elastic / beats

:tropical_fish: Beats - Lightweight shippers for Elasticsearch & Logstash
https://www.elastic.co/products/beats
Other
12.15k stars 4.91k forks source link

[Auditbeat] MacOS auditing #6061

Open andrewkroh opened 6 years ago

andrewkroh commented 6 years ago

There is some built-in auditing support in macOS. I don't know much about it yet, but it sounds like we can get execve info at a minimum. This needs more investigation.

asekhar commented 5 years ago

Does the new version include support for auditd on OSX? Wondering what the status of this issue is.

cwurm commented 5 years ago

@asekhar Not yet. Though we are working on some enhancements to Auditbeat that will allow to collect additional information on macOS as well.

If you don't mind me asking - what information would you want to collect?

Note: macOS does not have auditd as Linux does and so we will always be limited in what we can collect compared to it (in Linux, you can pretty much collect anything).

asekhar commented 5 years ago

I'd like to get a close to the artifacts described here: https://blogs.dropbox.com/tech/2018/04/4696/ as possible, but among others, process name, path, arguments, parent process, network connections, file creations.

feld commented 5 years ago

FreeBSD also uses the OpenBSM audit framework, so making sure it works on FreeBSD as well would be ideal.

edit:

sudo praudit -l /dev/auditpipe

This is not ideal. I've done this on FreeBSD boxes to pipe that through logger(1) to get the data into syslog so I can ship it to Logstash... high activity on a system can hit 100% cpu usage for that praudit(1) process pretty quickly, so you've just wasted an entire CPU core shipping logs that normally takes less than 1% CPU when it's shipped in its native binary format with auditdistd(8)

Vladimir-csp commented 5 years ago

+1 for native FreeBSD audit support, with perspective of abstracting the data together with Linux audit events

gwsales commented 5 years ago

This will get you xml, not sure if it would be easier to pass into a parser or if it adds any additional load. sudo praudit -x -l /dev/auditpipe

deepybee commented 5 years ago

@andrewkroh Auditbeat is now listed as supported in our Support Matrix for MacOS >= 10.13 (High Sierra). Can this issue be closed?

andrewkroh commented 5 years ago

No, it cannot be closed. There are many features of Auditbeat that work on MacOS, but reading from MacOS audit data from the auditpipe is not one of them yet.

deepybee commented 5 years ago

OK, thanks for the clarification!

botelastic[bot] commented 4 years ago

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

gwsales commented 4 years ago

@andrewkroh can you get this one reopened or maybe assigned to a team?

elasticmachine commented 4 years ago

Pinging @elastic/siem (Team:SIEM)

inqueue commented 3 years ago

Passing on these links on behalf of another:

The first should be covered by the File Integrity Module. The second appears to be this GH issue.

botelastic[bot] commented 2 years ago

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

jasonborchardt commented 2 years ago

Can this issue be re-opened? It appears auditbeat attempts to parse process information in real time instead of subscribing to events in MacOS, which causes many events to be missed if they start and stop quickly. Additionally, in order to get information about processes executing from auditd, you must modify files in /etc/security, then reboot the system (as SIP prevents you from restarting the auditd process with the new configuration). Additionally, every OS update wipes out changes to files located in /etc/security.

It is possible to build filters and subscribe to system events, especially in MacOS 11.x. Other tools such as Famf protect do this.

a03nikki commented 2 years ago

@elastic/siem : Could we please get this ticket re-opened? It has not been resolved yet and is important functionality.

austinsonger commented 2 years ago

Agreed..

MakoWish commented 1 year ago

No movement on this? We are only just now starting to test Auditbeat on Mac (we are mainly a Windows and Linux shop).

jamiehynds commented 1 year ago

Thanks to everyone who has chimed in on this issue. While we have an integration with Jamf Compliance Reporter to ingest events from Unified Logging, I understand this dependency on a 3rd party solution isn't ideal. We're currently assessing some options to natively support Unified Logging. If folks could share information on your use case for the Unified Logs, it would be a great help as we look at some options - e.g. are you mainly interested in process and authentication events, or any other event types?

MakoWish commented 1 year ago

For us it is mainly authentication events.

asekhar commented 1 year ago

process executions, network connections, file creation and authentication events

gwsales commented 1 year ago

Would be nice to add some advanced things as well like monitoring plist / ssh keys / system startup / listening processes. It's been awhile since I've looked at Auditbeat on Mac, we've mostly moved onto other tools since this doesn't seem to be getting much traction or progress.

gwsales commented 11 months ago

@elastic/siem Has there been any progress here? Elastic has solid coverage on Windows and Linux, but really seemed to just skip over anything MacOS.

Would be great to see some updates here.

MakoWish commented 11 months ago

Yeah, almost six years later, and no traction.

elasticmachine commented 7 months ago

Pinging @elastic/sec-linux-platform (Team:Security-Linux Platform)

MakoWish commented 7 months ago

We have officially passed six years on this. :-(