Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Agentless Monitoring with Tripwire Enterprise: What You Need to Know
  • Data Breach
  • Vulnerabilities

Agentless Monitoring with Tripwire Enterprise: What You Need to Know

5 years ago John Salmi
Agentless Monitoring with Tripwire Enterprise: What You Need to Know

As we know, Tripwire Enterprise (TE) is the de-facto go-to solution for File Integrity Monitoring (FIM). In normal operations, we deploy a TE agent to a system we want to monitor. TE then uses that agent to baseline the system against the appropriate rules, creating a known good state for that system. Moving forward, that system is monitored for change per the rules that were used to create the baseline. 

The list of supported operating systems for a given version of TE is fairly extensive, so most of what I may want to run in my datacenter will be supported.

Agent-Based vs. Agentless Monitoring

Notice that I said “most” above and not “all.” This distinction is important because I’m not using an agent for everything. Agents sit on external devices that require O/S compatibility, notes Security Boulevard. As a result, my ability to scan some of my assets using agents is limited.

So, I might decide to go the agentless route. Doing so could allow me to conduct those assessments without needing to worry about compatibility issues. There’s a host of other security and operations reasons that could motivate me to make this choice, as well.

That raises an important question: can I still use Tripwire Enterprise for agentless monitoring? How do you enforce FIM on operating systems that have reached their end-of-life for support or on endpoints that aren’t able to have agents installed?

FreeBSD as an Example of Agentless Monitoring

Let’s use that FreeBSD system over there as an example. Can I use Tripwire Enterprise to monitor it? Well, yes. Yes, you can. TE provides the ability to monitor an unsupported system via SSH, or Secure SHell. Being that FreeBSD has never been a platform supported by TE and that there is no content available for it, we need to figure out what to monitor and build those rules accordingly.

The first step is to create a new node within TE. With that done, we can determine what we want to monitor and build the rules from there. FIM on our FreeBSD node is then possible.

What follows is baselining the node, scheduling the evaluation of the node and reporting on any changes. So, the complete sequence looks something like this:

  1. Create the node within TE
  2. Determine what to monitor
  3. Build appropriate rules
  4. Baseline
  5. Schedule monitoring
  6. Report
  7. Profit

Tripwire’s Upcoming Webinar

I’m going to run through this example in detail on April 27 at 10 a.m. PT for the second webinar in the Tripwire Tips and Tricks series. We will create a new FreeBSD node and take a look at the rules which have been created to monitor it. We will also take a look at how building new rules for an unsupported O/S makes use of built-in O/S utilities.

The purpose of this webinar to learn how to use agentless monitoring so that attendees can broaden the impacts of your cybersecurity program. Our main focus will be FIM, TE and the FreeBSD example. But it’s important to note that agentless monitoring doesn’t end there for Tripwire. There’s also Tripwire Data Collector (TDC), a supporting product for TE which allows for both FIM and Security Configuration Management (SCM). (Our SSH-based example is FIM only.) We’ll touch on TDC in our session.

This installment of the Tripwire Tips and Tricks series is geared towards all types of customers including those who might looking to make the most out of their Tripwire investment as well as those who are on the market for a new security solution. There will be a Q&A session at the end, at which point I’ll be happy to answer any questions.

More information about the webinar including registration details is available here.

The post ” Agentless Monitoring with Tripwire Enterprise: What You Need to Know” appeared first on TripWire

Source:TripWire – John Salmi

Tags: Finance, TripWire, Vulnerability

Continue Reading

Previous SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence
Next Malware Spreads Via Xcode Projects Now Targeting Apple’s M1-based Macs

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

2 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Vulnerabilities

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

21 hours ago [email protected] (The Hacker News)
  • Vulnerabilities

Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks

23 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

2 days ago [email protected] (The Hacker News)

Recent Posts

  • Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware
  • LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
  • China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
  • Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
  • Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT