|Applies to Product:||USM Appliance™||AlienVault OSSIM®|
In AlienVault USM Appliance version 5.3, Host Intrusion Detection System (HIDS) rules and plugins have been updated to capture USB device events on Windows machines.
Configuration Changes on the HIDS Agent
If you are deploying USM Appliance version 5.3 or later, you do not need to do anything. This feature is enabled by default.
If you are updating to USM Appliance version 5.3 or later from a previous version, and you want to use the USB device detection feature, you need to do one of the following:
- On the host you wish to monitor, remove the existing HIDS agent and redeploy it. For instructions, see Deploy AlienVault HIDS Agents to Windows Hosts.
- Alternatively, you can change the configuration on Windows manually, as detailed below.
Since full_command must be configured in each Windows system's ossec.conf file, you need to change the HIDS agent configuration on each Windows machine that you want to monitor USB devices.
To change the configuration on the client machine:
- Navigate to C:\Program Files (x86)\ossec-agent.
- Open ossec.conf with a text editor.
Locate the line "<ossec_config>" and add the following configuration right below that line:
<command>wmic logicaldisk where drivetype=2 get deviceid, description, FileSystem, Size, VolumeSerialNumber</command>
Your configuration file should look similar to this:
Launch the win32ui application located in the same directory.
- Select Manage.
Once USB activity has been detected on that host, you should be able to see new AlienVault HIDS events with the event name AlienVault HIDS: New USB Device Found. And the Event Details pane includes information about Drive, FileSystem, Size, and Serial Number:
AlienVault OSSIM Limitations: Both AlienVault OSSIM and the USM Appliance HIDS decoders are fully featured, with all of their information coming from the Plugin Feed Updates that USM Appliance and AlienVault OSSIM provide. However, AlienVault OSSIM lacks the depth of NIDS information that is provided to USM Appliance through the Threat Intelligence Updates.