Skip to content

Using Laurel to ease auditd log's Ingestion

Updated: at 11:31 AM

Description

LAUREL is an event post-processing plugin for auditd(8) that generates useful, enriched JSON-based audit logs suitable for modern security monitoring setups.

Basic Flow

alt text

Steps Overview

Steps in Detail

1. Installation

Download the latest version of laurel from Releases · threathunters-io/laurel, there are multiple versions in accordance to the architecture of the vm/machine.

After which extract and install using the following commands:

tar xzf laurel-$FLAVOR.tar.gz laurel
sudo install -m755 laurel /usr/local/sbin/laurel

2. Setup and configure Laurel

So, following the official documentation our following steps should be:

3. Configure wazuh agent to retrieve laurel logs instead of auditd logs

4. Configure decoders and rules for Laurel/auditd logs

The End


Previous Post
Wazuh log injestion from kubernates Deployment Via Logstash
Next Post
Wazuh AWS Integration