package
# Server
sudo yum install ossec-hids server

# Agent
sudo yum install ossec-hids-agent

APT Automated Installation on Ubuntu and Debian

# Add Apt sources.lst
wget -q -O - https://updates.atomicorp.com/installers/atomic | sudo bash

# Server
apt-get install ossec-hids-server

# Agent
apt-get install ossec-hids-agent

Manual APT Installation on Ubuntu and Debian

  1. Add the GPG key
wget -q -O - https://www.atomicorp.com/RPM-GPG-KEY.art.txt  | sudo apt-key add -
  1. Add the repo configuration to sources.list
source /etc/lsb-release

# Ubuntu
echo "deb https://updates.atomicorp.com/channels/atomic/ubuntu $DISTRIB_CODENAME main" >>  /etc/apt/sources.list.d/atomic.list

# Debian
echo "deb https://updates.atomicorp.com/channels/atomic/debian $DISTRIB_CODENAME main" >>  /etc/apt/sources.list.d/atomic.list

GPG / PGP key

Key Manual Download Link
OSSEC-ARCHIVE-KEY.asc https://ossec.github.io/files/OSSEC-ARCHIVE-KEY.asc
OSSEC-PGP-KEY.asc https://ossec.github.io/files/OSSEC-PGP-KEY.asc
RPM-GPG-KEY.art.txt https://www.atomicorp.com/RPM-GPG-KEY.art.txt

Before you install any package from our project, we recommend that you verify it using our PGP key. Follow these two steps if you are not used to using gpg. You first need to import our public key:

# wget https://ossec.github.io/files/OSSEC-ARCHIVE-KEY.asc
# gpg --import OSSEC-ARCHIVE-KEY.asc

And then verify each file against its signature:

ossec-test# gpg --verify file.asc

You should get the following result:

gpg: Signature made Tue 20 Dec 2016 11:35:58 AM EST using RSA key ID 2D8387B7
gpg: Good signature from "Scott R. Shinn <scott@atomicorp.com>"
Primary key fingerprint: B50F B194 7A0A E311 45D0  5FAD EE1B 0E6B 2D83 87B7

Note that the signing key was changed in December 2016. The previous signing key “6F11 9E06 487A AF17 C84C E48A 456B 17CF A390 1351” has expired. If you get an warning saying “gpg: Note: This key has expired!”, make sure to update the key and run the “import” command again (as specified above).

Contribute back!

If you find ossec useful and would like to contribute back to the community, please contact us. We have a lot of work to do and any help is appreciated.