Skip to content

Commit eed3605

Browse files
authored
Merge pull request #174 from Security-Onion-Solutions/dev
2.4.200
2 parents 1fded7d + 531c573 commit eed3605

File tree

124 files changed

+764
-220
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

124 files changed

+764
-220
lines changed

airgap.rst

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,10 @@ Airgap mode works as follows:
2525
Rule Updates
2626
------------
2727

28-
Our ISO image includes the Emerging Threats (ET) ruleset. When :ref:`soup` updates an airgap system via ISO, it automatically installs the latest ET rules as well. If you would like to switch to a different ruleset like Emerging Threats Pro (ETPRO), then you can manually copy the ETPRO rules to ``/nsm/rules/suricata/emerging-all.rules`` using a command like:
28+
Our ISO image includes the latest version of various rulesets and will automatically install them when an airgap system is SOUP'ed via ISO:
2929

30-
::
30+
- :ref:`nids`: Emerging Threats (ETOPEN). If you would like to switch to a different ruleset like Emerging Threats Pro (ETPRO), refer to our Ruleset config documentation :ref:`nids`
3131

32-
cat /path/to/ETPRO_rules/*.rules > /nsm/rules/suricata/emerging-all.rules
32+
- :ref:`yara`: Most recent rules from our repo
33+
34+
- :ref:`sigma`: Most recent rule packages from the SigmaHQ repo

architecture.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -45,10 +45,10 @@ For more information, please see the :ref:`desktop` section.
4545
Distributed
4646
-----------
4747

48-
A standard distributed deployment includes a **manager node**, one or more **forward nodes** running network sensor components, and one or more **search nodes** running Elastic search components. This architecture may cost more upfront, but it provides for greater scalability and performance, as you can simply add more nodes to handle more traffic or log sources.
48+
A standard distributed deployment includes a **manager node**, one or more **sensor nodes** running network sensor components, and one or more **search nodes** running Elastic search components. This architecture may cost more upfront, but it provides for greater scalability and performance, as you can simply add more nodes to handle more traffic or log sources.
4949

5050
- Recommended deployment type
51-
- Consists of a manager node, one or more forward nodes, and one or more search nodes
51+
- Consists of a manager node, one or more sensor nodes, and one or more search nodes
5252

5353
.. note::
5454

@@ -102,12 +102,12 @@ A manager search node runs the following components:
102102
- :ref:`elastalert`
103103
- :ref:`redis`
104104

105-
Forward Node
105+
Sensor Node
106106
~~~~~~~~~~~~
107107

108-
A ``forward node`` forwards alerts and logs from :ref:`suricata` and :ref:`zeek` via :ref:`elastic-agent` to :ref:`logstash` on the manager node, where they are stored in :ref:`elasticsearch` on the manager node or a search node (if the manager node has been configured to use a search node). Full packet capture recorded by :ref:`stenographer` or :ref:`suricata` remains on the forward node itself.
108+
A ``sensor node`` forwards alerts and logs from :ref:`suricata` and :ref:`zeek` via :ref:`elastic-agent` to :ref:`logstash` on the manager node, where they are stored in :ref:`elasticsearch` on the manager node or a search node (if the manager node has been configured to use a search node). Full packet capture recorded by :ref:`stenographer` or :ref:`suricata` remains on the sensor node itself.
109109

110-
Forward nodes run the following components:
110+
Sensor nodes run the following components:
111111

112112
- :ref:`zeek`
113113
- :ref:`suricata`

build.sh

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
BUILDDIR=/tmp/securityonion-docs/autobuild
2+
rm -rf $BUILDDIR
23
python -m venv .venv
34
source .venv/bin/activate
45
python -m pip install pip
56
pip install -r requirements.txt
67
pip install sphinx-autobuild
7-
sphinx-autobuild --port 4444 -b html -d $BUILDDIR/doctrees -T -j auto -W . $BUILDDIR/html
8+
sphinx-autobuild --port 4444 -b html -d $BUILDDIR/doctrees -T -j auto -W --pre-build "rm -rf $BUILDDIR/html/_static" --watch . . $BUILDDIR/html

cloud-amazon.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ If connecting sensors through the VPN instance you will need to add the inside i
190190
Location: Remote Location: Remote Location: AWS Location: AWS
191191
192.168.33.13 192.168.33.10 10.55.1.10 10.55.1.20
192192

193-
In order to add the Remote Network Forward Node to the Grid, you would have to add ``10.55.1.10`` to the ``sensor`` firewall hostgroup.
193+
In order to add the Remote Network Sensor Node to the Grid, you would have to add ``10.55.1.10`` to the ``sensor`` firewall hostgroup.
194194

195195
This change can be done in the SOC Configuration screen. Then, either wait up to 15 minutes for the scheduled configuration sync to run, or force a synchronization immediately via the SOC Configuration Options. Once the firewall hostgroup configuration has been synchronized your Manager will be ready for remote minions to start connecting.
196196

cloud-google.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ If connecting sensors through the VPN instance you will need to add the inside i
225225
Location: Remote Location: Remote Location: Googe Location: Google
226226
192.168.33.13 192.168.33.10 10.55.1.10 10.55.1.20
227227

228-
In order to add the Remote Network Forward Node to the Grid, you would have to add ``10.55.1.10`` to the ``sensor`` firewall hostgroup.
228+
In order to add the Remote Network Sensor Node to the Grid, you would have to add ``10.55.1.10`` to the ``sensor`` firewall hostgroup.
229229

230230
This change can be done in the SOC Configuration screen. Then, either wait up to 15 minutes for the scheduled configuration sync to run, or force a synchronization immediately via the SOC Configuration Options. Once the firewall hostgroup configuration has been synchronized your Manager will be ready for remote minions to start connecting.
231231

configuration.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Standalone is similar to Evaluation in that it only requires a single box, but S
3636
Production Server - Distributed Deployment
3737
------------------------------------------
3838

39-
If deploying a distributed environment, install and configure the manager node first and then join the other nodes to it. For best performance, the manager node should be dedicated to just being a manager for the other nodes (the manager node should not do any network sniffing, that should be handled by dedicated forward nodes).
39+
If deploying a distributed environment, install and configure the manager node first and then join the other nodes to it. For best performance, the manager node should be dedicated to just being a manager for the other nodes (the manager node should not do any network sniffing, that should be handled by dedicated sensor nodes).
4040

4141
Build the manager by running Setup, selecting the ``DISTRIBUTED`` deployment option, and choosing the ``New Deployment`` option. You can choose either ``MANAGER`` or ``MANAGERSEARCH``. If you choose ``MANAGER``, then you must join one or more search nodes (this is optional if you choose ``MANAGERSEARCH``) and you will want to do this before you start joining other node types.
4242

detections.rst

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,8 @@ Here is the list of possible status messages and what they mean:
3030
- **Migration Failed**: A failure occurred during the migration. The migration will stop on the first error and will not attempt to migrate to newer versions until the issue is resolved.
3131
- **Synchronizing**: A rule synchronization is in progress. This occurs daily, to ensure the Security Onion grid has the latest rules.
3232
- **Sync Failed**: A failure occurred during the synchronization procedure. The next sync will retry within a few minutes.
33-
- **Rule Mismatch**: An integrity check process detected a mismatch between the deployed rules and the enabled rules. The SOC log will note the specific mismatched rules. One possible reason for this is if you had previously added custom rules to /opt/so/saltstack/local/salt/idstools/rules/local.rules and, if this is the case, then you can remove the rules from that file and re-add them using the Detections interface. Another possible reason is that :ref:`elasticsearch` has reached its disk watermark setting and is no longer allowing updates to the Detections indices.
33+
- **Sync Blocked**: Rule synchronization is currently blocked.
34+
- **Rule Mismatch**: An integrity check process detected a mismatch between the deployed rules and the enabled rules. The SOC log will note the specific mismatched rules. One possible reason is that :ref:`elasticsearch` has reached its disk watermark setting and is no longer allowing updates to the Detections indices.
3435
- **OK**: No known issues with the rule engine.
3536

3637
.. tip::
@@ -147,8 +148,8 @@ Elastalert/Sigma
147148
- Immediate change in the UI and on disk
148149

149150
Suricata/NIDS
150-
- UI Bulk and Individual: Immediate change in the UI, disk change once the `idstools` state runs again
151-
- Regex: UI and disk change once the `soc` state runs again and the :ref:`suricata` engine syncs
151+
- UI Bulk and Individual: Immediate change in the UI and on disk
152+
- Regex: UI and disk change once the :ref:`suricata` engine syncs
152153

153154
Strelka/YARA
154155
- Immediate change in the UI, disk change once the `strelka` state runs again
@@ -160,7 +161,7 @@ Elastalert/Sigma
160161
- Immediate change in the UI and on disk
161162

162163
Suricata/NIDS
163-
- Immediate change in the UI, disk change once the `idstools` state runs again
164+
- Immediate change in the UI and on disk
164165

165166
Strelka/YARA
166167
- N/A
@@ -173,9 +174,7 @@ Elastalert/Sigma
173174
- Git repo (https or disk): UI and disk change once the `soc` state runs again and the :ref:`elastalert` engine syncs
174175

175176
Suricata/NIDS
176-
- ETOPEN/ETPRO: UI and disk change once the `soc` and `idstools` states run again and the :ref:`suricata` engine syncs
177-
- Custom URL: UI and disk change once the `soc` and `idstools` states run again and the :ref:`suricata` engine syncs
178-
- Custom Local File: UI and disk change once the `soc` and `idstools` states run again and the :ref:`suricata` engine syncs
177+
- All ruleset sources (ETOPEN, ETPRO, custom URL, local directory): UI and disk change once the :ref:`suricata` engine syncs
179178

180179
Strelka/YARA
181180
- Git repo (https or disk): UI and disk change once the `soc` state runs again and the :ref:`strelka` engine syncs

elastic-agent.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Each Security Onion node uses the Elastic Agent to transport logs to :ref:`elast
1111

1212
.. note::
1313

14-
In order to receive logs from the Elastic Agent, Security Onion must be running :ref:`logstash`. Evaluation Mode and Import Mode do not run :ref:`logstash`, so you'll need Standalone or a full Distributed Deployment. In a Distributed Deployment, forward nodes do not run :ref:`logstash`, so you'll need to configure agents to send to your manager or receiver nodes. For more information, please see the :ref:`architecture` section.
14+
In order to receive logs from the Elastic Agent, Security Onion must be running :ref:`logstash`. Evaluation Mode and Import Mode do not run :ref:`logstash`, so you'll need Standalone or a full Distributed Deployment. In a Distributed Deployment, sensor nodes do not run :ref:`logstash`, so you'll need to configure agents to send to your manager or receiver nodes. For more information, please see the :ref:`architecture` section.
1515

1616
To deploy an Elastic agent to an endpoint, go to the :ref:`soc` :ref:`downloads` page and download the proper Elastic agent for the operating system of that endpoint.
1717

0 commit comments

Comments
 (0)