- This article already assumes that you have installed MyDLP and DLP functions are working properly.
- This article already assumes that your AlienVault / OSSIM is functioning properly.
After version MyDLP v0.9.144 (05.09.2012), as defaults, MyDLP is logging to Syslog using CEF (Common Event Format). It makes very easy to integrate with any kind of SIEM solution including AlienVault / OSSIM. MyDLP logs to Syslog using UDP, it is fast, but it is not a very secure way to transfer logs. If your network is not secure and vulnerable to sniffing or spoofing attacks, you should not use UDP to transfer logs. In this situation, we recommend that you should use MyDLP’s bundled rsyslog server to proxy log transfer. In the links below, how to redirect logs to a remote rsyslog server securely is explained. As mentioned before, MyDLP logs to its bundled rsyslog server as defaults. All you need to do is redirect them. List to related pages:
Otherwise, if you want to directly integrate MyDLP with your AlienVault / OSSIM using UDP (also this is the faster method), you can easily make required configurations using MyDLP Management Console. In MyDLP Enterprise Edition, it is possible to modify MyDLP’s default logging destination to any custom server (in this case AlienVault / OSSIM). To do this;
- Open MyDLP Web Management Console and Login
- Go to Settings tab
- Go to Enterprise subtab
- Enter IP Address of AlienVault / OSSIM to Syslog Host (ACL Logs) input
- Enter UDP Listener port of AlienVault / OSSIM (default port is 514) to Syslog Port (ACL Logs) input
- Click Save
- Click Install Policy
The changes you’ve made should take effect immediately. But, we still need to add and register MyDLP plugin to AlienVault / OSSIM in order to see incidents in AlienVault / OSSIM UI. To do this;
- Connect AlienVault / OSSIM Server using SSHand acquire a root shell
- Create a new directory for temporary installation files and navigate into it.
- Download auto configuration script from ( src/sysconf/ossim/configure-ossim.sh in firstname.lastname@example.org )
- Add execute rights and execute.
In other words:
chmod +x configure-ossim.sh
Now, you should be trace data leakage incidents using AlienVault / OSSIM.