The above copyright notice and this permission notice shall be included in allĬopies or substantial portions of the Software. To use, copy, modify, merge, publish, distribute, sublicense, and/or sellĬopies of the Software, and to permit persons to whom the Software isįurnished to do so, subject to the following conditions: In the Software without restriction, including without limitation the rights Of this software and associated documentation files (the "Software"), to deal Permission is hereby granted, free of charge, to any person obtaining a copy LicenseĬopyright (c) 2017 Palantir Technologies Inc. PS> copy-item c:\ProgramData\osquery\osquery_no_tls.flags c:\ProgramData\osquery\osquery.flags -force # Non-TLS server testingĬontributions, fixes, and improvements can be submitted directly against this project as a GitHub issue or pull request. PS> copy-item osquery-configuration/Fleet/Endpoints/packs/* c:\ProgramData\osquery\packs PS> copy-item osquery-configuration/Fleet/Endpoints/Windows/* c:\ProgramData\osquery Assuming you'd like to use the endpoint configs, you can use the commands below to apply them: Configure the fleetctl utility to communicate with your Fleet serverĤ. Enroll hosts to your Fleet server by configuring the appropriate ģ. Logs are located in /var/log/osquery (Linux/MacOS) and c:\ProgramData\osquery\logs (Windows)Ģ.Start osquery via sudo osqueryctl start on Linux/MacOS or Start-Process osqueryd on Windows.Copy the nf and osquery.flags files from this repository onto the system and match the directory structure shown below.The subscriber for user_events is disabled.Requires the nf pack found to be located at /etc/osquery/packs/nf.File integrity monitoring is enabled for specific files and directories defined in nf.Ensure auditd is disabled or removed from the system where this will be running as it may conflict with osqueryd. Auditing mode is enabled for processes and network events. This configuration assumes the destination operating system is Linux-based and that the hosts are online at all times.These configuration files utilize packs within the packs folder and may generate errors if started without them.We use Windows Event Forwarding and don't have a need for osquery to process Windows event logs. Events are disabled on Windows via the -disable_events flag in osquery.flags.File integrity monitoring on MacOS is enabled for specific files and directories defined in nf.We have also included non-TLS flagfiles for local testing. The flags included in this configuration enable TLS client mode in osquery and assume it will be connected to a TLS server.The configurations in this folder are meant for MacOS and Windows and the interval timings assume that these hosts are only online for ~8 hours per day.Note: We recommend that you spin up a lab environment before deploying any of these configurations to a production This configuration has process and network auditing enabled, so expect an exponentially higher volume of logs to be returned from the agent. Servers: The contents of this folder are tailored towards monitoring Linux servers.We purposely set the interval to this value because the interval timer only moves forward when a host is online and we would only expect an endpoint to be online for about 8 hours, or 28800 seconds, per day. You may notice the interval of many queries in this folder set to 28800. Endpoints: The contents of this folder are tailored towards monitoring MacOS and Windows endpoints that are not expected to be online at all times.Within each of those folders, you will find the following subdirectories: The Fleet directory contains YAML files to be imported into Kolide's Fleet osquery management tool.The Classic directory contains configuration files for a standard osquery deployment.At the top level, there are two directories titled "Classic" and "Fleet".In order to ensure you receive the most up to date version of the pack, please view them using the links below: Note: We also utilize packs that are maintained in the official osquery project. Operators have carefully considered the datasets to be collected and the potential use-cases for that data. That are more tailored to our specific environment that may be useful to some or at least serve as a reference to other organizations. However, we have included additional query packs Our belief that queries which are likely to have a high level of utility for a large percentage of users should be committed directly to the osquery project, which isĮxactly what we have done with our unwanted-chrome-extensions query pack and additions to the windows-attacks pack. The goal of this project is to provide a baseline template for any organization considering a deployment of osquery in a production environment. This repository is the companion to the osquery Across the Enterprise blog post. Palantir osquery Configuration About This Repository
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |