<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kroom</id>
	<title>ICO wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kroom"/>
	<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php/Special:Contributions/Kroom"/>
	<updated>2026-05-08T04:03:48Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74746</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74746"/>
		<updated>2014-01-16T20:42:45Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Sissejuhatus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Autorid =&lt;br /&gt;
*Kristjan Rõõm A41&lt;br /&gt;
*Viljar Rooda A31&lt;br /&gt;
= Sissejuhatus =&lt;br /&gt;
Valisime oma artikli teema lisaks rsyslogile ka SEC&#039;i, kuna tegemist on huvitava logianalüüsi tööriistaga. SEC&#039;i peamisteks eeliseks võib pidada spetsiifiliste retseptide tegemise (mida kerge reaalajas jälgida). Samuti on SEC&#039;i eelis tema võimalus jälgida mustrid (ehk sarnaste logide korduvusi) ning selle tuvastamisel teha kasutaja poolt defineeritud tegevusi.&lt;br /&gt;
&lt;br /&gt;
SEC&#039;i miinusteks võib pidada igapäevast logianalüüsi, kuna seda on väga raske korraldada. Puuduvad statistika ning SEC kasutab peamiselt teavitusmeetodit, siis ei ole mõtet üksikuid sündmusi kogu aeg teavitada. SEC sobib tagataustal jooksva mustrite otsingu ja nendest teavitamise mehanismina.&lt;br /&gt;
&lt;br /&gt;
SEC&#039;ile on ka alternatiive. Näiteks on Microsofti Log Parser [http://www.microsoft.com/en-us/download/details.aspx?id=24659],Log-Expert[http://www.log-expert.de/] ja Splunk[http://www.splunk.com/].&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgnevalt on kirjeldatud, kuidas paigaldada SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent(\[\d+\]): Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close PID $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega[https://wiki.itcollege.ee/index.php/Logger]&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
1. http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
2. http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html &amp;lt;br/&amp;gt;&lt;br /&gt;
3. http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74745</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74745"/>
		<updated>2014-01-16T20:41:52Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Sissejuhatus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Autorid =&lt;br /&gt;
*Kristjan Rõõm A41&lt;br /&gt;
*Viljar Rooda A31&lt;br /&gt;
= Sissejuhatus =&lt;br /&gt;
Valisime oma artikli teema lisaks rsyslogile ka SEC&#039;i, kuna tegemist on huvitava logianalüüsi tööriistaga. SEC&#039;i peamisteks eelisteks võib pidada spetsiifiliste retseptide tegemise (kerge reaalajas jälgida). Samuti on SEC&#039;i suur eelis tema võimalus jälgida mustrid (ehk sarnaste logide korduvusi) ning selle tuvastamisel teha kasutaja poolt defineeritud tegevusi.&lt;br /&gt;
&lt;br /&gt;
SEC&#039;i miinusteks võib pidada igapäevast logianalüüsi, kuna seda on väga raske korraldada. Puuduvad statistika ning SEC kasutab peamiselt teavitusmeetodit, siis ei ole mõtet üksikuid sündmusi kogu aeg teavitada. SEC sobib tagataustal jooksva mustrite otsingu ja nendest teavitamise mehanismina.&lt;br /&gt;
&lt;br /&gt;
SEC&#039;ile on ka alternatiive. Näiteks on Microsofti Log Parser [http://www.microsoft.com/en-us/download/details.aspx?id=24659],Log-Expert[http://www.log-expert.de/] ja Splunk[http://www.splunk.com/].&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgnevalt on kirjeldatud, kuidas paigaldada SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent(\[\d+\]): Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close PID $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega[https://wiki.itcollege.ee/index.php/Logger]&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
1. http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
2. http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html &amp;lt;br/&amp;gt;&lt;br /&gt;
3. http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74561</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74561"/>
		<updated>2014-01-16T10:19:56Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Sisse juhatus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Autorid =&lt;br /&gt;
*Kristjan Rõõm A41&lt;br /&gt;
*Viljar Rooda A31&lt;br /&gt;
= Sissejuhatus =&lt;br /&gt;
Miks valisime SEC? Mis on alternatiivid? Mis on eelised ja puudused?&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgnevalt on kirjeldatud, kuidas paigaldada SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent(\[\d+\]): Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close PID $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega[https://wiki.itcollege.ee/index.php/Logger]&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
1. http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
2. http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html &amp;lt;br/&amp;gt;&lt;br /&gt;
3. http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74560</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74560"/>
		<updated>2014-01-16T10:18:31Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC reegli teine näide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Autorid =&lt;br /&gt;
*Kristjan Rõõm A41&lt;br /&gt;
*Viljar Rooda A31&lt;br /&gt;
= Sisse juhatus =&lt;br /&gt;
Miks valisime SEC? Mis on alternatiivid? Mis on eelised ja puudused? &lt;br /&gt;
= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgnevalt on kirjeldatud, kuidas paigaldada SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent(\[\d+\]): Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close PID $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega[https://wiki.itcollege.ee/index.php/Logger]&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
1. http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
2. http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html &amp;lt;br/&amp;gt;&lt;br /&gt;
3. http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74551</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74551"/>
		<updated>2014-01-16T09:42:29Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Kasutatud kirjandus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Autorid =&lt;br /&gt;
*Kristjan Rõõm A41&lt;br /&gt;
*Viljar Rooda A31&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgnevalt on kirjeldatud, kuidas paigaldada SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
1. http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
2. http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html &amp;lt;br/&amp;gt;&lt;br /&gt;
3. http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74550</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74550"/>
		<updated>2014-01-16T09:40:33Z</updated>

		<summary type="html">&lt;p&gt;Kroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Autorid =&lt;br /&gt;
*Kristjan Rõõm A41&lt;br /&gt;
*Viljar Rooda A31&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgnevalt on kirjeldatud, kuidas paigaldada SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74549</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=74549"/>
		<updated>2014-01-16T09:38:58Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Autorid =&lt;br /&gt;
*Kristjan Rõõm A41&lt;br /&gt;
*Viljar Rooda A31&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgnevalt on kirjeldatud, kuidas paigaldada SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73542</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73542"/>
		<updated>2014-01-10T19:55:00Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Autorid =&lt;br /&gt;
*Kristjan Rõõm A41&lt;br /&gt;
*Viljar Rooda A31&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgnevalt on kirjeldatud, kuidas paigaldada SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73541</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73541"/>
		<updated>2014-01-10T19:54:28Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Autorid */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Autorid =&lt;br /&gt;
*Kristjan Rõõm A41&lt;br /&gt;
*Viljar Rooda A31&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=73540</id>
		<title>Linuxi administreerimine</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=73540"/>
		<updated>2014-01-10T19:53:43Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Esseede teemad 2013 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Üldinfo=&lt;br /&gt;
ECTS: 4&lt;br /&gt;
Hindamisviis: Eksam&lt;br /&gt;
&lt;br /&gt;
==Õppejõud==&lt;br /&gt;
Margus Ernits&lt;br /&gt;
&lt;br /&gt;
Katrin Loodus&lt;br /&gt;
&lt;br /&gt;
=Eeldused ja sihtgrupp=&lt;br /&gt;
&lt;br /&gt;
Operatsioonisüsteemide administreerimine ja sidumine (Rangelt soovituslik). Osadmin aines loetava oskamine on antud aine õppimise eelduseks. ÕISis on see eeldus märgitud soovituslikuks, kuna igal aastal on paar inimest, kes suudavad mõlemad ained korraga läbida ja on antud vallas väga pädevad.&lt;br /&gt;
Linuxi administraatori kursus on mõeldud tugeva infotehnoloogilise põhjaga arvuti-spetsialistile.&lt;br /&gt;
Kursuse rõhk on eelkõige võrguhalduril, kelle tööülesannete hulka kuulub igapäevane serverite, võrgu jms hooldus, konfigureerimine ja uute seadmete installatsioon.&lt;br /&gt;
&lt;br /&gt;
=Eesmärk ja sisu=&lt;br /&gt;
&lt;br /&gt;
Kursuse esimeses osas õpitakse tundma Linux süsteemi toimimist, antakse ülevaade administreerimistoimingute automatiseerimisest shelli skriptide abil ja omandatakse praktiline käsufailide koostamise kogemus.&lt;br /&gt;
&lt;br /&gt;
Teises osas õpitakse paigaldama ja konfigureerima erinevaid võrguteenuseid. Kursuse teise osa alguses korratakse taseme ühtlustamiseks TCP/IP võrgu põhialuseid.&lt;br /&gt;
&lt;br /&gt;
=Õpiväljundid=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Loengud=&lt;br /&gt;
&lt;br /&gt;
Kaugõppe loengute ja praktikumide videosalvestused:&lt;br /&gt;
http://echo360.e-ope.ee/ess/portal/section/4bd0abde-1b0d-4c92-a35e-0f99a81f069d&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Sissejuhatav loeng eeldustest [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng01%20-%20Sissejuhatus%20ainesse%20Linux%20administreerimine%20-%202013%20.pdf Sissejuhatus Loeng 1]&lt;br /&gt;
&lt;br /&gt;
1.1. Kordamine Osadmin [http://elab.itcollege.ee:8000/Linux-Basics.mm]&lt;br /&gt;
&lt;br /&gt;
2. Linux süsteemi põhilised komponendid [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng02%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 2]&lt;br /&gt;
&lt;br /&gt;
3. Linux süsteemi haldamine puppet abil I [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng03%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 3]&lt;br /&gt;
&lt;br /&gt;
4. Linux süsteemi haldamine puppet abil II [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng04%20-%20Linux%20s%c3%bcsteemide%20haldamine%20II%20-%202013%20.pdf Linux haldamine Loeng 4]&lt;br /&gt;
&lt;br /&gt;
5. Linux süsteemi haldamine puppet abil III [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng05%20-%20Linux%20s%c3%bcsteemide%20haldamine%20III%20-%202013%20.pdf Linux haldamine Loeng 5]&lt;br /&gt;
&lt;br /&gt;
5.1 Puppeti seadistamine passenger mooduli abil [[Puppet - passenger]]&lt;br /&gt;
&lt;br /&gt;
Puppeti teise loengu video: http://elab.itcollege.ee:8000/linux-admin/pupppet-algus.ogv&lt;br /&gt;
&lt;br /&gt;
=Praktikumid=&lt;br /&gt;
&lt;br /&gt;
==Esimene praktikum - Ubuntu Serveri ja kliendi paigaldamine ning kordamine==&lt;br /&gt;
* Paigaldage &#039;&#039;&#039;Ubuntu Linux Server&#039;&#039;&#039; süsteem VirtualBox abil&lt;br /&gt;
**RAM 512MB&lt;br /&gt;
**HDD dynamicly allocated 8GB&lt;br /&gt;
**2 Võrgukaarti NIC1 - NAT (eth0 - Ubuntus) ja NIC2 - HostOnly (eth1 - Ubuntus)&lt;br /&gt;
**Logige serverisse sisse ja seadistage võrk failis /etc/network/interfaces (liidese eth1 ip aadress 192.168.56.200). &lt;br /&gt;
***Abiinfo [[Ubuntu server võrgu seadistamine]] ja [[VirtualBoxi võrgud]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
auto eth1&lt;br /&gt;
iface eth1 inet static&lt;br /&gt;
  address 192.168.56.200&lt;br /&gt;
  netmask 255.255.255.0&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Paigaldage openssh server, kui te seda installi käigus ei teinud (apt-get update &amp;amp;&amp;amp; apt-get install ssh)&lt;br /&gt;
&lt;br /&gt;
Ubuntu Server 12.04.1 LTS ISO (64bit) http://elab.itcollege.ee:8000/ubuntu-12.04.1-server-amd64.iso&lt;br /&gt;
&lt;br /&gt;
Eelduste kontrollimise test harjutamiseks: http://goo.gl/73xBZ&lt;br /&gt;
Kes tunneb, et test on &#039;&#039;&#039;liiga keeruline&#039;&#039;&#039;, peab &#039;&#039;&#039;kaaluma&#039;&#039;&#039; aine deklareerimise asemel &#039;&#039;&#039;Osadmin aine (mis on soovituslik eeldus) läbimist&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Ubuntu Desktop Linux&#039;&#039;&#039; paigaldamine (Võib paigaldada ka mõne muu disrtibutsiooni desktop masina, kuna seda läheb meil niikuinii hiljem vaja)&lt;br /&gt;
**Memory 1024MB&lt;br /&gt;
**HDD 16GB (või 8GB) Dynamic disk&lt;br /&gt;
**Network&lt;br /&gt;
**Video Memory 64MB 3D acceleration sisse&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NB! Kasutamiseks valmis masinad: [http://elab.itcollege.ee:8000/ubuntu-server-64.ova server 64bit] ja [http://elab.itcollege.ee:8000/ubuntu-desktop-64.ova klient 64bit], [http://elab.itcollege.ee:8000/UbuntuServer32bit.ova server 32bit] ja [http://elab.itcollege.ee:8000/UbuntuDesktop32bit.ova klient 32bit]&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Pärast paigaldamist seadistada [https://wiki.itcollege.ee/index.php/OpenSSH:_v%C3%B5tmetega_autentimine key based autentimisega] serverisse sisenemine. (tööjaamast saab serveris käske käivitada)&lt;br /&gt;
&lt;br /&gt;
==Teine ja kolmas praktikum - Eeldustetest ja kordamine==&lt;br /&gt;
&lt;br /&gt;
Kordamiseks leiate vajalikku infot [https://wiki.itcollege.ee/index.php/Category:Operatsioonis%C3%BCsteemide_administreerimine_ja_sidumine Operatsioonisüsteemide administreerimise ja sidumise] aine vikist. &lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/AFGfoV Eeldustetest 1]&lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/F0PiWK Eeldustetest 2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Linux keskhaldus puppet baasil==&lt;br /&gt;
&lt;br /&gt;
Praktikumis paigaldame puppet serveri (master) ja kliendi.&lt;br /&gt;
&lt;br /&gt;
Näiteülesanded kaitsmiseks&lt;br /&gt;
&lt;br /&gt;
1. Loo puppet abil fail /etc/issue sisuga KALA&lt;br /&gt;
&lt;br /&gt;
2. Loo puppet abil kasutaja polekala, kodukaustaga /home/polekala, shelliga /bin/zsh ( tee ka paki zsh paigaldus)&lt;br /&gt;
&lt;br /&gt;
3. Lisa nodele class tarkvara, mis paigaldab htop, bpython pakid&lt;br /&gt;
&lt;br /&gt;
4. Loo nodele class eemalda, mis eemaldab paki cowsay&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Viimane ülesanne on igal ühel erinev.&lt;br /&gt;
&lt;br /&gt;
5.1 Loo serverisse kasutaja kala ja tee talle ssh key. Seadista kliendiarvuti selliselt, et paigaldataks pakk ssh ja lisataks root kasutajale kliendis loodud ssh public key.&lt;br /&gt;
&lt;br /&gt;
5.2 Paigalda kliendi arvutisse ntp server ja määra ntp serveriteks ntp.eenet.ee ja ntp.ut.ee&lt;br /&gt;
&lt;br /&gt;
5.3 Lisa kliendi arvutisse apache2 veebiserver koos virtualhostiga www.planet.zz, (failis /var/www/www.planet.zz/index.html on rida www.planet.zz)&lt;br /&gt;
Apache konfis peab olema ServerName www.planet.zz ja sites-enabled all sait www.planet.zz&lt;br /&gt;
&lt;br /&gt;
5.4 Lisa kliendi arvutisse bind9 nimeserver (normaalselt tööjaama seda ei tehta, kuid antud näitel on meil vaid üks konfigureeritav host). Seadista enda valitud domeeniminega tsoon koos revers tsooniga. Lisa kirjed www.sinudomeen.zz, mail.sinudomeen.zz, puppet.sinudomeen.zz koos PTR kirjetega.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Puppet Examples]]&lt;br /&gt;
&lt;br /&gt;
==Keskne logiserver==&lt;br /&gt;
Labor 2 üheks võimalikuks teemaks on keskse logihalduse lahenduse loomine&lt;br /&gt;
&lt;br /&gt;
[[Keskse logilahenduse rakendamine]]&lt;br /&gt;
&lt;br /&gt;
[http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf  Lõputöö logihalduse teemal]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://rdstash.blogspot.com/2013/01/installing-logstash-as-syslog-server-on.html&lt;br /&gt;
&lt;br /&gt;
=Esseede teemad 2012=&lt;br /&gt;
&lt;br /&gt;
Võib valida keerulisemaid teemasid ka [[Osadmin referaadi teemad]] lehelt.&lt;br /&gt;
&lt;br /&gt;
[[zsh]] - pole algajale&lt;br /&gt;
&lt;br /&gt;
Mida uurida &lt;br /&gt;
&lt;br /&gt;
Prompt&lt;br /&gt;
&lt;br /&gt;
http://zshwiki.org/home/config/prompt&lt;br /&gt;
&lt;br /&gt;
http://stevelosh.com/blog/2010/02/my-extravagant-zsh-prompt/&lt;br /&gt;
&lt;br /&gt;
.zshrc&lt;br /&gt;
&lt;br /&gt;
for &lt;br /&gt;
&lt;br /&gt;
if &lt;br /&gt;
&lt;br /&gt;
while &lt;br /&gt;
&lt;br /&gt;
jne&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[exFAT vs Linux]] - Kalju Hõbemäe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[CentOS Server]] --- teeb Oliver Naaris&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Superb Mini Server]] --- Mark-Erik Mogom, Andrus Dei &lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
DNS, samba, LDAP, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Oracle Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Suse Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba seadistamine&lt;br /&gt;
&lt;br /&gt;
[[OpenLDAP Ubuntu Serveril]] - Tarmo Suurmägi, Taavi Sannik, Harri Uljas&lt;br /&gt;
&lt;br /&gt;
[[Zentyal SAMBA4]] --- Lang &amp;amp; Lihten A31&lt;br /&gt;
&lt;br /&gt;
Samba4 domeenikontrolleri seadistamine ja ubuntu/fedora/muu süsteem autentimise seadistamine kasutades uusi vahendeid&lt;br /&gt;
&lt;br /&gt;
[[Apt-yum/dpkg-rpm käskude lühivõrdlus]] - Teet Saar A32&lt;br /&gt;
&lt;br /&gt;
[[Ophcrack]] - teeb Kristo Kapten&lt;br /&gt;
&lt;br /&gt;
[[rancid]] - Meelis Kurnikov, Aive Haavel AK31&lt;br /&gt;
&lt;br /&gt;
[[zenoss]] - Kristjan Vaik&lt;br /&gt;
&lt;br /&gt;
[[Apache autentimine LDAP&#039;iga]] - Rauno Lehiste&lt;br /&gt;
=Esseede teemad 2013=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Linux failisüsteemi jõudluse mõõtmine]]&lt;br /&gt;
&lt;br /&gt;
[[passenger]]&lt;br /&gt;
&lt;br /&gt;
[[NFTables]]&lt;br /&gt;
&lt;br /&gt;
[[Ipcop]] - saab kaasajastada&lt;br /&gt;
&lt;br /&gt;
[[suricata]] http://www.openinfosecfoundation.org/index.php/download-suricata - Martin Leppik ja Randel Raidmets 12.12.2013&lt;br /&gt;
&lt;br /&gt;
[[snort]] http://www.snort.org/ - võib kaasajastada&lt;br /&gt;
&lt;br /&gt;
[[Owncloud]] - Tõnu Erm AK31&lt;br /&gt;
&lt;br /&gt;
[[Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll]] - Sten Aus 28.11.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskse logilahenduse rakendamine Rsyslog näitel]] - Kimmo Lillipuu, Kaarel Kuurmann, Heigo Punapart 18.12.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskse logihalduse tarvis kliendile Rsyslogi paigladmaine ja seadistamine puppeti abil ]] - Indrek Mitt, Priidu Niit 19.12.2013&lt;br /&gt;
&lt;br /&gt;
[[Nagios 3.5]] - Piia Ploovits, Sandra Sirel, Kristian Kivimägi, Grete Maisla 19.12.2013&lt;br /&gt;
&lt;br /&gt;
[[MySecureShell - SecureFTP]] - Kalle Kadakas 20.12.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskne logiserver]] - Tauri Jaanus 25.12.2013&lt;br /&gt;
&lt;br /&gt;
[[ISPConf 3 Ubuntu serverile 13.04]] - Ülo Vardja ja Aare Uibomäe 04.01.2014&lt;br /&gt;
&lt;br /&gt;
[[Bind9 nimeserver (puppet baasil)]] - Liis Mironova 06.01.2014&lt;br /&gt;
&lt;br /&gt;
[[Pure-FTPd]] - Maris Kuusik 07.01.2014&lt;br /&gt;
&lt;br /&gt;
[[Logiserver, mis kogub võrgust kokku mikrotik ruuteri logid ]] - Lauri Rüütli ja Tõnu Ruut 07.01.14&lt;br /&gt;
&lt;br /&gt;
[[PHORONIX TEST SUITE]] - Tammo Oolup 08.01.2013&lt;br /&gt;
&lt;br /&gt;
[[Conky]] - Kristjan Karu 09.01.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskse logihalduse süsteem Splunk baasil]] - Veiko Virk 10.01.2014&lt;br /&gt;
&lt;br /&gt;
[[Keskne logihaldus Rsyslog ja SEC näitel]] - Kristjan Rõõm, Viljar Rooda 10.01.2014&lt;br /&gt;
&lt;br /&gt;
=Eksamist=&lt;br /&gt;
&lt;br /&gt;
Tee ära labor 2 (oma valitud teemal + selle kohta wiki kirjatöö)&lt;br /&gt;
Eksamil ole valmis demoma labor 1 raames kaitstud asju.&lt;br /&gt;
&lt;br /&gt;
Kirjatööd sisu tuleb eksamil kaitsta vestluse vormis.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus saab kaitsta ka labor 1 ja 2 asju.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus tõmbad loosi, mida labor 1 raames parandada. Õppejõud teeb teenuse katki ja tudeng teeb korda. (soovitatav on eelnevalt teha  teenusest varukoopia).&lt;br /&gt;
&lt;br /&gt;
Punkte saab selgituse eest, mis oli katki ja kuidas tegid korda.&lt;br /&gt;
&lt;br /&gt;
Katki tegemisel võib arvestada näiteks, et algaja admin (õppejõud:) muutis ära parooli, rikkus võrguseaded ja kustutas täiesti süüdimatult mõne konfifaili.&lt;br /&gt;
&lt;br /&gt;
=Laborimaterjalid 2012=&lt;br /&gt;
&lt;br /&gt;
Teha apt -  yum ja dpkg - rpm vastavustabel. dpkg ja apt korraldused leiab [http://elab.itcollege.ee:8000/Linux-Basics.mm Linux-Basics mindmapist]&lt;br /&gt;
&lt;br /&gt;
Parim töö annab 7p, järgmised 5p (piisavalt põhjalikud ja erinevad)&lt;br /&gt;
&lt;br /&gt;
Ebapiisavad vastavustabelid, mis sarnanevad üksteisele punkte ei saa.&lt;br /&gt;
&lt;br /&gt;
Kui su tabel on ilma vigadeta, kuid mitte parimate sead siis saad 1-2p.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 4&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Nimeserveri BIND9 paigaldamine.&lt;br /&gt;
&lt;br /&gt;
*Mõtle välja domeenimini&lt;br /&gt;
*Paigalda nimeserver bind9&lt;br /&gt;
*Seadista oma domeen&lt;br /&gt;
**www.domeen&lt;br /&gt;
**ns.domeen&lt;br /&gt;
**sales.domeen&lt;br /&gt;
**seadista oma kliendimasin kasutama uut nimeserverit&lt;br /&gt;
&lt;br /&gt;
NB: enne kaitsmist lugeda läbi http://kuutorvaja.eenet.ee/wiki/DNS&lt;br /&gt;
&lt;br /&gt;
Labori üks näide [[Nimeserveri seadistamine BIND9 näitel]]&lt;br /&gt;
&lt;br /&gt;
Praktikumi salvestus http://echo360.e-uni.ee/ess/echo/presentation/a828b6af-8caf-4319-b594-5d6bfed04a70&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama nii nimede lahendamine läbi teie nimeserveri kui ka reverse lookup.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Veebiserveri apache2 paigaldamine&lt;br /&gt;
&lt;br /&gt;
*Loo veebisaidid www.domeen ja sales.domeen (ehk oma DNS labori nimedele vastavad veebisaidid)&lt;br /&gt;
Praktikumi salvestus: http://echo360.e-uni.ee/ess/echo/presentation/0945a764-0305-48ec-8082-4e57a23cc536&lt;br /&gt;
*Seadist HTTPS nendele saitidele (vajadusel loo uus ip alias ja muuda nimeserveris olevat kirjet, et TLS nimed viitaks erinevatele IP aadressidele)&lt;br /&gt;
*Abiks on loeng: http://enos.itcollege.ee/~mernits/infrastruktuur/loeng04%20-%20Veebiserver.odp ja labor: https://wiki.itcollege.ee/index.php/Veebiserveri_labor_v.2&lt;br /&gt;
*Paigalda WordPress vastavalt juhendile: http://goo.gl/6XQ0U&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama veebiserververi apache2 pealt 2 veebilehte ning wordpress. Wordpressile peab olema paigaldatud super cache ning lisaks peab töötama varnish. Seejuures wordpress on seadistatud pordile 80 ja wordpress pordil 8080. Lehe toimivust testige enne kaitsmist ab vahendiga, kus -n 1000 ja -t 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 7&#039;&#039;&#039;&lt;br /&gt;
Samba share-i välja jagamine. &lt;br /&gt;
&lt;br /&gt;
*Loo share, mis on ligipääsetav vaid kasutajatele, kes kuuluvad lab gruppi. Vajalik on ka share-ile kirjutamisõigus (saab kausta luua). &lt;br /&gt;
* Seadista samba abil kasutajate kodukaustadele ligipääsemine. Iga kasutaja peab ligi pääsema enda kodukaustale. &lt;br /&gt;
&lt;br /&gt;
*Abiks on viki artiklid : https://wiki.itcollege.ee/index.php/Failiserver_Samba_labor_2 ja https://wiki.itcollege.ee/index.php/Lihtne_samba_install&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; on vajalik share-i olemasolu, mis on ligipääsetav ning kirjutatav (võimalik luua kataloogi) ainult lab gruppi kuuluvatele kasutajatele ning lab gruppi mitte kuuluvad kasutajad ei tohi sinna ligi pääseda. &lt;br /&gt;
Lisaks peavad kasutajad pääsema ligi oma kodukaustale, sõltumata sellest, kas ta kuulub lab gruppi või mitte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 1&#039;&#039;&#039;&lt;br /&gt;
*Veebiserver ja virtualhostid&lt;br /&gt;
*DNS&lt;br /&gt;
*e-post&lt;br /&gt;
*iptables&lt;br /&gt;
*samba&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 2&#039;&#039;&#039;&lt;br /&gt;
*LDAP või Samba4 - LDAP Teet Saar, Kullo-Kalev Aru&lt;br /&gt;
*Puppet või chef&lt;br /&gt;
*PAM&lt;br /&gt;
*Puppet (Ubuntus) - Kristo Kapten&lt;br /&gt;
*[[Samba(windows domeenis fileserver)]] - Marko Kurs&lt;br /&gt;
*[[TLS termineerimine nginx abil]] - Sander Arnus, Sander Saveli&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73539</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73539"/>
		<updated>2014-01-10T19:53:11Z</updated>

		<summary type="html">&lt;p&gt;Kroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Autorid =&lt;br /&gt;
*Kristjan Rõõm&lt;br /&gt;
*Viljar Rooda&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskse_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73538</id>
		<title>Keskse logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskse_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73538"/>
		<updated>2014-01-10T19:51:57Z</updated>

		<summary type="html">&lt;p&gt;Kroom: moved Keskse logihaldus Rsyslog ja SEC näitel to Keskne logihaldus Rsyslog ja SEC näitel&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Keskne logihaldus Rsyslog ja SEC näitel]]&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73537</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73537"/>
		<updated>2014-01-10T19:51:57Z</updated>

		<summary type="html">&lt;p&gt;Kroom: moved Keskse logihaldus Rsyslog ja SEC näitel to Keskne logihaldus Rsyslog ja SEC näitel&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73535</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73535"/>
		<updated>2014-01-10T18:02:53Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test #suunatakse väljund kausta&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73534</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73534"/>
		<updated>2014-01-10T18:01:14Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo &lt;br /&gt;
Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73533</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73533"/>
		<updated>2014-01-10T18:00:22Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näide sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73532</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73532"/>
		<updated>2014-01-10T17:59:32Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näige sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73531</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73531"/>
		<updated>2014-01-10T17:57:49Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Näige sündmusest:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73530</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73530"/>
		<updated>2014-01-10T17:56:33Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC logiserverisse&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73529</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73529"/>
		<updated>2014-01-10T17:55:53Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on vabavaraline sündmuste logija, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida reegleid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73528</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73528"/>
		<updated>2014-01-10T17:52:16Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Kasutatud kirjandus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on PERLil põhinev skriptide kogum, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida ühte reeglit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf  &amp;lt;br/&amp;gt;&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73527</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73527"/>
		<updated>2014-01-10T17:50:34Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC reegli teine näide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on PERLil põhinev skriptide kogum, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida ühte reeglit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kliendi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73526</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73526"/>
		<updated>2014-01-10T17:50:18Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC reegli teine näide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on PERLil põhinev skriptide kogum, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida ühte reeglit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kleindi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab kliendi masinas antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73525</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73525"/>
		<updated>2014-01-10T17:41:54Z</updated>

		<summary type="html">&lt;p&gt;Kroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on PERLil põhinev skriptide kogum, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida ühte reeglit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kleindi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kokkuvõte =&lt;br /&gt;
Lõpptulemusena on valmis logiserver koos seadistatud Rsyslogi ning kahe SECi reegliga.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73524</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73524"/>
		<updated>2014-01-10T17:36:41Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
SEC on PERLil põhinev skriptide kogum, kus saab reeglitega defineerida logimise mustreid. Järgneval on kirjeldatud, kuidas paigalda SECi ja defineerida ühte reeglit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kleindi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73523</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73523"/>
		<updated>2014-01-10T17:35:09Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC reegli teine näide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kleindi sulgemist&lt;br /&gt;
&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73522</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73522"/>
		<updated>2014-01-10T17:34:44Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kleindi sulgemist&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73521</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73521"/>
		<updated>2014-01-10T17:33:07Z</updated>

		<summary type="html">&lt;p&gt;Kroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp # mustri tüüp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/rule1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
Feeding event &#039; Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute&#039; to shell command &#039;/bin/echo Wed Jan  8 14:35:05 2014: User student has been unable to log in from 192.168.56.1 over SSH during 1 minute &amp;gt;&amp;gt; /etc/test&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
== SEC reegli teine näide ==&lt;br /&gt;
Järgnev reegel logib Puppeti kleindi sulgemist&lt;br /&gt;
1) Loome reegli faili&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/puppetcheck.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Defineerime reegli&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=SingleWithThreshold #üks muster&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=puppet-agent\[\d+\]: Puppet client disabled&lt;br /&gt;
desc=Puppeti klient forced to close by $1&lt;br /&gt;
action=pipe &#039;%t : %s&#039; /bin/mail &#039;puppet error&#039; root@localhost # saadetakse mail&lt;br /&gt;
window=3600 #intervall&lt;br /&gt;
thresh=1  # kordade arv enne saatmist&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kontrollida saab antud käslusega&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
logger -t puppet-agent -i Puppet client disabled&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;br /&gt;
http://simple-evcorr.sourceforge.net/SEC-tutorial/article.html&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73519</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73519"/>
		<updated>2014-01-10T17:20:24Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow # Kasutatakse kahte tingimust (mustrit)&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2 # muster, mida otsitakse&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute # kirjeldus&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2 &lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60 #ajaintervall sekundites&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/reegel1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73516</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73516"/>
		<updated>2014-01-10T17:17:00Z</updated>

		<summary type="html">&lt;p&gt;Kroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC [http://www.occam.com/sa/CentralizedLogging2012.pdf] ==&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2&lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/reegel1.conf -input=/var/log/remote/192.168.56.101/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=User:Kroom&amp;diff=73515</id>
		<title>User:Kroom</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=User:Kroom&amp;diff=73515"/>
		<updated>2014-01-10T17:15:56Z</updated>

		<summary type="html">&lt;p&gt;Kroom: Replaced content with &amp;quot;= asd =&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= asd =&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73514</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73514"/>
		<updated>2014-01-10T17:15:28Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* SEC */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC ==&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2&lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
5) Käivitage reegel järgmise käsuga&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
perl /usr/bin/sec -conf=/etc/sec/reegel1.conf -input=/var/log/remote/192.168.56.100/syslog.log&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73513</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73513"/>
		<updated>2014-01-10T17:13:14Z</updated>

		<summary type="html">&lt;p&gt;Kroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SEC ==&lt;br /&gt;
1) Installige SEC&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get install sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /etc/sec&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks luua reegli fail&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
vim /etc/sec/rule1.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Reegli faili sisuks tuleks lisada&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
type=PairWithWindow&lt;br /&gt;
ptype=RegExp&lt;br /&gt;
pattern=sshd\[\d+\]: Failed .+ for (\S+) from ([\d.]+) port \d+ ssh2&lt;br /&gt;
desc=User $1 has been unable to log in from $2 over SSH during 1 minute&lt;br /&gt;
action=pipe &#039; %t: %s&#039; /bin/echo %t: %s &amp;gt;&amp;gt; /etc/test&lt;br /&gt;
ptype2=RegExp&lt;br /&gt;
pattern2=sshd\[\d+\]: Accepted .+ for $1 from $2 port \d+ ssh2&lt;br /&gt;
desc2=SSH login successful for %1 from %2 after initial failure&lt;br /&gt;
action2=logonly&lt;br /&gt;
window=60&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Antud reegel logib SSH pordi pihta tehtud ebaõnnestunuid päringuid.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73512</id>
		<title>Keskne logihaldus Rsyslog ja SEC näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Keskne_logihaldus_Rsyslog_ja_SEC_n%C3%A4itel&amp;diff=73512"/>
		<updated>2014-01-10T17:04:29Z</updated>

		<summary type="html">&lt;p&gt;Kroom: Created page with &amp;quot;= Ülesande püstitus =  Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.  = Kasutatud tarkvara ja virtuaalmasinad = == Tarkvara == Rs…&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=73511</id>
		<title>Linuxi administreerimine</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=73511"/>
		<updated>2014-01-10T17:04:15Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Esseede teemad 2013 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Üldinfo=&lt;br /&gt;
ECTS: 4&lt;br /&gt;
Hindamisviis: Eksam&lt;br /&gt;
&lt;br /&gt;
==Õppejõud==&lt;br /&gt;
Margus Ernits&lt;br /&gt;
&lt;br /&gt;
Katrin Loodus&lt;br /&gt;
&lt;br /&gt;
=Eeldused ja sihtgrupp=&lt;br /&gt;
&lt;br /&gt;
Operatsioonisüsteemide administreerimine ja sidumine (Rangelt soovituslik). Osadmin aines loetava oskamine on antud aine õppimise eelduseks. ÕISis on see eeldus märgitud soovituslikuks, kuna igal aastal on paar inimest, kes suudavad mõlemad ained korraga läbida ja on antud vallas väga pädevad.&lt;br /&gt;
Linuxi administraatori kursus on mõeldud tugeva infotehnoloogilise põhjaga arvuti-spetsialistile.&lt;br /&gt;
Kursuse rõhk on eelkõige võrguhalduril, kelle tööülesannete hulka kuulub igapäevane serverite, võrgu jms hooldus, konfigureerimine ja uute seadmete installatsioon.&lt;br /&gt;
&lt;br /&gt;
=Eesmärk ja sisu=&lt;br /&gt;
&lt;br /&gt;
Kursuse esimeses osas õpitakse tundma Linux süsteemi toimimist, antakse ülevaade administreerimistoimingute automatiseerimisest shelli skriptide abil ja omandatakse praktiline käsufailide koostamise kogemus.&lt;br /&gt;
&lt;br /&gt;
Teises osas õpitakse paigaldama ja konfigureerima erinevaid võrguteenuseid. Kursuse teise osa alguses korratakse taseme ühtlustamiseks TCP/IP võrgu põhialuseid.&lt;br /&gt;
&lt;br /&gt;
=Õpiväljundid=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Loengud=&lt;br /&gt;
&lt;br /&gt;
Kaugõppe loengute ja praktikumide videosalvestused:&lt;br /&gt;
http://echo360.e-ope.ee/ess/portal/section/4bd0abde-1b0d-4c92-a35e-0f99a81f069d&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Sissejuhatav loeng eeldustest [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng01%20-%20Sissejuhatus%20ainesse%20Linux%20administreerimine%20-%202013%20.pdf Sissejuhatus Loeng 1]&lt;br /&gt;
&lt;br /&gt;
1.1. Kordamine Osadmin [http://elab.itcollege.ee:8000/Linux-Basics.mm]&lt;br /&gt;
&lt;br /&gt;
2. Linux süsteemi põhilised komponendid [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng02%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 2]&lt;br /&gt;
&lt;br /&gt;
3. Linux süsteemi haldamine puppet abil I [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng03%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 3]&lt;br /&gt;
&lt;br /&gt;
4. Linux süsteemi haldamine puppet abil II [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng04%20-%20Linux%20s%c3%bcsteemide%20haldamine%20II%20-%202013%20.pdf Linux haldamine Loeng 4]&lt;br /&gt;
&lt;br /&gt;
5. Linux süsteemi haldamine puppet abil III [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng05%20-%20Linux%20s%c3%bcsteemide%20haldamine%20III%20-%202013%20.pdf Linux haldamine Loeng 5]&lt;br /&gt;
&lt;br /&gt;
5.1 Puppeti seadistamine passenger mooduli abil [[Puppet - passenger]]&lt;br /&gt;
&lt;br /&gt;
Puppeti teise loengu video: http://elab.itcollege.ee:8000/linux-admin/pupppet-algus.ogv&lt;br /&gt;
&lt;br /&gt;
=Praktikumid=&lt;br /&gt;
&lt;br /&gt;
==Esimene praktikum - Ubuntu Serveri ja kliendi paigaldamine ning kordamine==&lt;br /&gt;
* Paigaldage &#039;&#039;&#039;Ubuntu Linux Server&#039;&#039;&#039; süsteem VirtualBox abil&lt;br /&gt;
**RAM 512MB&lt;br /&gt;
**HDD dynamicly allocated 8GB&lt;br /&gt;
**2 Võrgukaarti NIC1 - NAT (eth0 - Ubuntus) ja NIC2 - HostOnly (eth1 - Ubuntus)&lt;br /&gt;
**Logige serverisse sisse ja seadistage võrk failis /etc/network/interfaces (liidese eth1 ip aadress 192.168.56.200). &lt;br /&gt;
***Abiinfo [[Ubuntu server võrgu seadistamine]] ja [[VirtualBoxi võrgud]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
auto eth1&lt;br /&gt;
iface eth1 inet static&lt;br /&gt;
  address 192.168.56.200&lt;br /&gt;
  netmask 255.255.255.0&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Paigaldage openssh server, kui te seda installi käigus ei teinud (apt-get update &amp;amp;&amp;amp; apt-get install ssh)&lt;br /&gt;
&lt;br /&gt;
Ubuntu Server 12.04.1 LTS ISO (64bit) http://elab.itcollege.ee:8000/ubuntu-12.04.1-server-amd64.iso&lt;br /&gt;
&lt;br /&gt;
Eelduste kontrollimise test harjutamiseks: http://goo.gl/73xBZ&lt;br /&gt;
Kes tunneb, et test on &#039;&#039;&#039;liiga keeruline&#039;&#039;&#039;, peab &#039;&#039;&#039;kaaluma&#039;&#039;&#039; aine deklareerimise asemel &#039;&#039;&#039;Osadmin aine (mis on soovituslik eeldus) läbimist&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Ubuntu Desktop Linux&#039;&#039;&#039; paigaldamine (Võib paigaldada ka mõne muu disrtibutsiooni desktop masina, kuna seda läheb meil niikuinii hiljem vaja)&lt;br /&gt;
**Memory 1024MB&lt;br /&gt;
**HDD 16GB (või 8GB) Dynamic disk&lt;br /&gt;
**Network&lt;br /&gt;
**Video Memory 64MB 3D acceleration sisse&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NB! Kasutamiseks valmis masinad: [http://elab.itcollege.ee:8000/ubuntu-server-64.ova server 64bit] ja [http://elab.itcollege.ee:8000/ubuntu-desktop-64.ova klient 64bit], [http://elab.itcollege.ee:8000/UbuntuServer32bit.ova server 32bit] ja [http://elab.itcollege.ee:8000/UbuntuDesktop32bit.ova klient 32bit]&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Pärast paigaldamist seadistada [https://wiki.itcollege.ee/index.php/OpenSSH:_v%C3%B5tmetega_autentimine key based autentimisega] serverisse sisenemine. (tööjaamast saab serveris käske käivitada)&lt;br /&gt;
&lt;br /&gt;
==Teine ja kolmas praktikum - Eeldustetest ja kordamine==&lt;br /&gt;
&lt;br /&gt;
Kordamiseks leiate vajalikku infot [https://wiki.itcollege.ee/index.php/Category:Operatsioonis%C3%BCsteemide_administreerimine_ja_sidumine Operatsioonisüsteemide administreerimise ja sidumise] aine vikist. &lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/AFGfoV Eeldustetest 1]&lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/F0PiWK Eeldustetest 2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Linux keskhaldus puppet baasil==&lt;br /&gt;
&lt;br /&gt;
Praktikumis paigaldame puppet serveri (master) ja kliendi.&lt;br /&gt;
&lt;br /&gt;
Näiteülesanded kaitsmiseks&lt;br /&gt;
&lt;br /&gt;
1. Loo puppet abil fail /etc/issue sisuga KALA&lt;br /&gt;
&lt;br /&gt;
2. Loo puppet abil kasutaja polekala, kodukaustaga /home/polekala, shelliga /bin/zsh ( tee ka paki zsh paigaldus)&lt;br /&gt;
&lt;br /&gt;
3. Lisa nodele class tarkvara, mis paigaldab htop, bpython pakid&lt;br /&gt;
&lt;br /&gt;
4. Loo nodele class eemalda, mis eemaldab paki cowsay&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Viimane ülesanne on igal ühel erinev.&lt;br /&gt;
&lt;br /&gt;
5.1 Loo serverisse kasutaja kala ja tee talle ssh key. Seadista kliendiarvuti selliselt, et paigaldataks pakk ssh ja lisataks root kasutajale kliendis loodud ssh public key.&lt;br /&gt;
&lt;br /&gt;
5.2 Paigalda kliendi arvutisse ntp server ja määra ntp serveriteks ntp.eenet.ee ja ntp.ut.ee&lt;br /&gt;
&lt;br /&gt;
5.3 Lisa kliendi arvutisse apache2 veebiserver koos virtualhostiga www.planet.zz, (failis /var/www/www.planet.zz/index.html on rida www.planet.zz)&lt;br /&gt;
Apache konfis peab olema ServerName www.planet.zz ja sites-enabled all sait www.planet.zz&lt;br /&gt;
&lt;br /&gt;
5.4 Lisa kliendi arvutisse bind9 nimeserver (normaalselt tööjaama seda ei tehta, kuid antud näitel on meil vaid üks konfigureeritav host). Seadista enda valitud domeeniminega tsoon koos revers tsooniga. Lisa kirjed www.sinudomeen.zz, mail.sinudomeen.zz, puppet.sinudomeen.zz koos PTR kirjetega.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Puppet Examples]]&lt;br /&gt;
&lt;br /&gt;
==Keskne logiserver==&lt;br /&gt;
Labor 2 üheks võimalikuks teemaks on keskse logihalduse lahenduse loomine&lt;br /&gt;
&lt;br /&gt;
[[Keskse logilahenduse rakendamine]]&lt;br /&gt;
&lt;br /&gt;
[http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf  Lõputöö logihalduse teemal]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://rdstash.blogspot.com/2013/01/installing-logstash-as-syslog-server-on.html&lt;br /&gt;
&lt;br /&gt;
=Esseede teemad 2012=&lt;br /&gt;
&lt;br /&gt;
Võib valida keerulisemaid teemasid ka [[Osadmin referaadi teemad]] lehelt.&lt;br /&gt;
&lt;br /&gt;
[[zsh]] - pole algajale&lt;br /&gt;
&lt;br /&gt;
Mida uurida &lt;br /&gt;
&lt;br /&gt;
Prompt&lt;br /&gt;
&lt;br /&gt;
http://zshwiki.org/home/config/prompt&lt;br /&gt;
&lt;br /&gt;
http://stevelosh.com/blog/2010/02/my-extravagant-zsh-prompt/&lt;br /&gt;
&lt;br /&gt;
.zshrc&lt;br /&gt;
&lt;br /&gt;
for &lt;br /&gt;
&lt;br /&gt;
if &lt;br /&gt;
&lt;br /&gt;
while &lt;br /&gt;
&lt;br /&gt;
jne&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[exFAT vs Linux]] - Kalju Hõbemäe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[CentOS Server]] --- teeb Oliver Naaris&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Superb Mini Server]] --- Mark-Erik Mogom, Andrus Dei &lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
DNS, samba, LDAP, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Oracle Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Suse Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba seadistamine&lt;br /&gt;
&lt;br /&gt;
[[OpenLDAP Ubuntu Serveril]] - Tarmo Suurmägi, Taavi Sannik, Harri Uljas&lt;br /&gt;
&lt;br /&gt;
[[Zentyal SAMBA4]] --- Lang &amp;amp; Lihten A31&lt;br /&gt;
&lt;br /&gt;
Samba4 domeenikontrolleri seadistamine ja ubuntu/fedora/muu süsteem autentimise seadistamine kasutades uusi vahendeid&lt;br /&gt;
&lt;br /&gt;
[[Apt-yum/dpkg-rpm käskude lühivõrdlus]] - Teet Saar A32&lt;br /&gt;
&lt;br /&gt;
[[Ophcrack]] - teeb Kristo Kapten&lt;br /&gt;
&lt;br /&gt;
[[rancid]] - Meelis Kurnikov, Aive Haavel AK31&lt;br /&gt;
&lt;br /&gt;
[[zenoss]] - Kristjan Vaik&lt;br /&gt;
&lt;br /&gt;
[[Apache autentimine LDAP&#039;iga]] - Rauno Lehiste&lt;br /&gt;
=Esseede teemad 2013=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Linux failisüsteemi jõudluse mõõtmine]]&lt;br /&gt;
&lt;br /&gt;
[[passenger]]&lt;br /&gt;
&lt;br /&gt;
[[NFTables]]&lt;br /&gt;
&lt;br /&gt;
[[Ipcop]] - saab kaasajastada&lt;br /&gt;
&lt;br /&gt;
[[suricata]] http://www.openinfosecfoundation.org/index.php/download-suricata - Martin Leppik ja Randel Raidmets 12.12.2013&lt;br /&gt;
&lt;br /&gt;
[[snort]] http://www.snort.org/ - võib kaasajastada&lt;br /&gt;
&lt;br /&gt;
[[Owncloud]] - Tõnu Erm AK31&lt;br /&gt;
&lt;br /&gt;
[[Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll]] - Sten Aus 28.11.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskse logilahenduse rakendamine Rsyslog näitel]] - Kimmo Lillipuu, Kaarel Kuurmann, Heigo Punapart 18.12.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskse logihalduse tarvis kliendile Rsyslogi paigladmaine ja seadistamine puppeti abil ]] - Indrek Mitt, Priidu Niit 19.12.2013&lt;br /&gt;
&lt;br /&gt;
[[Nagios 3.5]] - Piia Ploovits, Sandra Sirel, Kristian Kivimägi, Grete Maisla 19.12.2013&lt;br /&gt;
&lt;br /&gt;
[[MySecureShell - SecureFTP]] - Kalle Kadakas 20.12.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskne logiserver]] - Tauri Jaanus 25.12.2013&lt;br /&gt;
&lt;br /&gt;
[[ISPConf 3 Ubuntu serverile 13.04]] - Ülo Vardja ja Aare Uibomäe 04.01.2014&lt;br /&gt;
&lt;br /&gt;
[[Bind9 nimeserver (puppet baasil)]] - Liis Mironova 06.01.2014&lt;br /&gt;
&lt;br /&gt;
[[Pure-FTPd]] - Maris Kuusik 07.01.2014&lt;br /&gt;
&lt;br /&gt;
[[Logiserver, mis kogub võrgust kokku mikrotik ruuteri logid ]] - Lauri Rüütli ja Tõnu Ruut 07.01.14&lt;br /&gt;
&lt;br /&gt;
[[PHORONIX TEST SUITE]] - Tammo Oolup 08.01.2013&lt;br /&gt;
&lt;br /&gt;
[[Conky]] - Kristjan Karu 09.01.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskse logihalduse süsteem Splunk baasil]] - Veiko Virk 10.01.2014&lt;br /&gt;
&lt;br /&gt;
[[Keskse logihaldus Rsyslog ja SEC näitel]] - Kristjan Rõõm, Viljar Rooda 10.01.2014&lt;br /&gt;
&lt;br /&gt;
=Eksamist=&lt;br /&gt;
&lt;br /&gt;
Tee ära labor 2 (oma valitud teemal + selle kohta wiki kirjatöö)&lt;br /&gt;
Eksamil ole valmis demoma labor 1 raames kaitstud asju.&lt;br /&gt;
&lt;br /&gt;
Kirjatööd sisu tuleb eksamil kaitsta vestluse vormis.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus saab kaitsta ka labor 1 ja 2 asju.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus tõmbad loosi, mida labor 1 raames parandada. Õppejõud teeb teenuse katki ja tudeng teeb korda. (soovitatav on eelnevalt teha  teenusest varukoopia).&lt;br /&gt;
&lt;br /&gt;
Punkte saab selgituse eest, mis oli katki ja kuidas tegid korda.&lt;br /&gt;
&lt;br /&gt;
Katki tegemisel võib arvestada näiteks, et algaja admin (õppejõud:) muutis ära parooli, rikkus võrguseaded ja kustutas täiesti süüdimatult mõne konfifaili.&lt;br /&gt;
&lt;br /&gt;
=Laborimaterjalid 2012=&lt;br /&gt;
&lt;br /&gt;
Teha apt -  yum ja dpkg - rpm vastavustabel. dpkg ja apt korraldused leiab [http://elab.itcollege.ee:8000/Linux-Basics.mm Linux-Basics mindmapist]&lt;br /&gt;
&lt;br /&gt;
Parim töö annab 7p, järgmised 5p (piisavalt põhjalikud ja erinevad)&lt;br /&gt;
&lt;br /&gt;
Ebapiisavad vastavustabelid, mis sarnanevad üksteisele punkte ei saa.&lt;br /&gt;
&lt;br /&gt;
Kui su tabel on ilma vigadeta, kuid mitte parimate sead siis saad 1-2p.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 4&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Nimeserveri BIND9 paigaldamine.&lt;br /&gt;
&lt;br /&gt;
*Mõtle välja domeenimini&lt;br /&gt;
*Paigalda nimeserver bind9&lt;br /&gt;
*Seadista oma domeen&lt;br /&gt;
**www.domeen&lt;br /&gt;
**ns.domeen&lt;br /&gt;
**sales.domeen&lt;br /&gt;
**seadista oma kliendimasin kasutama uut nimeserverit&lt;br /&gt;
&lt;br /&gt;
NB: enne kaitsmist lugeda läbi http://kuutorvaja.eenet.ee/wiki/DNS&lt;br /&gt;
&lt;br /&gt;
Labori üks näide [[Nimeserveri seadistamine BIND9 näitel]]&lt;br /&gt;
&lt;br /&gt;
Praktikumi salvestus http://echo360.e-uni.ee/ess/echo/presentation/a828b6af-8caf-4319-b594-5d6bfed04a70&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama nii nimede lahendamine läbi teie nimeserveri kui ka reverse lookup.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Veebiserveri apache2 paigaldamine&lt;br /&gt;
&lt;br /&gt;
*Loo veebisaidid www.domeen ja sales.domeen (ehk oma DNS labori nimedele vastavad veebisaidid)&lt;br /&gt;
Praktikumi salvestus: http://echo360.e-uni.ee/ess/echo/presentation/0945a764-0305-48ec-8082-4e57a23cc536&lt;br /&gt;
*Seadist HTTPS nendele saitidele (vajadusel loo uus ip alias ja muuda nimeserveris olevat kirjet, et TLS nimed viitaks erinevatele IP aadressidele)&lt;br /&gt;
*Abiks on loeng: http://enos.itcollege.ee/~mernits/infrastruktuur/loeng04%20-%20Veebiserver.odp ja labor: https://wiki.itcollege.ee/index.php/Veebiserveri_labor_v.2&lt;br /&gt;
*Paigalda WordPress vastavalt juhendile: http://goo.gl/6XQ0U&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama veebiserververi apache2 pealt 2 veebilehte ning wordpress. Wordpressile peab olema paigaldatud super cache ning lisaks peab töötama varnish. Seejuures wordpress on seadistatud pordile 80 ja wordpress pordil 8080. Lehe toimivust testige enne kaitsmist ab vahendiga, kus -n 1000 ja -t 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 7&#039;&#039;&#039;&lt;br /&gt;
Samba share-i välja jagamine. &lt;br /&gt;
&lt;br /&gt;
*Loo share, mis on ligipääsetav vaid kasutajatele, kes kuuluvad lab gruppi. Vajalik on ka share-ile kirjutamisõigus (saab kausta luua). &lt;br /&gt;
* Seadista samba abil kasutajate kodukaustadele ligipääsemine. Iga kasutaja peab ligi pääsema enda kodukaustale. &lt;br /&gt;
&lt;br /&gt;
*Abiks on viki artiklid : https://wiki.itcollege.ee/index.php/Failiserver_Samba_labor_2 ja https://wiki.itcollege.ee/index.php/Lihtne_samba_install&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; on vajalik share-i olemasolu, mis on ligipääsetav ning kirjutatav (võimalik luua kataloogi) ainult lab gruppi kuuluvatele kasutajatele ning lab gruppi mitte kuuluvad kasutajad ei tohi sinna ligi pääseda. &lt;br /&gt;
Lisaks peavad kasutajad pääsema ligi oma kodukaustale, sõltumata sellest, kas ta kuulub lab gruppi või mitte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 1&#039;&#039;&#039;&lt;br /&gt;
*Veebiserver ja virtualhostid&lt;br /&gt;
*DNS&lt;br /&gt;
*e-post&lt;br /&gt;
*iptables&lt;br /&gt;
*samba&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 2&#039;&#039;&#039;&lt;br /&gt;
*LDAP või Samba4 - LDAP Teet Saar, Kullo-Kalev Aru&lt;br /&gt;
*Puppet või chef&lt;br /&gt;
*PAM&lt;br /&gt;
*Puppet (Ubuntus) - Kristo Kapten&lt;br /&gt;
*[[Samba(windows domeenis fileserver)]] - Marko Kurs&lt;br /&gt;
*[[TLS termineerimine nginx abil]] - Sander Arnus, Sander Saveli&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=73510</id>
		<title>Linuxi administreerimine</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=73510"/>
		<updated>2014-01-10T17:04:02Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Esseede teemad 2013 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Üldinfo=&lt;br /&gt;
ECTS: 4&lt;br /&gt;
Hindamisviis: Eksam&lt;br /&gt;
&lt;br /&gt;
==Õppejõud==&lt;br /&gt;
Margus Ernits&lt;br /&gt;
&lt;br /&gt;
Katrin Loodus&lt;br /&gt;
&lt;br /&gt;
=Eeldused ja sihtgrupp=&lt;br /&gt;
&lt;br /&gt;
Operatsioonisüsteemide administreerimine ja sidumine (Rangelt soovituslik). Osadmin aines loetava oskamine on antud aine õppimise eelduseks. ÕISis on see eeldus märgitud soovituslikuks, kuna igal aastal on paar inimest, kes suudavad mõlemad ained korraga läbida ja on antud vallas väga pädevad.&lt;br /&gt;
Linuxi administraatori kursus on mõeldud tugeva infotehnoloogilise põhjaga arvuti-spetsialistile.&lt;br /&gt;
Kursuse rõhk on eelkõige võrguhalduril, kelle tööülesannete hulka kuulub igapäevane serverite, võrgu jms hooldus, konfigureerimine ja uute seadmete installatsioon.&lt;br /&gt;
&lt;br /&gt;
=Eesmärk ja sisu=&lt;br /&gt;
&lt;br /&gt;
Kursuse esimeses osas õpitakse tundma Linux süsteemi toimimist, antakse ülevaade administreerimistoimingute automatiseerimisest shelli skriptide abil ja omandatakse praktiline käsufailide koostamise kogemus.&lt;br /&gt;
&lt;br /&gt;
Teises osas õpitakse paigaldama ja konfigureerima erinevaid võrguteenuseid. Kursuse teise osa alguses korratakse taseme ühtlustamiseks TCP/IP võrgu põhialuseid.&lt;br /&gt;
&lt;br /&gt;
=Õpiväljundid=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Loengud=&lt;br /&gt;
&lt;br /&gt;
Kaugõppe loengute ja praktikumide videosalvestused:&lt;br /&gt;
http://echo360.e-ope.ee/ess/portal/section/4bd0abde-1b0d-4c92-a35e-0f99a81f069d&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Sissejuhatav loeng eeldustest [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng01%20-%20Sissejuhatus%20ainesse%20Linux%20administreerimine%20-%202013%20.pdf Sissejuhatus Loeng 1]&lt;br /&gt;
&lt;br /&gt;
1.1. Kordamine Osadmin [http://elab.itcollege.ee:8000/Linux-Basics.mm]&lt;br /&gt;
&lt;br /&gt;
2. Linux süsteemi põhilised komponendid [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng02%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 2]&lt;br /&gt;
&lt;br /&gt;
3. Linux süsteemi haldamine puppet abil I [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng03%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 3]&lt;br /&gt;
&lt;br /&gt;
4. Linux süsteemi haldamine puppet abil II [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng04%20-%20Linux%20s%c3%bcsteemide%20haldamine%20II%20-%202013%20.pdf Linux haldamine Loeng 4]&lt;br /&gt;
&lt;br /&gt;
5. Linux süsteemi haldamine puppet abil III [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng05%20-%20Linux%20s%c3%bcsteemide%20haldamine%20III%20-%202013%20.pdf Linux haldamine Loeng 5]&lt;br /&gt;
&lt;br /&gt;
5.1 Puppeti seadistamine passenger mooduli abil [[Puppet - passenger]]&lt;br /&gt;
&lt;br /&gt;
Puppeti teise loengu video: http://elab.itcollege.ee:8000/linux-admin/pupppet-algus.ogv&lt;br /&gt;
&lt;br /&gt;
=Praktikumid=&lt;br /&gt;
&lt;br /&gt;
==Esimene praktikum - Ubuntu Serveri ja kliendi paigaldamine ning kordamine==&lt;br /&gt;
* Paigaldage &#039;&#039;&#039;Ubuntu Linux Server&#039;&#039;&#039; süsteem VirtualBox abil&lt;br /&gt;
**RAM 512MB&lt;br /&gt;
**HDD dynamicly allocated 8GB&lt;br /&gt;
**2 Võrgukaarti NIC1 - NAT (eth0 - Ubuntus) ja NIC2 - HostOnly (eth1 - Ubuntus)&lt;br /&gt;
**Logige serverisse sisse ja seadistage võrk failis /etc/network/interfaces (liidese eth1 ip aadress 192.168.56.200). &lt;br /&gt;
***Abiinfo [[Ubuntu server võrgu seadistamine]] ja [[VirtualBoxi võrgud]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
auto eth1&lt;br /&gt;
iface eth1 inet static&lt;br /&gt;
  address 192.168.56.200&lt;br /&gt;
  netmask 255.255.255.0&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Paigaldage openssh server, kui te seda installi käigus ei teinud (apt-get update &amp;amp;&amp;amp; apt-get install ssh)&lt;br /&gt;
&lt;br /&gt;
Ubuntu Server 12.04.1 LTS ISO (64bit) http://elab.itcollege.ee:8000/ubuntu-12.04.1-server-amd64.iso&lt;br /&gt;
&lt;br /&gt;
Eelduste kontrollimise test harjutamiseks: http://goo.gl/73xBZ&lt;br /&gt;
Kes tunneb, et test on &#039;&#039;&#039;liiga keeruline&#039;&#039;&#039;, peab &#039;&#039;&#039;kaaluma&#039;&#039;&#039; aine deklareerimise asemel &#039;&#039;&#039;Osadmin aine (mis on soovituslik eeldus) läbimist&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Ubuntu Desktop Linux&#039;&#039;&#039; paigaldamine (Võib paigaldada ka mõne muu disrtibutsiooni desktop masina, kuna seda läheb meil niikuinii hiljem vaja)&lt;br /&gt;
**Memory 1024MB&lt;br /&gt;
**HDD 16GB (või 8GB) Dynamic disk&lt;br /&gt;
**Network&lt;br /&gt;
**Video Memory 64MB 3D acceleration sisse&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NB! Kasutamiseks valmis masinad: [http://elab.itcollege.ee:8000/ubuntu-server-64.ova server 64bit] ja [http://elab.itcollege.ee:8000/ubuntu-desktop-64.ova klient 64bit], [http://elab.itcollege.ee:8000/UbuntuServer32bit.ova server 32bit] ja [http://elab.itcollege.ee:8000/UbuntuDesktop32bit.ova klient 32bit]&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Pärast paigaldamist seadistada [https://wiki.itcollege.ee/index.php/OpenSSH:_v%C3%B5tmetega_autentimine key based autentimisega] serverisse sisenemine. (tööjaamast saab serveris käske käivitada)&lt;br /&gt;
&lt;br /&gt;
==Teine ja kolmas praktikum - Eeldustetest ja kordamine==&lt;br /&gt;
&lt;br /&gt;
Kordamiseks leiate vajalikku infot [https://wiki.itcollege.ee/index.php/Category:Operatsioonis%C3%BCsteemide_administreerimine_ja_sidumine Operatsioonisüsteemide administreerimise ja sidumise] aine vikist. &lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/AFGfoV Eeldustetest 1]&lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/F0PiWK Eeldustetest 2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Linux keskhaldus puppet baasil==&lt;br /&gt;
&lt;br /&gt;
Praktikumis paigaldame puppet serveri (master) ja kliendi.&lt;br /&gt;
&lt;br /&gt;
Näiteülesanded kaitsmiseks&lt;br /&gt;
&lt;br /&gt;
1. Loo puppet abil fail /etc/issue sisuga KALA&lt;br /&gt;
&lt;br /&gt;
2. Loo puppet abil kasutaja polekala, kodukaustaga /home/polekala, shelliga /bin/zsh ( tee ka paki zsh paigaldus)&lt;br /&gt;
&lt;br /&gt;
3. Lisa nodele class tarkvara, mis paigaldab htop, bpython pakid&lt;br /&gt;
&lt;br /&gt;
4. Loo nodele class eemalda, mis eemaldab paki cowsay&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Viimane ülesanne on igal ühel erinev.&lt;br /&gt;
&lt;br /&gt;
5.1 Loo serverisse kasutaja kala ja tee talle ssh key. Seadista kliendiarvuti selliselt, et paigaldataks pakk ssh ja lisataks root kasutajale kliendis loodud ssh public key.&lt;br /&gt;
&lt;br /&gt;
5.2 Paigalda kliendi arvutisse ntp server ja määra ntp serveriteks ntp.eenet.ee ja ntp.ut.ee&lt;br /&gt;
&lt;br /&gt;
5.3 Lisa kliendi arvutisse apache2 veebiserver koos virtualhostiga www.planet.zz, (failis /var/www/www.planet.zz/index.html on rida www.planet.zz)&lt;br /&gt;
Apache konfis peab olema ServerName www.planet.zz ja sites-enabled all sait www.planet.zz&lt;br /&gt;
&lt;br /&gt;
5.4 Lisa kliendi arvutisse bind9 nimeserver (normaalselt tööjaama seda ei tehta, kuid antud näitel on meil vaid üks konfigureeritav host). Seadista enda valitud domeeniminega tsoon koos revers tsooniga. Lisa kirjed www.sinudomeen.zz, mail.sinudomeen.zz, puppet.sinudomeen.zz koos PTR kirjetega.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Puppet Examples]]&lt;br /&gt;
&lt;br /&gt;
==Keskne logiserver==&lt;br /&gt;
Labor 2 üheks võimalikuks teemaks on keskse logihalduse lahenduse loomine&lt;br /&gt;
&lt;br /&gt;
[[Keskse logilahenduse rakendamine]]&lt;br /&gt;
&lt;br /&gt;
[http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf  Lõputöö logihalduse teemal]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://rdstash.blogspot.com/2013/01/installing-logstash-as-syslog-server-on.html&lt;br /&gt;
&lt;br /&gt;
=Esseede teemad 2012=&lt;br /&gt;
&lt;br /&gt;
Võib valida keerulisemaid teemasid ka [[Osadmin referaadi teemad]] lehelt.&lt;br /&gt;
&lt;br /&gt;
[[zsh]] - pole algajale&lt;br /&gt;
&lt;br /&gt;
Mida uurida &lt;br /&gt;
&lt;br /&gt;
Prompt&lt;br /&gt;
&lt;br /&gt;
http://zshwiki.org/home/config/prompt&lt;br /&gt;
&lt;br /&gt;
http://stevelosh.com/blog/2010/02/my-extravagant-zsh-prompt/&lt;br /&gt;
&lt;br /&gt;
.zshrc&lt;br /&gt;
&lt;br /&gt;
for &lt;br /&gt;
&lt;br /&gt;
if &lt;br /&gt;
&lt;br /&gt;
while &lt;br /&gt;
&lt;br /&gt;
jne&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[exFAT vs Linux]] - Kalju Hõbemäe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[CentOS Server]] --- teeb Oliver Naaris&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Superb Mini Server]] --- Mark-Erik Mogom, Andrus Dei &lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
DNS, samba, LDAP, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Oracle Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Suse Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba seadistamine&lt;br /&gt;
&lt;br /&gt;
[[OpenLDAP Ubuntu Serveril]] - Tarmo Suurmägi, Taavi Sannik, Harri Uljas&lt;br /&gt;
&lt;br /&gt;
[[Zentyal SAMBA4]] --- Lang &amp;amp; Lihten A31&lt;br /&gt;
&lt;br /&gt;
Samba4 domeenikontrolleri seadistamine ja ubuntu/fedora/muu süsteem autentimise seadistamine kasutades uusi vahendeid&lt;br /&gt;
&lt;br /&gt;
[[Apt-yum/dpkg-rpm käskude lühivõrdlus]] - Teet Saar A32&lt;br /&gt;
&lt;br /&gt;
[[Ophcrack]] - teeb Kristo Kapten&lt;br /&gt;
&lt;br /&gt;
[[rancid]] - Meelis Kurnikov, Aive Haavel AK31&lt;br /&gt;
&lt;br /&gt;
[[zenoss]] - Kristjan Vaik&lt;br /&gt;
&lt;br /&gt;
[[Apache autentimine LDAP&#039;iga]] - Rauno Lehiste&lt;br /&gt;
=Esseede teemad 2013=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Linux failisüsteemi jõudluse mõõtmine]]&lt;br /&gt;
&lt;br /&gt;
[[passenger]]&lt;br /&gt;
&lt;br /&gt;
[[NFTables]]&lt;br /&gt;
&lt;br /&gt;
[[Ipcop]] - saab kaasajastada&lt;br /&gt;
&lt;br /&gt;
[[suricata]] http://www.openinfosecfoundation.org/index.php/download-suricata - Martin Leppik ja Randel Raidmets 12.12.2013&lt;br /&gt;
&lt;br /&gt;
[[snort]] http://www.snort.org/ - võib kaasajastada&lt;br /&gt;
&lt;br /&gt;
[[Owncloud]] - Tõnu Erm AK31&lt;br /&gt;
&lt;br /&gt;
[[Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll]] - Sten Aus 28.11.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskse logilahenduse rakendamine Rsyslog näitel]] - Kimmo Lillipuu, Kaarel Kuurmann, Heigo Punapart 18.12.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskse logihalduse tarvis kliendile Rsyslogi paigladmaine ja seadistamine puppeti abil ]] - Indrek Mitt, Priidu Niit 19.12.2013&lt;br /&gt;
&lt;br /&gt;
[[Nagios 3.5]] - Piia Ploovits, Sandra Sirel, Kristian Kivimägi, Grete Maisla 19.12.2013&lt;br /&gt;
&lt;br /&gt;
[[MySecureShell - SecureFTP]] - Kalle Kadakas 20.12.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskne logiserver]] - Tauri Jaanus 25.12.2013&lt;br /&gt;
&lt;br /&gt;
[[ISPConf 3 Ubuntu serverile 13.04]] - Ülo Vardja ja Aare Uibomäe 04.01.2014&lt;br /&gt;
&lt;br /&gt;
[[Bind9 nimeserver (puppet baasil)]] - Liis Mironova 06.01.2014&lt;br /&gt;
&lt;br /&gt;
[[Pure-FTPd]] - Maris Kuusik 07.01.2014&lt;br /&gt;
&lt;br /&gt;
[[Logiserver, mis kogub võrgust kokku mikrotik ruuteri logid ]] - Lauri Rüütli ja Tõnu Ruut 07.01.14&lt;br /&gt;
&lt;br /&gt;
[[PHORONIX TEST SUITE]] - Tammo Oolup 08.01.2013&lt;br /&gt;
&lt;br /&gt;
[[Conky]] - Kristjan Karu 09.01.2013&lt;br /&gt;
&lt;br /&gt;
[[Keskse logihalduse süsteem Splunk baasil]] - Veiko Virk 10.01.2014&lt;br /&gt;
[[Keskse logihaldus Rsyslog ja SEC näitel]] - Kristjan Rõõm, Viljar Rooda 10.01.2014&lt;br /&gt;
&lt;br /&gt;
=Eksamist=&lt;br /&gt;
&lt;br /&gt;
Tee ära labor 2 (oma valitud teemal + selle kohta wiki kirjatöö)&lt;br /&gt;
Eksamil ole valmis demoma labor 1 raames kaitstud asju.&lt;br /&gt;
&lt;br /&gt;
Kirjatööd sisu tuleb eksamil kaitsta vestluse vormis.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus saab kaitsta ka labor 1 ja 2 asju.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus tõmbad loosi, mida labor 1 raames parandada. Õppejõud teeb teenuse katki ja tudeng teeb korda. (soovitatav on eelnevalt teha  teenusest varukoopia).&lt;br /&gt;
&lt;br /&gt;
Punkte saab selgituse eest, mis oli katki ja kuidas tegid korda.&lt;br /&gt;
&lt;br /&gt;
Katki tegemisel võib arvestada näiteks, et algaja admin (õppejõud:) muutis ära parooli, rikkus võrguseaded ja kustutas täiesti süüdimatult mõne konfifaili.&lt;br /&gt;
&lt;br /&gt;
=Laborimaterjalid 2012=&lt;br /&gt;
&lt;br /&gt;
Teha apt -  yum ja dpkg - rpm vastavustabel. dpkg ja apt korraldused leiab [http://elab.itcollege.ee:8000/Linux-Basics.mm Linux-Basics mindmapist]&lt;br /&gt;
&lt;br /&gt;
Parim töö annab 7p, järgmised 5p (piisavalt põhjalikud ja erinevad)&lt;br /&gt;
&lt;br /&gt;
Ebapiisavad vastavustabelid, mis sarnanevad üksteisele punkte ei saa.&lt;br /&gt;
&lt;br /&gt;
Kui su tabel on ilma vigadeta, kuid mitte parimate sead siis saad 1-2p.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 4&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Nimeserveri BIND9 paigaldamine.&lt;br /&gt;
&lt;br /&gt;
*Mõtle välja domeenimini&lt;br /&gt;
*Paigalda nimeserver bind9&lt;br /&gt;
*Seadista oma domeen&lt;br /&gt;
**www.domeen&lt;br /&gt;
**ns.domeen&lt;br /&gt;
**sales.domeen&lt;br /&gt;
**seadista oma kliendimasin kasutama uut nimeserverit&lt;br /&gt;
&lt;br /&gt;
NB: enne kaitsmist lugeda läbi http://kuutorvaja.eenet.ee/wiki/DNS&lt;br /&gt;
&lt;br /&gt;
Labori üks näide [[Nimeserveri seadistamine BIND9 näitel]]&lt;br /&gt;
&lt;br /&gt;
Praktikumi salvestus http://echo360.e-uni.ee/ess/echo/presentation/a828b6af-8caf-4319-b594-5d6bfed04a70&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama nii nimede lahendamine läbi teie nimeserveri kui ka reverse lookup.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Veebiserveri apache2 paigaldamine&lt;br /&gt;
&lt;br /&gt;
*Loo veebisaidid www.domeen ja sales.domeen (ehk oma DNS labori nimedele vastavad veebisaidid)&lt;br /&gt;
Praktikumi salvestus: http://echo360.e-uni.ee/ess/echo/presentation/0945a764-0305-48ec-8082-4e57a23cc536&lt;br /&gt;
*Seadist HTTPS nendele saitidele (vajadusel loo uus ip alias ja muuda nimeserveris olevat kirjet, et TLS nimed viitaks erinevatele IP aadressidele)&lt;br /&gt;
*Abiks on loeng: http://enos.itcollege.ee/~mernits/infrastruktuur/loeng04%20-%20Veebiserver.odp ja labor: https://wiki.itcollege.ee/index.php/Veebiserveri_labor_v.2&lt;br /&gt;
*Paigalda WordPress vastavalt juhendile: http://goo.gl/6XQ0U&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama veebiserververi apache2 pealt 2 veebilehte ning wordpress. Wordpressile peab olema paigaldatud super cache ning lisaks peab töötama varnish. Seejuures wordpress on seadistatud pordile 80 ja wordpress pordil 8080. Lehe toimivust testige enne kaitsmist ab vahendiga, kus -n 1000 ja -t 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 7&#039;&#039;&#039;&lt;br /&gt;
Samba share-i välja jagamine. &lt;br /&gt;
&lt;br /&gt;
*Loo share, mis on ligipääsetav vaid kasutajatele, kes kuuluvad lab gruppi. Vajalik on ka share-ile kirjutamisõigus (saab kausta luua). &lt;br /&gt;
* Seadista samba abil kasutajate kodukaustadele ligipääsemine. Iga kasutaja peab ligi pääsema enda kodukaustale. &lt;br /&gt;
&lt;br /&gt;
*Abiks on viki artiklid : https://wiki.itcollege.ee/index.php/Failiserver_Samba_labor_2 ja https://wiki.itcollege.ee/index.php/Lihtne_samba_install&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; on vajalik share-i olemasolu, mis on ligipääsetav ning kirjutatav (võimalik luua kataloogi) ainult lab gruppi kuuluvatele kasutajatele ning lab gruppi mitte kuuluvad kasutajad ei tohi sinna ligi pääseda. &lt;br /&gt;
Lisaks peavad kasutajad pääsema ligi oma kodukaustale, sõltumata sellest, kas ta kuulub lab gruppi või mitte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 1&#039;&#039;&#039;&lt;br /&gt;
*Veebiserver ja virtualhostid&lt;br /&gt;
*DNS&lt;br /&gt;
*e-post&lt;br /&gt;
*iptables&lt;br /&gt;
*samba&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 2&#039;&#039;&#039;&lt;br /&gt;
*LDAP või Samba4 - LDAP Teet Saar, Kullo-Kalev Aru&lt;br /&gt;
*Puppet või chef&lt;br /&gt;
*PAM&lt;br /&gt;
*Puppet (Ubuntus) - Kristo Kapten&lt;br /&gt;
*[[Samba(windows domeenis fileserver)]] - Marko Kurs&lt;br /&gt;
*[[TLS termineerimine nginx abil]] - Sander Arnus, Sander Saveli&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=User:Kroom&amp;diff=73508</id>
		<title>User:Kroom</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=User:Kroom&amp;diff=73508"/>
		<updated>2014-01-10T17:00:54Z</updated>

		<summary type="html">&lt;p&gt;Kroom: Created page with &amp;quot;= Ülesande püstitus =  Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.  = Kasutatud tarkvara ja virtuaalmasinad = == Tarkvara == Rs…&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Ülesande püstitus = &lt;br /&gt;
Juhendi eesmärgiks on luua keskne logihaldus Rsyslog ja SEC näitel ning esmane logi seire.&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara ja virtuaalmasinad =&lt;br /&gt;
== Tarkvara ==&lt;br /&gt;
Rsyslog 5.8.6&amp;lt;br/&amp;gt;&lt;br /&gt;
SEC 2.5.3&lt;br /&gt;
== Virtuaalmasinad ==&lt;br /&gt;
1) Keskne logiserver: Ubuntu Server 64bit versioon 12.04.3 LTS. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.201&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Klient: Ubuntu Desktop 64bit versioon 13. &amp;lt;br/&amp;gt;&lt;br /&gt;
IP aadress: 192.168.56.101&lt;br /&gt;
= Logiserveri seadistamine =&lt;br /&gt;
== Rsyslog [http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf]==&lt;br /&gt;
1) Luua uus virtuaalmasin unikaalse IP-aadressiga.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
2) Seejärel tuleks luua kaust logide jaoks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&#039;&#039;NB! Kõik käsklused peaksid olema SUDO õigustes&#039;&#039;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/remote&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
3) Pärast seda tuleks anda kaustale grupi automaatse kirjutamise õigus&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chmod g+ws /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
4) Samuti tuleks ka kausta omanik ära vahetada, et syslogil oleks täiendavad õigused.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown syslog:adm /var/log/remote/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
5) Seejärel tuleks lisada konfiguratsioonifaili(/etc/rsyslog.conf) järgnevad read:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# This one is the template to generate the log filename dynamically, depending on the client&#039;s IP address.&lt;br /&gt;
$template FILENAME,&amp;quot;/var/log/remote/%fromhost-ip%/syslog.log&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Log all messages to the dynamically formed file. Now each clients log (192.168.56.*), will be under a separate directory which is formed by the template FILENAME.&lt;br /&gt;
*.* ?FILENAME&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
6) Pärast seda tuleks kliendi masina konfiguratsioonifaili(/etc/rsyslog.conf) lisada.&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# provides TCP syslog reception&lt;br /&gt;
$ModLoad imtcp&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
$InputTCPServerRun 1025&lt;br /&gt;
&lt;br /&gt;
# Provides TCP forwarding.&lt;br /&gt;
#default port 514 do not work untill rsyslog has been updated.&lt;br /&gt;
 *.* @@192.168.56.201:1025&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Kasutatud kirjandus = &lt;br /&gt;
http://www.canonical.com/sites/default/files/active/Whitepaper-CentralisedLogging-v1.pdf &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.thegeekstuff.com/2012/01/rsyslog-remote-logging/ &amp;lt;br/&amp;gt;&lt;br /&gt;
http://www.occam.com/sa/CentralizedLogging2012.pdf&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=PowerShell:_Telnet%C3%BChendaja&amp;diff=48445</id>
		<title>PowerShell: Telnetühendaja</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=PowerShell:_Telnet%C3%BChendaja&amp;diff=48445"/>
		<updated>2012-05-22T11:53:45Z</updated>

		<summary type="html">&lt;p&gt;Kroom: Created page with &amp;#039;&amp;lt;Source lang=&amp;quot;powershell&amp;quot;&amp;gt; &amp;lt;#  .SYNOPSIS  Skript, mis loob telnetyhenduse etteantud aadressiga. Seejärel küsitakse kasutajanimi ja parool ning asutakse k2skusid t2itma(hetkel o…&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;Source lang=&amp;quot;powershell&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;# &lt;br /&gt;
.SYNOPSIS&lt;br /&gt;
 Skript, mis loob telnetyhenduse etteantud aadressiga. Seejärel küsitakse kasutajanimi ja parool ning asutakse k2skusid t2itma(hetkel on cisco ruuteri default conf)&lt;br /&gt;
.DESCRIPTION&lt;br /&gt;
  Porti saab vabalt muuta. K2skudevaheline aeg on pandud kahe sekundi peale, ning k6iki k2ske ning nende vastuseid v2ljastatakse ekraanile&lt;br /&gt;
.Example&lt;br /&gt;
  Skripti k2ivtamiseks tuleks lisada parameeter aadressiga&lt;br /&gt;
  C:\PS&amp;gt;.\kodut88.ps1 192.168.1.1&lt;br /&gt;
.NOTES&lt;br /&gt;
  Autor: Kristjan Rõõm&lt;br /&gt;
  Versioon: 0.3&lt;br /&gt;
  Muutmise kuup2ev 25.04.2012&lt;br /&gt;
.LINK&lt;br /&gt;
  http://www.itcollege.ee&lt;br /&gt;
#&amp;gt;&lt;br /&gt;
#etteantud parameeter loetakse sisse stringina&lt;br /&gt;
param([String] $Hosta)&lt;br /&gt;
#m22rame vastava pordi&lt;br /&gt;
$port = 23&lt;br /&gt;
#kysime kasutajanime&lt;br /&gt;
$Usern = read-host &amp;quot;Sisestage kasutajanimi&amp;quot;&lt;br /&gt;
#kysime parooli&lt;br /&gt;
$pw = read-host &amp;quot;Sisestage parool&amp;quot; -AsSecureString&lt;br /&gt;
#muudame parooli tavatekstiks&lt;br /&gt;
$BasicString = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($pw)&lt;br /&gt;
$Passw = [System.Runtime.InteropServices.Marshal]::PtrToStringAuto($BasicString)&lt;br /&gt;
&lt;br /&gt;
#funktsioon, mis loeb k2skudele j2rgnenud vastuseid&lt;br /&gt;
function readResponse {&lt;br /&gt;
while($stream.DataAvailable)&lt;br /&gt;
{&lt;br /&gt;
$read = $stream.Read($buffer, 0, 1024)&lt;br /&gt;
write-host -n -foregroundcolor cyan ($encoding.GetString($buffer, 0, $read))&lt;br /&gt;
&amp;quot;&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
#yhenduse parameetritega muutuja&lt;br /&gt;
$socket = new-object System.Net.Sockets.TcpClient($Hosta, $port)&lt;br /&gt;
if($socket -eq $null) { return; }&lt;br /&gt;
&lt;br /&gt;
#loome yhenduse&lt;br /&gt;
$stream = $socket.GetStream()&lt;br /&gt;
$writer = new-object System.IO.StreamWriter($stream)&lt;br /&gt;
$buffer = new-object System.Byte[] 1024&lt;br /&gt;
$encoding = new-object System.Text.AsciiEncoding&lt;br /&gt;
&lt;br /&gt;
#anname j2rjest vajalikud k2sud&lt;br /&gt;
&lt;br /&gt;
#loetakse sisse k2sk&lt;br /&gt;
$command = $Usern&lt;br /&gt;
#antakse k2sk writerile&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
#tyhjendatakse writer&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
#oodatakse 2 sekundit&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
#loetakse vastus&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = $Passw&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;enable&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;configure terminal&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;hostname Router1&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;enable secret mingiparool&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;no ip domain-lookup&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &#039;banner motd &amp;quot;welcome R1&amp;quot;&#039;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;line console 0&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
write-host -foregroundcolor DarkGreen $command&lt;br /&gt;
&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;password mingiparool&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;logging synchronous&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;login&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;line vty 0 4&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;password mingiparool&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;logging synchronous&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
$command = &amp;quot;login&amp;quot;&lt;br /&gt;
$writer.WriteLine($command)&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
start-sleep -m 2000&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$writer.Flush()&lt;br /&gt;
readResponse($stream)&lt;br /&gt;
# sulgeme striimi&lt;br /&gt;
$writer.Close()&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Skriptimiskeeled:_powershelli_kodut%C3%B6%C3%B6d_2012,_kevad,_p%C3%A4eva%C3%B5pe&amp;diff=48440</id>
		<title>Skriptimiskeeled: powershelli kodutööd 2012, kevad, päevaõpe</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Skriptimiskeeled:_powershelli_kodut%C3%B6%C3%B6d_2012,_kevad,_p%C3%A4eva%C3%B5pe&amp;diff=48440"/>
		<updated>2012-05-22T11:50:55Z</updated>

		<summary type="html">&lt;p&gt;Kroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Jaan Igamees==&lt;br /&gt;
Lühike jutt, mida skript teeb... bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla, bla. &lt;br /&gt;
&lt;br /&gt;
[[PowerShell: Jaan Igamees, kavalskript]]&lt;br /&gt;
&lt;br /&gt;
==Tambet Liiv==&lt;br /&gt;
Kirjutab arvutinime, loogiliste kõvaketaste arvu, nende suuruse ja vaba ruumi andmebaasi. Anmebaasi tüüp peab olema MySql. Rohkem infot skripti kohta on skriptis endas.&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: SQLi baasi kirjutamise skript]]&lt;br /&gt;
&lt;br /&gt;
==Sander Arnus==&lt;br /&gt;
Skript kuvab desktopile kasutajanime, masinanime ja IP aadressid.&lt;br /&gt;
On võimalus pilt ette anda. Kui pilti ei anta kirjutab taustapildile. Teistkorda samale pildile kirjutades teeb tausta mustaks ja kirjutab andmed.&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: Desktopile info kuvamine]]&lt;br /&gt;
&lt;br /&gt;
==Sander Saveli==&lt;br /&gt;
Skript kirjutab Microsoft Sql serverisse arvuti nime, loogiliste kõvakettaste nime, loogiliste kõvaketaste suuruse ja vaba ruumi ning kirje tegemise aja.&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: Microsoft SQLi baasi kirjutamise skript]]&lt;br /&gt;
&lt;br /&gt;
==Oliver Naaris==&lt;br /&gt;
&lt;br /&gt;
Loob XML faili, kuhu on lisatud &amp;quot;Masin&amp;quot;, &amp;quot;Ketas&amp;quot;, &amp;quot;Kokku&amp;quot;, &amp;quot;Vaba&amp;quot;, &amp;quot;Aeg&amp;quot; elemendid ning küsib masinalt arvutinime, kettanime, ketta suurust, vaba ruumi kettal ning lisab need XML elementidesse.&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: XML elementidesse kirjutamise skript]]&lt;br /&gt;
&lt;br /&gt;
==Robert Pärn==&lt;br /&gt;
&lt;br /&gt;
Loob faili, kus sees on andmed ketastest kohalikus arvutis kuupäeva järgi. Samuti tutvustab minu artikkel, kuidas panna Task Scheduler&#039;iga tööle skript iga teatud aja järel.&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: Skriptide käivitamine Task Scheduleriga]]&lt;br /&gt;
&lt;br /&gt;
==Jevgeni Pogodin==&lt;br /&gt;
&lt;br /&gt;
Sckipt trükib välja lühikene arvuti info ja kontrollib &amp;quot;Plug and Play&amp;quot; seaded, kas seal on mingeid vead. Kui kõik on OK, siis script teavitab et kõik on korras, aga kui ta leiab mingeid seadme probleemid, siis ta trükib välja infot selle seadmete kohta ja kirjeldab, mis probleem teil on.&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: Plug and Play seadmete kontrollimise skript]]&lt;br /&gt;
&lt;br /&gt;
==Inger Romanenko==&lt;br /&gt;
&lt;br /&gt;
Skripti peab ette andma 2 parameetrit: kaust kust otsitakse ja uus kaust. Käib läbi kõik failid otsingu kaustast (ja alamkaustadest).&lt;br /&gt;
Loob uue kausta ja sellesse leitud laiendite nimelised alamkaustad ja kopeerib failid vastavalt laiendile kaustadesse.&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: Failide sorteerimine laiendi järgi]]&lt;br /&gt;
&lt;br /&gt;
==Lauri Rüütli==&lt;br /&gt;
&lt;br /&gt;
Skript võtab Active Directory-st kõik kasutajad kellel ei ole meilikontot ja teeb neile Exchange serverisse meilikonto.&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: Meilikontode loomine]]&lt;br /&gt;
&lt;br /&gt;
==Priit Voodla==&lt;br /&gt;
&lt;br /&gt;
Skript saadab soovitud mailiaadressile HTML-faili, milles Exchange 2007 top 15 postkasti info&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: Exchange 2007 suured postkastid]]&lt;br /&gt;
&lt;br /&gt;
==Kermo Pajula==&lt;br /&gt;
&lt;br /&gt;
Skript otsib etteantud kaustast üles logifailid, mille vanus ületab kriteeriumi ja arhiveerib need&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: Logifailide arhivaar]]&lt;br /&gt;
&lt;br /&gt;
==Iti Liivik==&lt;br /&gt;
Kustutab ära prügikastist kõik failid, mida ei ole 30 päeva jooksul muudetud.&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: Recycle Bin&#039;i tühjendamise skript]]&lt;br /&gt;
&lt;br /&gt;
==Kristjan Rõõm==&lt;br /&gt;
Loob telnetühenduse mingi seadmega ning annab talle käske ette(hetkel ruuter ja cisco default conf).&lt;br /&gt;
&lt;br /&gt;
[[PowerShell: Telnetühendaja]]&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Meeskond_%22Tartu_r%C3%B5%C3%B5m%22&amp;diff=47145</id>
		<title>Meeskond &quot;Tartu rõõm&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Meeskond_%22Tartu_r%C3%B5%C3%B5m%22&amp;diff=47145"/>
		<updated>2012-04-02T08:12:24Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Sander Saveli */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Liikmed ==&lt;br /&gt;
*Inger Romanenko A31&lt;br /&gt;
*Sander Saveli A22&lt;br /&gt;
*Sander Arnus A22&lt;br /&gt;
*Kalmer Tart D22&lt;br /&gt;
*Kristjan Rõõm A32&lt;br /&gt;
&lt;br /&gt;
==Meie eesmärk intensiivõppe raames==&lt;br /&gt;
&lt;br /&gt;
===Automaatne võrguühenduste konfigureerimine erinevate võrkudega===&lt;br /&gt;
&lt;br /&gt;
Konfigureerida arvuti, millel on 3G, Wifi, Ethernet-over-Powerline ja Etherneti pordid ning mille operatsioonisüsteemiks on Ubuntu Linux. Võrguühendust vahetataks ühenduse olemasolu ja prioriteetide alusel üle erinevate tehnoloogiate võimalikult lihtsalt ja kiirelt. IP aadress ei pea samaks jääma. Wifi adapter valib ise parima avaliku võrgu, kui ei ole konfigureeritud teisiti. Kui Wifi ühendus kaob, proovib teisi ka taustal. Kõik ümberlülitamised logitakse. Näiteks: Prioriteetideks on Ethernet:1; EoP:2; Wifi:3; 3G:4. Ühendatakse kõikidesse võimalikesse võrkudesse ning kui Ethernet ära kukub ning pole võimalik ühenduda ka läbi EoP, toimub ühenduse ümberlülitamine Wifi võrku. Kui Wifi ära kukub, siis ühendutakse 3G võrku. Kui tuleb suvaline public wifi tagasi, ühendutakse sinna jne. Luua lihtne kasutajaliides Android telefonile, mis lubab üle bluetooth ühenduse erinevaid võrke ja prioriteete konfigureerida ning vaadata ühenduste ajalugu.&lt;br /&gt;
&lt;br /&gt;
==Ajakava/progress==&lt;br /&gt;
=== Esmaspäev 26.03.2012 ===&lt;br /&gt;
&#039;&#039;&#039;Eesmärgid:&#039;&#039;&#039;&lt;br /&gt;
* Tutvuda olukorraga ja tehnoloogiatega&lt;br /&gt;
* Kohtuda Ericssoni esindajaga, saada täpne ülevaade ülesandest.&lt;br /&gt;
* Panna paika algne tegevuskava.&lt;br /&gt;
&lt;br /&gt;
Küsimused Ericssonile:&lt;br /&gt;
* Kuidas teha vahet eop-l ja ethernetil?&lt;br /&gt;
* Mis tehnoloogiaid kasutada&lt;br /&gt;
* Miks selline ülesanne?&lt;br /&gt;
* Kus seda kasutama võidakse hakata?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Edusammud:&#039;&#039;&#039;&lt;br /&gt;
* Leidsime badVPN NCD http://code.google.com/p/badvpn/wiki/NCD, nimelise võrguhaldustarkvara ning proovime sellega prioritiseerida erinevaid võrguliideseid.&lt;br /&gt;
* Kohtusime Ericssoni esindajaga ning saime täpsema ülevaate ülesandest. Peame määrama ühendustele prioriteedid ning valima parima ühenduse liigi vastavalt prioriteedile. Wifi puhul peame ühenduma public wifisse ning kui on mitu erinevat võrku saadaval, proovima erinevaid. Võrgutegevust logitakse. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Ericssonist saime katsetamiseks kaasa järgneva tehnika :&#039;&#039;&lt;br /&gt;
* nettop PC FIT-PC2&lt;br /&gt;
* 3G EMT mobiilse internetimodemi&lt;br /&gt;
* bluetooth adapteri&lt;br /&gt;
* ethernet over powerline seadmed&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Küsimus:&#039;&#039;&#039; Kas kasutame enda leitud badVPN NCD-d või kasutame Linuxis vaikimisi töös olevat Network Manageri?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Materjalid badVPN NCD kohta:&#039;&#039;&#039;&lt;br /&gt;
* http://code.google.com/p/badvpn/wiki/NCD &lt;br /&gt;
* http://code.google.com/p/badvpn/wiki/Installation&lt;br /&gt;
&lt;br /&gt;
Tegime katseid virtualiseeritud keskkonnas. Hetkel suudab NCD prioriteetide alusel ühenduda erinevatesse ethernet liidestega. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Otsustasime enda leitud lahenduse kasuks, sest badVPN NCD teeb täpselt seda mis meil vaja - ühendub erinevatesse võrkudesse prioriteedide alusel.&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;Hetkel tundub, et Network Manageri kasutades peaksime tunduvalt rohkem loogikat ise valmis kirjutama.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Läksime üle katsetustele päris masinas. Installeerisime nettopi peale Lubuntu Linuxi. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Hakkame modifitseerima badVPN-i, et saada tööle ka Wi-Fi ja 3G.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tulemus:&#039;&#039;&#039; NCD suudab prioriteedide alusel valida parima ühenduse wifi ja etherneti vahel. Hetkel aga on probleem wifi public võrkudega, nimelt ühendub wifi adapter ainult etteantud võrku. Tuleks kirjutada skript, mis otsib avatud wifi võrke. Alustasime ka mobiilse interneti lahendusega, kuid hetkel tunudb, et NCD seda võimalust ei toeta.&lt;br /&gt;
&lt;br /&gt;
====NCD konfiguratsioon====&lt;br /&gt;
&amp;lt;source lang=&amp;quot;cfm&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Example NCD program.&lt;br /&gt;
# All interfaces are disabled by default.&lt;br /&gt;
# Remove/comment the first line of a process to activate the interface.&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
process ethernet1 {&lt;br /&gt;
   # Set device.&lt;br /&gt;
   var(&amp;quot;eth1&amp;quot;) dev;&lt;br /&gt;
&lt;br /&gt;
   # Wait for device and link.&lt;br /&gt;
   net.backend.waitdevice(dev);&lt;br /&gt;
   net.up(dev);&lt;br /&gt;
   net.backend.waitlink(dev);&lt;br /&gt;
&lt;br /&gt;
   # DHCP configuration.&lt;br /&gt;
   # net.ipv4.dhcp() will block here until it obtaines an IP address.&lt;br /&gt;
   # It doesn&#039;t check the obtained address in any way,&lt;br /&gt;
   # so as a basic security measure, do not proceed if it is local.&lt;br /&gt;
   net.ipv4.dhcp(dev) dhcp;&lt;br /&gt;
   ip_in_network(dhcp.addr, &amp;quot;127.0.0.0&amp;quot;, &amp;quot;8&amp;quot;) test_local;&lt;br /&gt;
   ifnot(test_local);&lt;br /&gt;
   var(dhcp.addr) addr;&lt;br /&gt;
   var(dhcp.prefix) addr_prefix;&lt;br /&gt;
   var(dhcp.gateway) gateway;&lt;br /&gt;
   var(dhcp.dns_servers) dns_servers;&lt;br /&gt;
&lt;br /&gt;
   # Static configuration.&lt;br /&gt;
   # To use, comment/remove the DHCP configuration above and uncomment this.&lt;br /&gt;
   #var(&amp;quot;192.168.111.116&amp;quot;) addr;&lt;br /&gt;
   #var(&amp;quot;24&amp;quot;) addr_prefix;&lt;br /&gt;
   #var(&amp;quot;192.168.111.1&amp;quot;) gateway;&lt;br /&gt;
   #list(&amp;quot;192.168.111.14&amp;quot;, &amp;quot;193.2.1.66&amp;quot;) dns_servers;&lt;br /&gt;
&lt;br /&gt;
   # Assign IP address.&lt;br /&gt;
   net.ipv4.addr(dev, addr, addr_prefix);&lt;br /&gt;
&lt;br /&gt;
   # Go on configuring the network.&lt;br /&gt;
   multiprovide(&amp;quot;NET-ethernet&amp;quot;);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
process eop  {&lt;br /&gt;
   # Set device.&lt;br /&gt;
   var(&amp;quot;eth2&amp;quot;) dev;&lt;br /&gt;
&lt;br /&gt;
   # Wait for device.&lt;br /&gt;
   net.backend.waitdevice(dev);&lt;br /&gt;
   net.up(dev);&lt;br /&gt;
   net.backend.waitlink(dev);&lt;br /&gt;
&lt;br /&gt;
   # DHCP configuration.&lt;br /&gt;
   # net.ipv4.dhcp() will block here until it obtaines an IP address.&lt;br /&gt;
   # It doesn&#039;t check the obtained address in any way,&lt;br /&gt;
   # so as a basic security measure, do not proceed if it is local.&lt;br /&gt;
   net.ipv4.dhcp(dev) dhcp;&lt;br /&gt;
   ip_in_network(dhcp.addr, &amp;quot;127.0.0.0&amp;quot;, &amp;quot;8&amp;quot;) test_local;&lt;br /&gt;
   ifnot(test_local);&lt;br /&gt;
   var(dhcp.addr) addr;&lt;br /&gt;
   var(dhcp.prefix) addr_prefix;&lt;br /&gt;
   var(dhcp.gateway) gateway;&lt;br /&gt;
   var(dhcp.dns_servers) dns_servers;&lt;br /&gt;
&lt;br /&gt;
   # Assign IP address.&lt;br /&gt;
   net.ipv4.addr(dev, addr, addr_prefix);&lt;br /&gt;
&lt;br /&gt;
   # Go on configuring the network.&lt;br /&gt;
   multiprovide(&amp;quot;NET-eop&amp;quot;);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
process pp {&lt;br /&gt;
   # Set device.&lt;br /&gt;
   var(&amp;quot;ppp0&amp;quot;) dev;&lt;br /&gt;
&lt;br /&gt;
   # Wait for device.&lt;br /&gt;
   net.backend.waitdevice(dev);&lt;br /&gt;
   net.up(dev);&lt;br /&gt;
   net.backend.waitlink(dev);&lt;br /&gt;
&lt;br /&gt;
   # DHCP configuration.&lt;br /&gt;
   # net.ipv4.dhcp() will block here until it obtaines an IP address.&lt;br /&gt;
   # It doesn&#039;t check the obtained address in any way,&lt;br /&gt;
   # so as a basic security measure, do not proceed if it is local.&lt;br /&gt;
   net.ipv4.dhcp(dev) dhcp;&lt;br /&gt;
   ip_in_network(dhcp.addr, &amp;quot;127.0.0.0&amp;quot;, &amp;quot;8&amp;quot;) test_local;&lt;br /&gt;
   ifnot(test_local);&lt;br /&gt;
   #var(dhcp.addr) addr;&lt;br /&gt;
   #var(dhcp.prefix) addr_prefix;&lt;br /&gt;
   #var(dhcp.gateway) gateway;&lt;br /&gt;
   #var(dhcp.dns_servers) dns_servers;&lt;br /&gt;
&lt;br /&gt;
   # Assign IP address.&lt;br /&gt;
   #net.ipv4.addr(dev, addr, addr_prefix);&lt;br /&gt;
&lt;br /&gt;
   # Go on configuring the network.&lt;br /&gt;
   multiprovide(&amp;quot;NET-pp&amp;quot;);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
process wlan {&lt;br /&gt;
&lt;br /&gt;
   # Set device.&lt;br /&gt;
   var(&amp;quot;wlan1&amp;quot;) dev;&lt;br /&gt;
&lt;br /&gt;
   # Wait for device and rfkill.&lt;br /&gt;
   net.backend.waitdevice(dev);&lt;br /&gt;
   net.backend.rfkill(&amp;quot;wlan&amp;quot;, dev);&lt;br /&gt;
&lt;br /&gt;
   # Connect to wireless network.&lt;br /&gt;
   list() args;&lt;br /&gt;
   net.backend.wpa_supplicant(dev, &amp;quot;/etc/wpa_supplicant/all.conf&amp;quot;, &amp;quot;/sbin/wpa_supplicant&amp;quot;, args);&lt;br /&gt;
&lt;br /&gt;
   # DHCP configuration. See above for static configuration.&lt;br /&gt;
   net.ipv4.dhcp(dev) dhcp;&lt;br /&gt;
   ip_in_network(dhcp.addr, &amp;quot;127.0.0.0&amp;quot;, &amp;quot;8&amp;quot;) test_local;&lt;br /&gt;
   ifnot(test_local);&lt;br /&gt;
   var(dhcp.addr) addr;&lt;br /&gt;
   var(dhcp.prefix) addr_prefix;&lt;br /&gt;
   var(dhcp.gateway) gateway;&lt;br /&gt;
   var(dhcp.dns_servers) dns_servers;&lt;br /&gt;
&lt;br /&gt;
   # Assign IP address to interface.&lt;br /&gt;
   net.ipv4.addr(dev, addr, addr_prefix);&lt;br /&gt;
&lt;br /&gt;
   # Go on configuring the network.&lt;br /&gt;
   multiprovide(&amp;quot;NET-wlan&amp;quot;);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
process NETCONF {&lt;br /&gt;
   # Wait for some network connection. Order by priority.&lt;br /&gt;
   list(&amp;quot;NET-wlan&amp;quot;, &amp;quot;NET-eop&amp;quot;, &amp;quot;NET-pp&amp;quot;, &amp;quot;NET-ethernet&amp;quot;) pnames;&lt;br /&gt;
   multidepend(pnames) ifdep;&lt;br /&gt;
   &lt;br /&gt;
   #if(pnames == &amp;quot;NET-pp&amp;quot;)&lt;br /&gt;
   &lt;br /&gt;
   var(ifdep.dev) dev;&lt;br /&gt;
   var(ifdep.addr) addr;&lt;br /&gt;
   var(ifdep.addr_prefix) addr_prefix;&lt;br /&gt;
   var(ifdep.gateway) gateway;&lt;br /&gt;
   var(ifdep.dns_servers) dns_servers;&lt;br /&gt;
&lt;br /&gt;
   # Add default route.&lt;br /&gt;
   net.ipv4.route(&amp;quot;0.0.0.0&amp;quot;, &amp;quot;0&amp;quot;, gateway, &amp;quot;20&amp;quot;, dev);&lt;br /&gt;
&lt;br /&gt;
   # Configure DNS servers.&lt;br /&gt;
   net.dns(dns_servers, &amp;quot;20&amp;quot;);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Teisipäev 27.03.2012===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Eesmärgid:&#039;&#039;&#039; &lt;br /&gt;
* Saada valmis prioritiseerimine&lt;br /&gt;
* Kirjutada skript, mis otsiks avatud wifi võrke&lt;br /&gt;
* Saada tööle 3G&lt;br /&gt;
* Alustada logimisega ning androidi rakenduse kirjutamisega.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Hakkame lähemalt uurima Network Manageri alternatiivina, sest badVPN-il NCD ja 3G konfiguratsioonid satuvad konflikti, mis teeb 3G ühenduse initsialiseerimise keerukaks.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Selgus lõplikult, et NCD-ga ei õnnestu meil töötavat 3G-ga funktsionaalsust luua.&lt;br /&gt;
Hakkasime ülesannet lahendama linuxi &#039;&#039;&#039;Network Manageri&#039;&#039;&#039; abil.&lt;br /&gt;
Network Manageris toimib vaikimisi võrkude prioritiseerimine, esialgu tundub et ei ole võimalik ise prioriteete määrata, ilma source koodi muutmata.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Hakkame uurima erinevaid võimalusi kuidas võrke Network manageriga prioritiseerida&#039;&#039;&lt;br /&gt;
Network Manageril on sisseehitatud kindlad prioriteedid ja selle raames toimib kõik väga hästi, aga probleem tekib sellestm et Network Manageris ei saa muuta prioriteete.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Lahendus: hakkasime meetrikute alusel prioritiseerima routing tables erinevate ühenduste default route, mille tulemusena saame luua ühenduste prioriteetide järjekorra.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Kirjutasime iga Interfacei üles ja allaminemise korral skriptid, mis lisavad ja kustutavad vastava default gateway ja metricuga routi IP route tabelist. &lt;br /&gt;
Default gateway saame kätte Network Manageri käsurea tööriista - &#039;&#039;&#039;nmcli&#039;&#039;&#039; päringu kaudu. Nmcli on kõige kiirem võimalus, sest kliendi poole pealt küsib DHCP infot Network Manager.&lt;br /&gt;
&lt;br /&gt;
====IF UP skript====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if [ &amp;quot;$IFACE&amp;quot; = &amp;quot;eth1&amp;quot; ]; then&lt;br /&gt;
ADR=$(nmcli dev list iface eth1 | grep GATEWAY | cut -d &amp;quot; &amp;quot; -f20)&lt;br /&gt;
ip route del default&lt;br /&gt;
ip route add default via $ADR dev eth1 metric 5&lt;br /&gt;
fi;&lt;br /&gt;
if [ &amp;quot;$IFACE&amp;quot; = &amp;quot;eth2&amp;quot; ]; then&lt;br /&gt;
ADR=$(nmcli dev list iface eth2 | grep GATEWAY | cut -d &amp;quot; &amp;quot; -f20)&lt;br /&gt;
ip route del default&lt;br /&gt;
ip route add default via $ADR dev eth2 metric 2&lt;br /&gt;
fi;&lt;br /&gt;
if [ &amp;quot;$IFACE&amp;quot; = &amp;quot;wlan1&amp;quot; ]; then&lt;br /&gt;
ADR=$(nmcli dev list iface wlan1 | grep GATEWAY | cut -d &amp;quot; &amp;quot; -f20)&lt;br /&gt;
ip route del default&lt;br /&gt;
ip route add default via $ADR dev wlan1 metric 3&lt;br /&gt;
fi;&lt;br /&gt;
if [ &amp;quot;$IFACE&amp;quot; = &amp;quot;ppp0&amp;quot; ]; then&lt;br /&gt;
ADR=$(nmcli dev list iface ttyUSB0 | grep GATEWAY | cut -d &amp;quot; &amp;quot; -f20)&lt;br /&gt;
ip route del default&lt;br /&gt;
ip route add default via $ADR dev ppp0 metric 6&lt;br /&gt;
fi;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== IF DOWN skript====&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
if [ &amp;quot;$IFACE&amp;quot; = &amp;quot;eth1&amp;quot; ]; then&lt;br /&gt;
sleep 3&lt;br /&gt;
ip route del default&lt;br /&gt;
fi;&lt;br /&gt;
if [ &amp;quot;$IFACE&amp;quot; = &amp;quot;eth2&amp;quot; ]; then&lt;br /&gt;
sleep 3&lt;br /&gt;
ip route del default&lt;br /&gt;
fi;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Kalmer hakkab uurima võimalusi kuidas teha androidi rakendust, millega saaks ühenduda bluetoothiga arvutiga ning konfigureerida võrgu prioriteete.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tegime skripti wifi jaoks, mis otsib kõik avalikud wifi võrgud, mis on läheduses ja koostab nende kohta individuaalfailid mida kasutab Network Maganager võrkudesse automaatseks ühendamiseks. &lt;br /&gt;
&lt;br /&gt;
==== Avalike wifi võrkude otsimise skript ====&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
# Autor: Tartu Rõõm&lt;br /&gt;
# Kirjeldus, mida skript teeb&lt;br /&gt;
##&lt;br /&gt;
# Versioon 1.0&lt;br /&gt;
&lt;br /&gt;
# Kontrollib kas juurkasutajana k2ivitati skript&lt;br /&gt;
export LC_ALL=C&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if [ $UID -ne 0  ]&lt;br /&gt;
then&lt;br /&gt;
  echo &amp;quot;K2ivita skript $(basename $0) juurkasutaja 6igustes&amp;quot;&lt;br /&gt;
exit 1&lt;br /&gt;
fi&lt;br /&gt;
&lt;br /&gt;
#Leiame arvuti wlan seadme mac aadressi&lt;br /&gt;
MAC=$(ifconfig | grep wlan | cut -d &amp;quot; &amp;quot; -f10)&lt;br /&gt;
echo &amp;quot;Arvuti mac: $MAC&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Otsime avalikud võrgud&lt;br /&gt;
for line in $(nmcli -p dev wifi | grep [--] | grep s | cut -d &amp;quot;&#039;&amp;quot; -f2); do&lt;br /&gt;
      SSID=$line&lt;br /&gt;
&lt;br /&gt;
   #Suvaline arv UUID&lt;br /&gt;
   HEX=&amp;quot;0123456789abcdef&amp;quot;&lt;br /&gt;
   BEGIN=$( for i in {1..8} ; do echo -n ${HEX:$(( $RANDOM % 16 )):1} ; done )&lt;br /&gt;
   KAKS=$( for i in {1..4} ; do echo -n ${HEX:$(( $RANDOM % 16 )):1} ; done )&lt;br /&gt;
   KOLM=$( for i in {1..4} ; do echo -n ${HEX:$(( $RANDOM % 16 )):1} ; done )&lt;br /&gt;
   NELI=$( for i in {1..4} ; do echo -n ${HEX:$(( $RANDOM % 16 )):1} ; done )&lt;br /&gt;
   END=$( for i in {1..12} ; do echo -n ${HEX:$(( $RANDOM % 16 )):1} ; done )&lt;br /&gt;
   UUID=&amp;quot;$BEGIN-$KAKS-$KOLM-$NELI-$END&amp;quot;&lt;br /&gt;
&lt;br /&gt;
   echo &amp;quot;SSID: $SSID&amp;quot;&lt;br /&gt;
&lt;br /&gt;
      # Loome igale access pointile ssid faili&lt;br /&gt;
      touch /etc/NetworkManager/system-connections/$SSID&lt;br /&gt;
&lt;br /&gt;
cat &amp;gt; /etc/NetworkManager/system-connections/$SSID &amp;lt;&amp;lt; LOPP&lt;br /&gt;
&lt;br /&gt;
[connection]&lt;br /&gt;
id=$SSID&lt;br /&gt;
uuid=$UUID&lt;br /&gt;
type=802-11-wireless&lt;br /&gt;
&lt;br /&gt;
[802-11-wireless]&lt;br /&gt;
ssid=$SSID&lt;br /&gt;
mode=infrastructure&lt;br /&gt;
mac-address=$MAC&lt;br /&gt;
&lt;br /&gt;
[ipv6]&lt;br /&gt;
method=auto&lt;br /&gt;
&lt;br /&gt;
[ipv4]&lt;br /&gt;
method=auto&lt;br /&gt;
&lt;br /&gt;
LOPP&lt;br /&gt;
&lt;br /&gt;
      chmod 600 /etc/NetworkManager/system-connections/$SSID&lt;br /&gt;
&lt;br /&gt;
done&lt;br /&gt;
&lt;br /&gt;
#service network-manager restart&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Kolmapäev 28.03.2012===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Eesmärgid:&#039;&#039;&#039;&lt;br /&gt;
* Saada tööle 3G prioritiseerimine&lt;br /&gt;
* arendada Androidi rakendust&lt;br /&gt;
* Teha logimine&lt;br /&gt;
* Korrastada dokumentatsioon&lt;br /&gt;
* Valmistuda presentatsiooniks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Probleem&#039;&#039;&#039;&lt;br /&gt;
Vaikimisi 3G ühendus ei tule ise ülesse. Oleks vaja teada kuhu ja millal USB modem ühendatakse, Lisaks selle oleks vaja automaatlselt luua ühendus, mille alusel saaks kätte default gateway ning saaks teha sissekirjutuse routing tabelisse.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Lahendus&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Lisasime /lib/udev/rules.d/40-usb_modeswitch.rules faili RUN käsu järele skripti, mis vastava mudeli USB modemi korral initsialiseerib ühenduse.&lt;br /&gt;
&lt;br /&gt;
==== Mobiilse internetiühenduse automaatse loomise skript====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
sleep 30&lt;br /&gt;
nmcli con up id &amp;quot;EMT Default&amp;quot;&lt;br /&gt;
sleep 2&lt;br /&gt;
usb_modeswitch &#039;%b/%k&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Loggimise skript====&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
DATE=$(date +%Y-%m-%d)&lt;br /&gt;
mkdir /var/log/nm&lt;br /&gt;
less /var/log/syslog | grep NetworkManager &amp;gt; /var/log/nm/nmlog$DATE.txt&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Millegi pärast, peale arvuti restarti ei tule eth2 kohe üles. Lahendasime probleemi skriptiga, msi teeb interfacile restardi.&lt;br /&gt;
&lt;br /&gt;
===Neljapäev 29.03.2012===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Eesmärgid:&#039;&#039;&#039;&lt;br /&gt;
* luua ping test&lt;br /&gt;
* arendada Androidi rakendust&lt;br /&gt;
* Teha logimine&lt;br /&gt;
* Korrastada dokumentatsioon&lt;br /&gt;
* Valmistuda presentatsiooniks&lt;br /&gt;
&lt;br /&gt;
Kuna ühendus võib olla üleval, kuid sidet internetiga pole, otsustasime teha skripti , mis pingi kaudu kontrollib internetiühendust. &lt;br /&gt;
Pingitakse kõige madalama metricuga default gatewayd, ehk gatewayd, mida kasutatakse. Kui ping ei vasta, suurendatakse merticut 10 võrra, 30min pärast tehakse interfacile restart ning interface tuleb esialge metricuga tagasi, mille peale käivitatske ping test.&lt;br /&gt;
&lt;br /&gt;
====Ping test skript====&lt;br /&gt;
&amp;lt;source lang= &amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
#/etc/nmskript/pingtest.sh&lt;br /&gt;
&lt;br /&gt;
# Lõputu tsükkel&lt;br /&gt;
while [ true ]; do&lt;br /&gt;
  echo &amp;quot;while algus&amp;quot;&lt;br /&gt;
&lt;br /&gt;
      #Kui ping õnnestub siis magab 5min (hetkel 5s)&lt;br /&gt;
      PACKETS=$(ping -c 5 8.8.8.8 | grep packets | cut -d &amp;quot; &amp;quot; -f4)&lt;br /&gt;
      sleep 5&lt;br /&gt;
      echo “$PACKETS pakki läks läbi”&lt;br /&gt;
      #Kui üle kolme paki viiest läks läbi, siis magab&lt;br /&gt;
      if [ $PACKETS -gt 3 ]; then&lt;br /&gt;
          echo &amp;quot;Ping t66tab, magan 10s&amp;quot;&lt;br /&gt;
          sleep 10&lt;br /&gt;
&lt;br /&gt;
      #Kui ping ei toimi võtab muutujad, kustutab rea, annab esimesele suurema meetriku&lt;br /&gt;
      else&lt;br /&gt;
              &lt;br /&gt;
           IFACE=$(ip route | grep default | grep metric | head -n 1 | cut -d &amp;quot; &amp;quot; -f5)&lt;br /&gt;
         echo &amp;quot;$IFACE ping ei toimi!&amp;quot;&lt;br /&gt;
           METER=$(ip route | grep default | grep metric | head -n 1 | cut -d &amp;quot; &amp;quot; -f8)&lt;br /&gt;
           METER=$(($METER + 10))&lt;br /&gt;
           ADR=$(nmcli dev list iface $IFACE | grep GATEWAY | cut -d &amp;quot; &amp;quot; -f20)&lt;br /&gt;
           ip route del default&lt;br /&gt;
         sleep 1&lt;br /&gt;
           ip route add default via $ADR dev $IFACE metric $METER&lt;br /&gt;
&lt;br /&gt;
              sleep 10          &lt;br /&gt;
      fi&lt;br /&gt;
done&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Androidi rakenduse arendamine jääb hetkel seisma, kuna pole piisavalt aega ega teadmisi.&lt;br /&gt;
&lt;br /&gt;
==Arvamus==&lt;br /&gt;
===Sander Saveli===&lt;br /&gt;
Üldiselt loen intensiivõppe nädalat enda jaoks korda läinuks. Väga huvitava kogemuse andis reaalse projekti juures kindla tiimiga töötamine, kus oli etteantud ajakva.&lt;br /&gt;
&lt;br /&gt;
===Kristjan Rõõm===&lt;br /&gt;
Intensiivõppe nädal oli huvitav ning asjalik kogemus. Korraldus oli suhtelist hea, kuigi vahepeal tuli juhendajatest puudus. Peamiselt sai uuritud Network Manageri käitumist ning võrguühenduste prioritiseerimist. Lisaks sai rakendada ka skriptimisoskust. Palju teadmisi kogunes linuxi (Ubuntu) võrguühenduste kohta (kaustad, kust automaatselt skripte käivitatakse ning ühenduste konfigureeimisfailid). Kasulik kogemus ja pitsa maitses hästi.&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Windows-t%C3%B6%C3%B6jaamade_haldamise_aines_valminud_referaadid_2011_s%C3%BCgis,_p%C3%A4eva%C3%B5pe&amp;diff=38351</id>
		<title>Windows-tööjaamade haldamise aines valminud referaadid 2011 sügis, päevaõpe</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Windows-t%C3%B6%C3%B6jaamade_haldamise_aines_valminud_referaadid_2011_s%C3%BCgis,_p%C3%A4eva%C3%B5pe&amp;diff=38351"/>
		<updated>2011-10-14T17:04:47Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Kristjan Rõõm */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Jaan Igamees=&lt;br /&gt;
* Referaat: [[MiskiAsjalikTeema]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:VHD_Boot&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
=Silver Kullarand=&lt;br /&gt;
* Referaat: [[SmartScreen Filter]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Dynamic_disk&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:Windows_8_-_mida_uut&lt;br /&gt;
&lt;br /&gt;
=Tambet Liiv=&lt;br /&gt;
* Referaat: [[Boot Configuration Data]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Kristjan Rõõm =&lt;br /&gt;
* Referaat: [[Security zones]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:VHD_Boot&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:SmartScreen_Filter&lt;br /&gt;
&lt;br /&gt;
= Viljar Rooda =&lt;br /&gt;
* Referaat: [[Dynamic disk]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Security_zones&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:SmartScreen_Filter&lt;br /&gt;
&lt;br /&gt;
= Virgo Krüger =&lt;br /&gt;
*Referaat: [[Windows juhend: Kuidas tõsta seadmete draivereid ühes arvutist teise]]&lt;br /&gt;
*Arvustus1: [[Resource Monitor]]&lt;br /&gt;
*Arvutus2:&lt;br /&gt;
&lt;br /&gt;
=Tarmo Suurmägi=&lt;br /&gt;
* Referaat: [[System Configuration Tool]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Windows_7_Upgrade_Advisor&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:System_restore_point&lt;br /&gt;
&lt;br /&gt;
=Sander Saveli=&lt;br /&gt;
* Referaat: [[Skydrive]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Oliver Naaris=&lt;br /&gt;
* Referaat: [[Offline files]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Snipping_Tool&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:Sysprep&lt;br /&gt;
&lt;br /&gt;
=Sander Arnus=&lt;br /&gt;
* Referaat: [[Sysprep]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Skydrive&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:Windows_System_Image_Manager&lt;br /&gt;
&lt;br /&gt;
=Sander Pikhoff=&lt;br /&gt;
* Referaat: [[GPT]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Reliability_Monitor&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Henry Ilves=&lt;br /&gt;
* Referaat: [[Windows juhend: Kuidas ühele USB mäluseadmele korraga x86 ja x64 Windows 7 paigaldamiseks vajalik]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2: &lt;br /&gt;
&lt;br /&gt;
=Teet Saar=&lt;br /&gt;
* Referaat: [[WAIK]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Urmo Lihten=&lt;br /&gt;
* Referaat: [[Windows juhend: Kuidas paigaldada uuendusi kujutisfaili DISM tööriista abil]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Rauno Lehiste=&lt;br /&gt;
* Referaat: [[MDT]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Kristo Kapten=&lt;br /&gt;
* Referaat: [[VHD Boot]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Windows_juhend:_Kuidas_%C3%BChele_USB_m%C3%A4luseadmele_korraga_x86_ja_x64_Windows_7_paigaldamiseks_vajalik&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:Windows_Defender&lt;br /&gt;
&lt;br /&gt;
= Kullo-Kalev Aru =&lt;br /&gt;
* Referaat: [[TeamViewer]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Kalmer Tart=&lt;br /&gt;
* Referaat: [[Reliability Monitor]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Priit Lilleleht=&lt;br /&gt;
* Referaat: [[Application Compatibility Toolkit]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Sander Sülla=&lt;br /&gt;
* Referaat: [[Windows System Image Manager]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Kertu Tampõld=&lt;br /&gt;
* Referaat: [[Resource Monitor]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Nele Kiigemägi=&lt;br /&gt;
*Referaat: [[Remote Assistance]]&lt;br /&gt;
*Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Resource_Monitor&lt;br /&gt;
*Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Kermo Pajula=&lt;br /&gt;
*Referaat: [[DirectAccess]]&lt;br /&gt;
*Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Windows_8_NIC_Teaming&lt;br /&gt;
*Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Robert Vane=&lt;br /&gt;
*Referaat: [[CHKDSK]]&lt;br /&gt;
*Arvustus1:&lt;br /&gt;
*Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Alar Hansar=&lt;br /&gt;
* Referaat: [[GPO]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2: &lt;br /&gt;
&lt;br /&gt;
=Kaarel Väinaste=&lt;br /&gt;
* Referaat: [[Snipping Tool]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Ragnar Plint=&lt;br /&gt;
* Referaat: [[Program Compatibility Troubleshooter]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2: &lt;br /&gt;
&lt;br /&gt;
=Taavi Sannik=&lt;br /&gt;
* Referaat: [[DISKPART]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2: &lt;br /&gt;
&lt;br /&gt;
=Priit Reidak=&lt;br /&gt;
* Referaat: [[Disk2vhd]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Raigo Trei =&lt;br /&gt;
* Referaat: [[Windows 7 Upgrade Advisor]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Robert Pärn =&lt;br /&gt;
* Referaat: [[Special identity]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Kristjan Karu =&lt;br /&gt;
* Referaat: [[Draiverite haldus Windows 7 operatsioonisüsteemis]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Iti Liivik=&lt;br /&gt;
* Referaat: [[Effective permissions]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Draiverite_haldus_Windows_7_operatsioonis%C3%BCsteemis&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:Windows_7_Homegroup_and_sharing&lt;br /&gt;
&lt;br /&gt;
=Dmitri Keler=&lt;br /&gt;
* Referaat: [[System restore point]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Jevgeni Pogodin=&lt;br /&gt;
* Referaat: [[FAT32]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Andres Pihlak=&lt;br /&gt;
* Referaat: [[Windows Virtual PC]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Deniss Ruzanov=&lt;br /&gt;
* Referaat: [[IPv6 võrguparameetrite seadistamine]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Martin Aarne=&lt;br /&gt;
* Referaat: [[Windows User State Migration Tool (USMT)]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2: &lt;br /&gt;
&lt;br /&gt;
=Matis Alliksoo=&lt;br /&gt;
* Referaat: [[Windows 8 NIC Teaming]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2: &lt;br /&gt;
&lt;br /&gt;
= Richard Teppart =&lt;br /&gt;
* Referaat: [[Volume shadow copies]]&lt;br /&gt;
* Arvestus 1: &lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Igor Pavlov =&lt;br /&gt;
* Referaat: [[Windows Defender]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2: &lt;br /&gt;
&lt;br /&gt;
= Taavi Podzuks =&lt;br /&gt;
* Referaat: [[Windows juhend: Kuidas paigaldata täiendavaid (juur)sertfikaate]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Kersti Lang=&lt;br /&gt;
* Referaat: [[Windows 7]]&lt;br /&gt;
* Arvestus 1:&lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Gert Häusler =&lt;br /&gt;
* Referaat: [[Windows Biometric Framework]]&lt;br /&gt;
* Arvestus 1: &lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Erki Miilberg =&lt;br /&gt;
* Referaat: [[Windows operatsioonisüsteemi paigaldus]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2:&lt;br /&gt;
&lt;br /&gt;
= Rasmus Tetsmann=&lt;br /&gt;
* Referaat: [[Windows 7 Homegroup and sharing]]&lt;br /&gt;
* Arvestus 1:&lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Lauri Rüütli =&lt;br /&gt;
* Referaat: [[Windows juhend: Kuidas paigaldada täiendavaid draivereid]]&lt;br /&gt;
* Arvestus 1:&lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Taavi Zeiger =&lt;br /&gt;
* Referaat: [[Disk Defragmenter]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Kimmo Lillipuu =&lt;br /&gt;
* Referaat: [[Windows Remote Management]]&lt;br /&gt;
* Arvestus 1: https://wiki.itcollege.ee/index.php/Talk:Windows_7&lt;br /&gt;
* Arvestus 2: https://wiki.itcollege.ee/index.php/Talk:Windows_operatsioonisüsteemi_paigaldus&lt;br /&gt;
&lt;br /&gt;
= Heigo Punapart =&lt;br /&gt;
* Referaat: [[Incremental backup]]&lt;br /&gt;
* Arvestus 1: &lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Velmar Piibeleht =&lt;br /&gt;
* Referaat: [[BitLocker To Go]]&lt;br /&gt;
* Arvustus 1: https://wiki.itcollege.ee/index.php/Talk:Skydrive#Velmar_Piibeleht&lt;br /&gt;
* Arvustus 2: https://wiki.itcollege.ee/index.php/Talk:Windows_juhend:_Kuidas_t%C3%B5sta_seadmete_draivereid_%C3%BChes_arvutist_teise&lt;br /&gt;
&lt;br /&gt;
= Alo Konno =&lt;br /&gt;
* Referaat: [[Windows 8 - mida uut]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2:&lt;br /&gt;
&lt;br /&gt;
= Andre- Marcel Peri =&lt;br /&gt;
* Referaat: [[AppLocker]]&lt;br /&gt;
* Arvustus 1:&lt;br /&gt;
* Arvustus 2:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[ Windows PE]]-Marek Lepla&lt;br /&gt;
*[[ Workgroup]] - Ragnar Kullamäe&lt;br /&gt;
&lt;br /&gt;
= Gertti-Vena Rätsep =&lt;br /&gt;
* Referaat: [[VPN &amp;amp; SVPN]]&lt;br /&gt;
* Arvestus 1: &lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Kalju Hõbemäe =&lt;br /&gt;
* Referaat: [[Math Input Panel]]&lt;br /&gt;
* Arvestus 1: https://wiki.itcollege.ee/index.php/Talk:Math_Input_Panel&lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Karl Krasilnikov =&lt;br /&gt;
* Referaat: [[PnPUtil]]&lt;br /&gt;
* Arvestus 1: &lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sander Saarm =&lt;br /&gt;
&lt;br /&gt;
* Referaat: [[Toiteseadete seadistamine Windows 7 operatsioonisüsteemis]]&lt;br /&gt;
* Arvustus 1: https://wiki.itcollege.ee/index.php/Talk:Windows_juhend:_Kuidas_ekraanipilti_hallata_(keeramised,_p%C3%B6%C3%B6ramised,_lahutusv%C3%B5ime_ja_lisaekraanid)&lt;br /&gt;
* Arvustus 2: https://wiki.itcollege.ee/index.php/Talk:Disk_Defragmenter&lt;br /&gt;
&lt;br /&gt;
= Carolys Kallas =&lt;br /&gt;
&lt;br /&gt;
* Referaat: [[Powercfg.exe]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2:&lt;br /&gt;
&lt;br /&gt;
= Kairo Koik =&lt;br /&gt;
* Referaat: [[Windows juhend: Kuidas ekraanipilti hallata (keeramised, pööramised, lahutusvõime ja lisaekraanid)]]&lt;br /&gt;
* Arvustus 1: https://wiki.itcollege.ee/index.php/Talk:GPT&lt;br /&gt;
* Arvustus 2: https://wiki.itcollege.ee/index.php/Talk:Sysprep&lt;br /&gt;
&lt;br /&gt;
= Marek Lepla =&lt;br /&gt;
* Referaat: [[Windows PE]]&lt;br /&gt;
* Arvustus 1:&lt;br /&gt;
* Arvustus 2:&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Talk:SmartScreen_Filter&amp;diff=38350</id>
		<title>Talk:SmartScreen Filter</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Talk:SmartScreen_Filter&amp;diff=38350"/>
		<updated>2011-10-14T17:04:04Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Viljar Rooda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Viljar Rooda=&lt;br /&gt;
Sisu:Sisu on korralik ning hästi selgitatud isegi kui tegemist on kitsa loomulise teemaga. Usun et selle töö tegemisel oleks võinud ka mainida et AVAST antiviirus omab sarnast rakendust oma viirustõrje rakenduses.&lt;br /&gt;
&lt;br /&gt;
Kujundus: Kujundus on korralik välja arvatud 1 pilt mis on natukene liiga suur et mahtuda korralikult ekraanile.&lt;br /&gt;
&lt;br /&gt;
Juhendi kavaliteet:Juhent oli korralik. Kahjuks ei saanud ma ise SmartScreeni kontrollida kuna ma ei leidnud saite millel oleks toiminud.&lt;br /&gt;
&lt;br /&gt;
Viitamine:Suures koguses viiteid mis on kasulik lugeda.&lt;br /&gt;
&lt;br /&gt;
Eriti cool:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Kristjan Rõõm=&lt;br /&gt;
&lt;br /&gt;
Sisu: Meeldis, et sisu on konkreetne, midagi üleliigset pole, samas mida lisada nagu ka ei oska. Paar kirjaviga hakkas silma, aga need teksti voolavust ei seganud.&lt;br /&gt;
&lt;br /&gt;
Kujundus: Pildid olid asjakohased ning nende kogus oli samuti piisav. Hästi oli kasutatud boldi, mis tegi lugamise lihtsamaks.&lt;br /&gt;
&lt;br /&gt;
Juhendi kvaliteet: Hea ülesehitus, kõik vajalik oli väljatoodud.&lt;br /&gt;
&lt;br /&gt;
Viitamine: Allikaid oli palju, mis on hea ning tundus, et tegemist oli usaldusväärsete saitidega.&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Talk:SmartScreen_Filter&amp;diff=38349</id>
		<title>Talk:SmartScreen Filter</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Talk:SmartScreen_Filter&amp;diff=38349"/>
		<updated>2011-10-14T17:03:42Z</updated>

		<summary type="html">&lt;p&gt;Kroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Viljar Rooda=&lt;br /&gt;
Sisu:Sisu on korralik ning hästi selgitatud isegi kui tegemist on kitsa loomulise teemaga. Usun et selle töö tegemisel oleks võinud ka mainida et AVAST antiviirus omab sarnast rakendust oma viirustõrje rakenduses.&lt;br /&gt;
&lt;br /&gt;
Kujundus: Kujundus on korralik välja arvatud 1 pilt mis on natukene liiga suur et mahtuda korralikult ekraanile.&lt;br /&gt;
&lt;br /&gt;
Juhendi kavaliteet:Juhent oli korralik. Kahjuks ei saanud ma ise SmartScreeni kontrollida kuna ma ei leidnud saite millel oleks toiminud.&lt;br /&gt;
&lt;br /&gt;
Viitamine:Suures koguses viiteid mis on kasulik lugeda.&lt;br /&gt;
&lt;br /&gt;
Eriti cool:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Kristjan Rõõm&lt;br /&gt;
&lt;br /&gt;
Sisu: Meeldis, et sisu on konkreetne, midagi üleliigset pole, samas mida lisada nagu ka ei oska. Paar kirjaviga hakkas silma, aga need teksti voolavust ei seganud.&lt;br /&gt;
&lt;br /&gt;
Kujundus: Pildid olid asjakohased ning nende kogus oli samuti piisav. Hästi oli kasutatud boldi, mis tegi lugamise lihtsamaks.&lt;br /&gt;
&lt;br /&gt;
Juhendi kvaliteet: Hea ülesehitus, kõik vajalik oli väljatoodud.&lt;br /&gt;
&lt;br /&gt;
Viitamine: Allikaid oli palju, mis on hea ning tundus, et tegemist oli usaldusväärsete saitidega.&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Windows-t%C3%B6%C3%B6jaamade_haldamise_aines_valminud_referaadid_2011_s%C3%BCgis,_p%C3%A4eva%C3%B5pe&amp;diff=38270</id>
		<title>Windows-tööjaamade haldamise aines valminud referaadid 2011 sügis, päevaõpe</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Windows-t%C3%B6%C3%B6jaamade_haldamise_aines_valminud_referaadid_2011_s%C3%BCgis,_p%C3%A4eva%C3%B5pe&amp;diff=38270"/>
		<updated>2011-10-13T17:31:28Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Kristjan Rõõm */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Jaan Igamees=&lt;br /&gt;
* Referaat: [[MiskiAsjalikTeema]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:VHD_Boot&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
=Silver Kullarand=&lt;br /&gt;
* Referaat: [[SmartScreen Filter]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Dynamic_disk&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:Windows_8_-_mida_uut&lt;br /&gt;
&lt;br /&gt;
=Tambet Liiv=&lt;br /&gt;
* Referaat: [[Boot Configuration Data]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Kristjan Rõõm =&lt;br /&gt;
* Referaat: [[Security zones]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:VHD_Boot&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Viljar Rooda =&lt;br /&gt;
* Referaat: [[Dynamic disk]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Security_zones&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:SmartScreen_Filter&lt;br /&gt;
&lt;br /&gt;
= Virgo Krüger =&lt;br /&gt;
*Referaat: [[Windows juhend: Kuidas tõsta seadmete draivereid ühes arvutist teise]]&lt;br /&gt;
*Arvustus1:&lt;br /&gt;
*Arvutus2: &lt;br /&gt;
&lt;br /&gt;
=Tarmo Suurmägi=&lt;br /&gt;
* Referaat: [[System Configuration Tool]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Windows_7_Upgrade_Advisor&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:System_restore_point&lt;br /&gt;
&lt;br /&gt;
=Sander Saveli=&lt;br /&gt;
* Referaat: [[Skydrive]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Oliver Naaris=&lt;br /&gt;
* Referaat: [[Offline files]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Snipping_Tool&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:Sysprep&lt;br /&gt;
&lt;br /&gt;
=Sander Arnus=&lt;br /&gt;
* Referaat: [[Sysprep]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Sander Pikhoff=&lt;br /&gt;
* Referaat: [[GPT]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2: &lt;br /&gt;
&lt;br /&gt;
=Henry Ilves=&lt;br /&gt;
* Referaat: [[Windows juhend: Kuidas ühele USB mäluseadmele korraga x86 ja x64 Windows 7 paigaldamiseks vajalik]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2: &lt;br /&gt;
&lt;br /&gt;
=Teet Saar=&lt;br /&gt;
* Referaat: [[WAIK]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Urmo Lihten=&lt;br /&gt;
* Referaat: [[Windows juhend: Kuidas paigaldada uuendusi kujutisfaili DISM tööriista abil]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Rauno Lehiste=&lt;br /&gt;
* Referaat: [[MDT]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Kristo Kapten=&lt;br /&gt;
* Referaat: [[VHD Boot]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Windows_juhend:_Kuidas_%C3%BChele_USB_m%C3%A4luseadmele_korraga_x86_ja_x64_Windows_7_paigaldamiseks_vajalik&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Kullo-Kalev Aru =&lt;br /&gt;
* Referaat: [[TeamViewer]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Kalmer Tart=&lt;br /&gt;
* Referaat: [[Reliability Monitor]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Priit Lilleleht=&lt;br /&gt;
* Referaat: [[Application Compatibility Toolkit]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Sander Sülla=&lt;br /&gt;
* Referaat: [[Windows System Image Manager]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Kertu Tampõld=&lt;br /&gt;
* Referaat: [[Resource Monitor]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Nele Kiigemägi=&lt;br /&gt;
*Referaat: [[Remote Assistance]]&lt;br /&gt;
*Arvustus1:&lt;br /&gt;
*Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Kermo Pajula=&lt;br /&gt;
*Referaat: [[DirectAccess]]&lt;br /&gt;
*Arvustus1:&lt;br /&gt;
*Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Robert Vane=&lt;br /&gt;
*Referaat: [[CHKDSK]]&lt;br /&gt;
*Arvustus1:&lt;br /&gt;
*Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Alar Hansar=&lt;br /&gt;
* Referaat: [[GPO]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2: &lt;br /&gt;
&lt;br /&gt;
=Kaarel Väinaste=&lt;br /&gt;
* Referaat: [[Snipping Tool]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Ragnar Plint=&lt;br /&gt;
* Referaat: [[Program Compatibility Troubleshooter]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2: &lt;br /&gt;
&lt;br /&gt;
=Taavi Sannik=&lt;br /&gt;
* Referaat: [[DISKPART]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2: &lt;br /&gt;
&lt;br /&gt;
=Priit Reidak=&lt;br /&gt;
* Referaat: [[Disk2vhd]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Raigo Trei =&lt;br /&gt;
* Referaat: [[Windows 7 Upgrade Advisor]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Robert Pärn =&lt;br /&gt;
* Referaat: [[Special identity]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Kristjan Karu =&lt;br /&gt;
* Referaat: [[Draiverite haldus Windows 7 operatsioonisüsteemis]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Iti Liivik=&lt;br /&gt;
* Referaat: [[Effective permissions]]&lt;br /&gt;
* Arvustus1: https://wiki.itcollege.ee/index.php/Talk:Draiverite_haldus_Windows_7_operatsioonis%C3%BCsteemis&lt;br /&gt;
* Arvustus2: https://wiki.itcollege.ee/index.php/Talk:Windows_7_Homegroup_and_sharing&lt;br /&gt;
&lt;br /&gt;
=Dmitri Keler=&lt;br /&gt;
* Referaat: [[System restore point]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Jevgeni Pogodin=&lt;br /&gt;
* Referaat: [[FAT32]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Andres Pihlak=&lt;br /&gt;
* Referaat: [[Windows Virtual PC]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Deniss Ruzanov=&lt;br /&gt;
* Referaat: [[IPv6 võrguparameetrite seadistamine]]&lt;br /&gt;
* Arvustus1: &lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Martin Aarne=&lt;br /&gt;
* Referaat: [[Windows User State Migration Tool (USMT)]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2: &lt;br /&gt;
&lt;br /&gt;
=Matis Alliksoo=&lt;br /&gt;
* Referaat: [[Windows 8 NIC Teaming]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2: &lt;br /&gt;
&lt;br /&gt;
= Richard Teppart =&lt;br /&gt;
* Referaat: [[Volume shadow copies]]&lt;br /&gt;
* Arvestus 1: &lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Igor Pavlov =&lt;br /&gt;
* Referaat: [[Windows Defender]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2: &lt;br /&gt;
&lt;br /&gt;
= Taavi Podzuks =&lt;br /&gt;
* Referaat: [[Windows juhend: Kuidas paigaldata täiendavaid (juur)sertfikaate]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
=Kersti Lang=&lt;br /&gt;
* Referaat: [[Windows 7]]&lt;br /&gt;
* Arvestus 1:&lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Gert Häusler =&lt;br /&gt;
* Referaat: [[Windows Biometric Framework]]&lt;br /&gt;
* Arvestus 1: &lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Erki Miilberg =&lt;br /&gt;
* Referaat: [[Windows operatsioonisüsteemi paigaldus]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2:&lt;br /&gt;
&lt;br /&gt;
= Rasmus Tetsmann=&lt;br /&gt;
* Referaat: [[Windows 7 Homegroup and sharing]]&lt;br /&gt;
* Arvestus 1:&lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Lauri Rüütli =&lt;br /&gt;
* Referaat: [[Windows juhend: Kuidas paigaldada täiendavaid draivereid]]&lt;br /&gt;
* Arvestus 1:&lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Taavi Zeiger =&lt;br /&gt;
* Referaat: [[Disk Defragmenter]]&lt;br /&gt;
* Arvustus1:&lt;br /&gt;
* Arvustus2:&lt;br /&gt;
&lt;br /&gt;
= Kimmo Lillipuu =&lt;br /&gt;
* Referaat: [[Windows Remote Management]]&lt;br /&gt;
* Arvestus 1: &lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Heigo Punapart =&lt;br /&gt;
* Referaat: [[Incremental backup]]&lt;br /&gt;
* Arvestus 1: &lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Velmar Piibeleht =&lt;br /&gt;
* Referaat: [[BitLocker To Go]]&lt;br /&gt;
* Arvustus 1: https://wiki.itcollege.ee/index.php/Talk:Skydrive#Velmar_Piibeleht&lt;br /&gt;
* Arvustus 2: https://wiki.itcollege.ee/index.php/Talk:Windows_juhend:_Kuidas_t%C3%B5sta_seadmete_draivereid_%C3%BChes_arvutist_teise&lt;br /&gt;
&lt;br /&gt;
= Alo Konno =&lt;br /&gt;
* Referaat: [[Windows 8 - mida uut]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2:&lt;br /&gt;
&lt;br /&gt;
= Andre- Marcel Peri =&lt;br /&gt;
* Referaat: [[AppLocker]]&lt;br /&gt;
* Arvustus 1:&lt;br /&gt;
* Arvustus 2:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[ Windows PE]]-Marek Lepla&lt;br /&gt;
*[[ Workgroup]] - Ragnar Kullamäe&lt;br /&gt;
&lt;br /&gt;
= Gertti-Vena Rätsep =&lt;br /&gt;
* Referaat: [[VPN &amp;amp; SVPN]]&lt;br /&gt;
* Arvestus 1: &lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
= Kalju Hõbemäe =&lt;br /&gt;
* Referaat: [[Math Input Panel]]&lt;br /&gt;
* Arvestus 1: https://wiki.itcollege.ee/index.php/Talk:Math_Input_Panel&lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Karl Krasilnikov =&lt;br /&gt;
* Referaat: [[PnPUtil]]&lt;br /&gt;
* Arvestus 1: &lt;br /&gt;
* Arvestus 2:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sander Saarm =&lt;br /&gt;
&lt;br /&gt;
* Referaat: [[Toiteseadete seadistamine Windows 7 operatsioonisüsteemis]]&lt;br /&gt;
* Arvustus 1: https://wiki.itcollege.ee/index.php/Talk:Windows_juhend:_Kuidas_ekraanipilti_hallata_(keeramised,_p%C3%B6%C3%B6ramised,_lahutusv%C3%B5ime_ja_lisaekraanid)&lt;br /&gt;
* Arvustus 2: https://wiki.itcollege.ee/index.php/Talk:Disk_Defragmenter&lt;br /&gt;
&lt;br /&gt;
= Carolys Kallas =&lt;br /&gt;
&lt;br /&gt;
* Referaat: [[Powercfg.exe]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2:&lt;br /&gt;
&lt;br /&gt;
= Kairo Koik =&lt;br /&gt;
* Referaat: [[Windows juhend: Kuidas ekraanipilti hallata (keeramised, pööramised, lahutusvõime ja lisaekraanid)]]&lt;br /&gt;
* Arvustus 1: &lt;br /&gt;
* Arvustus 2:&lt;br /&gt;
&lt;br /&gt;
= Marek Lepla =&lt;br /&gt;
* Referaat: [[Windows PE]]&lt;br /&gt;
* Arvustus 1:&lt;br /&gt;
* Arvustus 2:&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Talk:VHD_Boot&amp;diff=38269</id>
		<title>Talk:VHD Boot</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Talk:VHD_Boot&amp;diff=38269"/>
		<updated>2011-10-13T17:29:51Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Heiki Tähis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Heiki Tähis=&lt;br /&gt;
Sisu: juhendi järgi on võimalik toimetada küll, viga oli seal, kus räägiti sellest, mööda sai nii. Teoreetiline pool on valdavalt hästi lahtiseletatud, aga need-ja-need mõisted ei olnud piisavalt selgesti arusaadavad. Miski mõni lause veel&lt;br /&gt;
&lt;br /&gt;
Kujundus: kuidas oli asi kujundatud&lt;br /&gt;
&lt;br /&gt;
Juhendi kavaliteet:&lt;br /&gt;
&lt;br /&gt;
Viitamine:&lt;br /&gt;
&lt;br /&gt;
Eriti cool:&lt;br /&gt;
&lt;br /&gt;
Eriti nõme:&lt;br /&gt;
&lt;br /&gt;
=Kristjan Rõõm=&lt;br /&gt;
Sisu: Teema on kasulik, hästi kirjeldatud ning lahti seletatud. Mõnus step by step juhend. Sisu osas vigu ei leidnud. Mõned kirjavead hakaksid silma, aga need oluliselt ei seganud lugemist. Minu arvates oleks võinud sissejuhatus ja ülevaade samahästi ühes potis olla.&lt;br /&gt;
&lt;br /&gt;
Kujundus: Kujundus on täitsa OK. Paari käsu juures oleks väike pilt abiks olnud (nt siin: Nüüd valime meie äsja loodud ketta (disk mis on 25GB suur ja millel on tärn ees)käsuga). Lahe (eriticool sektsiooni) oli linkimine teistesse artiklitesse.&lt;br /&gt;
&lt;br /&gt;
Juhendi kvaliteet: Juhend täitis oma eesmärgi ning andis hea ülevaate antud teemast.&lt;br /&gt;
&lt;br /&gt;
Viitamine: Viited materjalidele olid olemas ning allikad on adekvaatsed.&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security_zones&amp;diff=37814</id>
		<title>Security zones</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security_zones&amp;diff=37814"/>
		<updated>2011-10-10T18:38:53Z</updated>

		<summary type="html">&lt;p&gt;Kroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Sissejuhatus&#039;&#039;=&lt;br /&gt;
Security zones on osa Internet Exploreri turbemeetoditest, mis annab kasutajatele võimalusele mugavalt ja efektiivselt hallata veebikeskkonna turvalisust. Security zones-i tüübid jaguned viieks: internet, local intranet, trusted sites, restricted sites ning my computer. Iga piirkonda saab seadistada vastavalt vajadusele, kasutades olemasolevaid seadistusi vastavalt turvatasemele või kohandades endale sobivate spetsifikatsioonidega turvataseme.&lt;br /&gt;
&lt;br /&gt;
=Turvapiirkonna struktuur=&lt;br /&gt;
Piirkonna struktuur&lt;br /&gt;
Kui Inrernet Explorer avab HTML lehekülje, siis dünaamiliste linkide kogum nimega Urimon.dll teeb kindlaks piirkonna, millega lehekülg avati. Selle tagamiseks teeb antud fail järgmised sammud:&lt;br /&gt;
*Teeb kindlaks proxy-serveri seose HTML lehega. Kui on seos, siis  automaatselt pannakse leht intraneti piirkonda.&lt;br /&gt;
*Kontrollib registrist lehekülje kuuluvust Usaldatud lehtede piirkonda ning määrab vastavalt tulemustele turvapiirkonna.&lt;br /&gt;
&lt;br /&gt;
=Turvapiirkondade tüübid=&lt;br /&gt;
&lt;br /&gt;
==Internet==&lt;br /&gt;
Antud piirkonda paigutatakse kõik need veebilehed, mis kuhugi mujale pole liigitatud(seetõttu ei saa ka lisada veebilehti antud piirkonda). Vaikimisi on antud piirkonna turvatase Medium-High.&lt;br /&gt;
&lt;br /&gt;
==Local Intranet==&lt;br /&gt;
Sisaldab kõiki veebilehti, mis asuvad seespool organisatsiooni tulemüüri. Vaikimisi on antud piirkonna turvatase Medium-Low.&lt;br /&gt;
&lt;br /&gt;
==Trusted Sites==&lt;br /&gt;
Piirkonda lisatakse tavaliselt kõige turvalisemad ja usaldusväärsemad lehed, mis soovitatavalt kasutavad https protokolli. Vaikimis on turvatasemeks Medium.&lt;br /&gt;
&lt;br /&gt;
==Restrcted Sites==&lt;br /&gt;
Kõik veebilehed, mis kujutavad endas ohtu, tasub liigitada Restricted Sitesi turvapiirkonda, millel on vaikimisi turvatase seadistatud High peale.&lt;br /&gt;
&lt;br /&gt;
==My Computer==&lt;br /&gt;
My Computer piirkonda(sisaldab faile ainult lokaalsest arvutist) saab hallata ainult Internet Explorer Administration Kitiga(IEAK) ning seetõttu antud valikuvõimalust ei ole Internet Exploreri Security Optionsi all. Administraatoritele on soovitatav kasutada algseadistust, kui just organisatsioonil ei ole erisoove.&lt;br /&gt;
&lt;br /&gt;
=Vaikimisi seatud turvataseme muutmine=&lt;br /&gt;
Vaikimisi seatud turvaseadme muutmiseks tuleb kõigepealt käivitada Internet Explorer. Seejärel avada Tools menüü(Alt+X), kus asub Internet Options. Kui vajutada security tabi avaneb selline vaade:&lt;br /&gt;
&lt;br /&gt;
[[File:Slevel.JPG]]&lt;br /&gt;
&lt;br /&gt;
Turvataseme muutmine on tehtud väga lihtsaks. Lihtsalt valida sobiv turvapiirkond ning kerida scrollbari vastavalt vajadusele.&lt;br /&gt;
&lt;br /&gt;
=Veebilehtede lisamine turvapiirkonda=&lt;br /&gt;
&lt;br /&gt;
==Internet zone==&lt;br /&gt;
Nagu eelpool mainitud ei saa lisada veebilehti Interneti turvapiirkonda, vaid sinna paigutatakse automaatselt kõik saidid, mida pole teistesse turvapiirkondadesse lisatud.&lt;br /&gt;
&lt;br /&gt;
==Local intranet==&lt;br /&gt;
A) Valige Local Intranet ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Intranetsites.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Vaadake üle seaded sisevõrgu lehtedele. Vaikimisi on valitud automaatne intraneti tuvastamine.&lt;br /&gt;
&lt;br /&gt;
[[File:Localintranet2.JPG]]&lt;br /&gt;
&lt;br /&gt;
*Include all local (intranet) sites not listed in other zones.&lt;br /&gt;
Intraneti leheküljed näiteks nagu http://local ehk aadressid, mis ei sisalda punkti.&lt;br /&gt;
*Include all sites that bypass the proxy server. &lt;br /&gt;
Tüüpiline intraneti seadistus kasutab interneti saamiseks proxy serverit ning intraneti serveriga otseühendust. Antud seadistus võimaldab intraneti ja interneti sisud lahus hoida. Kui proxy server ei ole nii konfigureeritud, siis tasub antud kast märgistamata jätta. Ning süsteemidele, mis ei kasuta proxy serverit, ei oma antud seadistus mingit tähtsust.&lt;br /&gt;
*Include all network paths(UNCs). &lt;br /&gt;
Võrguaadressi näiteks nagu  \\servername\sharename\file.txt kasutatakse tavaliselt lokaalvõrgus, mis tuleks lisada Local intranet-i piirkonda.&lt;br /&gt;
&lt;br /&gt;
==Trusted sites==&lt;br /&gt;
A) Valige Trusted sites ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Trusted.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Sisestage usaldusväärse veebilehe url ning vajutage add nuppu. Kui require server verification (https:) for all sites in this zone on märgitud, siis saab lisada ainult https protokolliga veebilehti.&lt;br /&gt;
&lt;br /&gt;
[[File:Trusted2.JPG]]&lt;br /&gt;
&lt;br /&gt;
==Restricted sites==&lt;br /&gt;
A) Valige Restricted sites ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Restricted.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Sisestage aadress ning vajutage Add nuppu.&lt;br /&gt;
&lt;br /&gt;
[[File:Restricted2.JPG]]&lt;br /&gt;
&lt;br /&gt;
=Turvaseaded=&lt;br /&gt;
&lt;br /&gt;
Siinkohal on väljatoodud erinevad turvaseaded ning nende staatus(En - lubatud, Dis - keelatud, Pro - üleküsimine, Hi - High, Med - Medium, Lo - Low) vastavas turvatasemes. Seadeid on võimalik muuta piirkonna Custom Leveli alt. &lt;br /&gt;
&lt;br /&gt;
{| {{table}}&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Security Setting&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;| .NET Framework|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Loose XAML||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| XAML browser applications||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| XPS documents||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|.NET Framework-Reliant Components|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Permissions for components with manifests||Hi||Hi||Hi||Hi||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run components not signed with Authenticode||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run components signed with Authenticode||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|ActiveX Controls and Plug-Ins|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Allow previously unused ActiveX controls to run without prompt||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Scriptlets||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Automatic prompting for ActiveX controls||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Binary and script behaviors||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Display video and animation on a webpage that does not use external media player||Dis||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Download signed ActiveX controls||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Download unsigned ActiveX controls||Pro||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Initialize and script ActiveX controls not marked as safe for scripting||Pro||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run ActiveX controls and plug-Ins||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Script ActiveX controls marked safe for scripting||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Downloads|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Automatic prompting for file downloads||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| File download||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Font download||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Enable .NET Framework setup||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Miscellaneous|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Access data sources across domains||En||Pro||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow META REFRESH||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow scripting of Internet Explorer web browser control||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow script-initiated windows without size or position constraints||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Web pages to use restricted protocols for active content||Pro||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow websites to open windows without address or status bars||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Display mixed content||Pro||Pro||Pro||Pro||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Don\&#039;t prompt for client certificate selection when no certificates or only one certificate exists||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Drag and drop or copy and paste files||En||En||En||En||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Include local directory path when uploading files to a server||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Installation of desktop items||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Launching applications and unsafe files||En||En||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Launching programs and files in an IFRAME||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Navigate sub-frames across different domains||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Open files based on content, not file extension||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Software channel permissions|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Submit nonencrypted form data||En||En||En||En||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Use Phishing Filter||Dis||Dis||En||En||En&lt;br /&gt;
|-&lt;br /&gt;
| Use Pop-up Blocker||Dis||Dis||En||En||En&lt;br /&gt;
|-&lt;br /&gt;
| Userdata persistence||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Web sites in less privileged web content zone can navigate into this zone||Pro||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Scripting|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Active scripting||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Programmatic clipboard access||En||En||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow status bar updates via script||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow websites to prompt for information using scripted windows||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Scripting of Java applets||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|User Authentication - Logon||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon with current user name and password||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Prompt for user name and password&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*En - Enabled, Dis - Disabled, Pro - Prompt, Hi - High, Med - Medium, Lo - Low&lt;br /&gt;
&lt;br /&gt;
=Kasutatud kirjandus=&lt;br /&gt;
*http://www.sevenforums.com/tutorials/144766-internet-explorer-security-zones-add-remove-sites.html&lt;br /&gt;
*http://support.microsoft.com/kb/174360&lt;br /&gt;
*http://technet.microsoft.com/en-us/library/dd361896.aspx&lt;br /&gt;
*http://25yearsofprogramming.com/blog/2008/20080525.htm&lt;br /&gt;
&lt;br /&gt;
=Autor=&lt;br /&gt;
Kristjan Rõõm&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security_zones&amp;diff=37809</id>
		<title>Security zones</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security_zones&amp;diff=37809"/>
		<updated>2011-10-10T18:36:56Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Kokkuvõte */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Sissejuhatus&#039;&#039;=&lt;br /&gt;
Security zones on osa Internet Exploreri turbemeetoditest, mis annab kasutajatele võimalusele mugavalt ja efektiivselt hallata veebikeskkonna turvalisust. Security zones-i tüübid jaguned viieks: internet, local intranet, trusted sites, restricted sites ning my computer. Iga piirkonda saab seadistada vastavalt vajadusele, kasutades olemasolevaid seadistusi vastavalt turvatasemele või kohandades endale sobivate spetsifikatsioonidega turvataseme.&lt;br /&gt;
&lt;br /&gt;
=Turvapiirkonna struktuur=&lt;br /&gt;
Piirkonna struktuur&lt;br /&gt;
Kui Inrernet Explorer avab HTML lehekülje, siis dünaamiliste linkide kogum nimega Urimon.dll teeb kindlaks piirkonna, millega lehekülg avati. Selle tagamiseks teeb antud fail järgmised sammud:&lt;br /&gt;
*Teeb kindlaks proxy-serveri seose HTML lehega. Kui on seos, siis  automaatselt pannakse leht intraneti piirkonda.&lt;br /&gt;
*Kontrollib registrist lehekülje kuuluvust Usaldatud lehtede piirkonda ning määrab vastavalt tulemustele turvapiirkonna.&lt;br /&gt;
&lt;br /&gt;
=Turvapiirkondade tüübid=&lt;br /&gt;
&lt;br /&gt;
==Internet==&lt;br /&gt;
Antud piirkonda paigutatakse kõik need veebilehed, mis kuhugi mujale pole liigitatud(seetõttu ei saa ka lisada veebilehti antud piirkonda). Vaikimisi on antud piirkonna turvatase Medium-High.&lt;br /&gt;
&lt;br /&gt;
==Local Intranet==&lt;br /&gt;
Sisaldab kõiki veebilehti, mis asuvad seespool organisatsiooni tulemüüri. Vaikimisi on antud piirkonna turvatase Medium-Low.&lt;br /&gt;
&lt;br /&gt;
==Trusted Sites==&lt;br /&gt;
Piirkonda lisatakse tavaliselt kõige turvalisemad ja usaldusväärsemad lehed, mis soovitatavalt kasutavad https protokolli. Vaikimis on turvatasemeks Medium.&lt;br /&gt;
&lt;br /&gt;
==Restrcted Sites==&lt;br /&gt;
Kõik veebilehed, mis kujutavad endas ohtu, tasub liigitada Restricted Sitesi turvapiirkonda, millel on vaikimisi turvatase seadistatud High peale.&lt;br /&gt;
&lt;br /&gt;
==My Computer==&lt;br /&gt;
My Computer piirkonda(sisaldab faile ainult lokaalsest arvutist) saab hallata ainult Internet Explorer Administration Kitiga(IEAK) ning seetõttu antud valikuvõimalust ei ole Internet Exploreri Security Optionsi all. Administraatoritele on soovitatav kasutada algseadistust, kui just organisatsioonil ei ole erisoove.&lt;br /&gt;
&lt;br /&gt;
=Vaikimisi seatud turvataseme muutmine=&lt;br /&gt;
Vaikimisi seatud turvaseadme muutmiseks tuleb kõigepealt käivitada Internet Explorer. Seejärel avada Tools menüü(Alt+X), kus asub Internet Options. Kui vajutada security tabi avaneb selline vaade:&lt;br /&gt;
&lt;br /&gt;
[[File:Slevel.JPG]]&lt;br /&gt;
&lt;br /&gt;
Turvataseme muutmine on tehtud väga lihtsaks. Lihtsalt valida sobiv turvapiirkond ning kerida scrollbari vastavalt vajadusele.&lt;br /&gt;
&lt;br /&gt;
=Veebilehtede lisamine turvapiirkonda=&lt;br /&gt;
&lt;br /&gt;
==Internet zone==&lt;br /&gt;
Nagu eelpool mainitud ei saa lisada veebilehti Interneti turvapiirkonda, vaid sinna paigutatakse automaatselt kõik saidid, mida pole teistesse turvapiirkondadesse lisatud.&lt;br /&gt;
&lt;br /&gt;
==Local intranet==&lt;br /&gt;
A) Valige Local Intranet ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Intranetsites.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Vaadake üle seaded sisevõrgu lehtedele. Vaikimisi on valitud automaatne intraneti tuvastamine.&lt;br /&gt;
&lt;br /&gt;
[[File:Localintranet2.JPG]]&lt;br /&gt;
&lt;br /&gt;
*Include all local (intranet) sites not listed in other zones.&lt;br /&gt;
Intraneti leheküljed näiteks nagu http://local ehk aadressid, mis ei sisalda punkti.&lt;br /&gt;
*Include all sites that bypass the proxy server. &lt;br /&gt;
Tüüpiline intraneti seadistus kasutab interneti saamiseks proxy serverit ning intraneti serveriga otseühendust. Antud seadistus võimaldab intraneti ja interneti sisud lahus hoida. Kui proxy server ei ole nii konfigureeritud, siis tasub antud kast märgistamata jätta. Ning süsteemidele, mis ei kasuta proxy serverit, ei oma antud seadistus mingit tähtsust.&lt;br /&gt;
*Include all network paths(UNCs). &lt;br /&gt;
Võrguaadressi näiteks nagu  \\servername\sharename\file.txt kasutatakse tavaliselt lokaalvõrgus, mis tuleks lisada Local intranet-i piirkonda.&lt;br /&gt;
&lt;br /&gt;
==Trusted sites==&lt;br /&gt;
A) Valige Trusted sites ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Trusted.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Sisestage usaldusväärse veebilehe url ning vajutage add nuppu. Kui require server verification (https:) for all sites in this zone on märgitud, siis saab lisada ainult https protokolliga veebilehti.&lt;br /&gt;
&lt;br /&gt;
[[File:Trusted2.JPG]]&lt;br /&gt;
&lt;br /&gt;
==Restricted sites==&lt;br /&gt;
A) Valige Restricted sites ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Restricted.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Sisestage aadress ning vajutage Add nuppu.&lt;br /&gt;
&lt;br /&gt;
[[File:Restricted2.JPG]]&lt;br /&gt;
&lt;br /&gt;
=Turvaseaded=&lt;br /&gt;
&lt;br /&gt;
Siinkohal on väljatoodud erinevad turvaseaded ning nende staatus(En - lubatud, Dis - keelatud, Pro - üleküsimine, Hi - High, Med - Medium, Lo - Low) vastavas turvatasemes. Seadeid on võimalik muuta piirkonna Custom Leveli alt. &lt;br /&gt;
&lt;br /&gt;
{| {{table}}&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Security Setting&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;| .NET Framework|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Loose XAML||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| XAML browser applications||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| XPS documents||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|.NET Framework-Reliant Components|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Permissions for components with manifests||Hi||Hi||Hi||Hi||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run components not signed with Authenticode||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run components signed with Authenticode||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|ActiveX Controls and Plug-Ins|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Allow previously unused ActiveX controls to run without prompt||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Scriptlets||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Automatic prompting for ActiveX controls||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Binary and script behaviors||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Display video and animation on a webpage that does not use external media player||Dis||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Download signed ActiveX controls||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Download unsigned ActiveX controls||Pro||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Initialize and script ActiveX controls not marked as safe for scripting||Pro||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run ActiveX controls and plug-Ins||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Script ActiveX controls marked safe for scripting||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Downloads|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Automatic prompting for file downloads||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| File download||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Font download||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Enable .NET Framework setup||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Miscellaneous|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Access data sources across domains||En||Pro||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow META REFRESH||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow scripting of Internet Explorer web browser control||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow script-initiated windows without size or position constraints||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Web pages to use restricted protocols for active content||Pro||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow websites to open windows without address or status bars||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Display mixed content||Pro||Pro||Pro||Pro||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Don\&#039;t prompt for client certificate selection when no certificates or only one certificate exists||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Drag and drop or copy and paste files||En||En||En||En||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Include local directory path when uploading files to a server||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Installation of desktop items||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Launching applications and unsafe files||En||En||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Launching programs and files in an IFRAME||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Navigate sub-frames across different domains||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Open files based on content, not file extension||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Software channel permissions|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Submit nonencrypted form data||En||En||En||En||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Use Phishing Filter||Dis||Dis||En||En||En&lt;br /&gt;
|-&lt;br /&gt;
| Use Pop-up Blocker||Dis||Dis||En||En||En&lt;br /&gt;
|-&lt;br /&gt;
| Userdata persistence||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Web sites in less privileged web content zone can navigate into this zone||Pro||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Scripting|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Active scripting||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Programmatic clipboard access||En||En||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow status bar updates via script||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow websites to prompt for information using scripted windows||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Scripting of Java applets||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|User Authentication - Logon||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon with current user name and password||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Prompt for user name and password&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*En - Enabled, Dis - Disabled, Pro - Prompt, Hi - High, Med - Medium, Lo - Low&lt;br /&gt;
&lt;br /&gt;
=Kokkuvõte=&lt;br /&gt;
&lt;br /&gt;
Tegemist on mugava turbemeetodiga, millest on abi nii tavakasutajatele kui ka edasijõudnutele. Tavakasutajale on turvapiirkondade kasutamine väga lihtsaks tehtud. Mõne hiire vajutasuega saab asjasse süvenemata muuta lehekülgede turvataset.Samas saab peensuseni detaile juurde või maha keerata mõni asjaga kursis olev inimene.&lt;br /&gt;
&lt;br /&gt;
=Kasutatud kirjandus=&lt;br /&gt;
*http://www.sevenforums.com/tutorials/144766-internet-explorer-security-zones-add-remove-sites.html&lt;br /&gt;
*http://support.microsoft.com/kb/174360&lt;br /&gt;
*http://technet.microsoft.com/en-us/library/dd361896.aspx&lt;br /&gt;
*http://25yearsofprogramming.com/blog/2008/20080525.htm&lt;br /&gt;
&lt;br /&gt;
=Autor=&lt;br /&gt;
Kristjan Rõõm&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security_zones&amp;diff=37789</id>
		<title>Security zones</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security_zones&amp;diff=37789"/>
		<updated>2011-10-10T18:28:55Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Kasutatud kirjandus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Sissejuhatus&#039;&#039;=&lt;br /&gt;
Security zones on osa Internet Exploreri turbemeetoditest, mis annab kasutajatele võimalusele mugavalt ja efektiivselt hallata veebikeskkonna turvalisust. Security zones-i tüübid jaguned viieks: internet, local intranet, trusted sites, restricted sites ning my computer. Iga piirkonda saab seadistada vastavalt vajadusele, kasutades olemasolevaid seadistusi vastavalt turvatasemele või kohandades endale sobivate spetsifikatsioonidega turvataseme.&lt;br /&gt;
&lt;br /&gt;
=Turvapiirkonna struktuur=&lt;br /&gt;
Piirkonna struktuur&lt;br /&gt;
Kui Inrernet Explorer avab HTML lehekülje, siis dünaamiliste linkide kogum nimega Urimon.dll teeb kindlaks piirkonna, millega lehekülg avati. Selle tagamiseks teeb antud fail järgmised sammud:&lt;br /&gt;
*Teeb kindlaks proxy-serveri seose HTML lehega. Kui on seos, siis  automaatselt pannakse leht intraneti piirkonda.&lt;br /&gt;
*Kontrollib registrist lehekülje kuuluvust Usaldatud lehtede piirkonda ning määrab vastavalt tulemustele turvapiirkonna.&lt;br /&gt;
&lt;br /&gt;
=Turvapiirkondade tüübid=&lt;br /&gt;
&lt;br /&gt;
==Internet==&lt;br /&gt;
Antud piirkonda paigutatakse kõik need veebilehed, mis kuhugi mujale pole liigitatud(seetõttu ei saa ka lisada veebilehti antud piirkonda). Vaikimisi on antud piirkonna turvatase Medium-High.&lt;br /&gt;
&lt;br /&gt;
==Local Intranet==&lt;br /&gt;
Sisaldab kõiki veebilehti, mis asuvad seespool organisatsiooni tulemüüri. Vaikimisi on antud piirkonna turvatase Medium-Low.&lt;br /&gt;
&lt;br /&gt;
==Trusted Sites==&lt;br /&gt;
Piirkonda lisatakse tavaliselt kõige turvalisemad ja usaldusväärsemad lehed, mis soovitatavalt kasutavad https protokolli. Vaikimis on turvatasemeks Medium.&lt;br /&gt;
&lt;br /&gt;
==Restrcted Sites==&lt;br /&gt;
Kõik veebilehed, mis kujutavad endas ohtu, tasub liigitada Restricted Sitesi turvapiirkonda, millel on vaikimisi turvatase seadistatud High peale.&lt;br /&gt;
&lt;br /&gt;
==My Computer==&lt;br /&gt;
My Computer piirkonda(sisaldab faile ainult lokaalsest arvutist) saab hallata ainult Internet Explorer Administration Kitiga(IEAK) ning seetõttu antud valikuvõimalust ei ole Internet Exploreri Security Optionsi all. Administraatoritele on soovitatav kasutada algseadistust, kui just organisatsioonil ei ole erisoove.&lt;br /&gt;
&lt;br /&gt;
=Vaikimisi seatud turvataseme muutmine=&lt;br /&gt;
Vaikimisi seatud turvaseadme muutmiseks tuleb kõigepealt käivitada Internet Explorer. Seejärel avada Tools menüü(Alt+X), kus asub Internet Options. Kui vajutada security tabi avaneb selline vaade:&lt;br /&gt;
&lt;br /&gt;
[[File:Slevel.JPG]]&lt;br /&gt;
&lt;br /&gt;
Turvataseme muutmine on tehtud väga lihtsaks. Lihtsalt valida sobiv turvapiirkond ning kerida scrollbari vastavalt vajadusele.&lt;br /&gt;
&lt;br /&gt;
=Veebilehtede lisamine turvapiirkonda=&lt;br /&gt;
&lt;br /&gt;
==Internet zone==&lt;br /&gt;
Nagu eelpool mainitud ei saa lisada veebilehti Interneti turvapiirkonda, vaid sinna paigutatakse automaatselt kõik saidid, mida pole teistesse turvapiirkondadesse lisatud.&lt;br /&gt;
&lt;br /&gt;
==Local intranet==&lt;br /&gt;
A) Valige Local Intranet ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Intranetsites.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Vaadake üle seaded sisevõrgu lehtedele. Vaikimisi on valitud automaatne intraneti tuvastamine.&lt;br /&gt;
&lt;br /&gt;
[[File:Localintranet2.JPG]]&lt;br /&gt;
&lt;br /&gt;
*Include all local (intranet) sites not listed in other zones.&lt;br /&gt;
Intraneti leheküljed näiteks nagu http://local ehk aadressid, mis ei sisalda punkti.&lt;br /&gt;
*Include all sites that bypass the proxy server. &lt;br /&gt;
Tüüpiline intraneti seadistus kasutab interneti saamiseks proxy serverit ning intraneti serveriga otseühendust. Antud seadistus võimaldab intraneti ja interneti sisud lahus hoida. Kui proxy server ei ole nii konfigureeritud, siis tasub antud kast märgistamata jätta. Ning süsteemidele, mis ei kasuta proxy serverit, ei oma antud seadistus mingit tähtsust.&lt;br /&gt;
*Include all network paths(UNCs). &lt;br /&gt;
Võrguaadressi näiteks nagu  \\servername\sharename\file.txt kasutatakse tavaliselt lokaalvõrgus, mis tuleks lisada Local intranet-i piirkonda.&lt;br /&gt;
&lt;br /&gt;
==Trusted sites==&lt;br /&gt;
A) Valige Trusted sites ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Trusted.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Sisestage usaldusväärse veebilehe url ning vajutage add nuppu. Kui require server verification (https:) for all sites in this zone on märgitud, siis saab lisada ainult https protokolliga veebilehti.&lt;br /&gt;
&lt;br /&gt;
[[File:Trusted2.JPG]]&lt;br /&gt;
&lt;br /&gt;
==Restricted sites==&lt;br /&gt;
A) Valige Restricted sites ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Restricted.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Sisestage aadress ning vajutage Add nuppu.&lt;br /&gt;
&lt;br /&gt;
[[File:Restricted2.JPG]]&lt;br /&gt;
&lt;br /&gt;
=Turvaseaded=&lt;br /&gt;
&lt;br /&gt;
Siinkohal on väljatoodud erinevad turvaseaded ning nende staatus(En - lubatud, Dis - keelatud, Pro - üleküsimine, Hi - High, Med - Medium, Lo - Low) vastavas turvatasemes. Seadeid on võimalik muuta piirkonna Custom Leveli alt. &lt;br /&gt;
&lt;br /&gt;
{| {{table}}&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Security Setting&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;| .NET Framework|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Loose XAML||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| XAML browser applications||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| XPS documents||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|.NET Framework-Reliant Components|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Permissions for components with manifests||Hi||Hi||Hi||Hi||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run components not signed with Authenticode||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run components signed with Authenticode||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|ActiveX Controls and Plug-Ins|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Allow previously unused ActiveX controls to run without prompt||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Scriptlets||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Automatic prompting for ActiveX controls||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Binary and script behaviors||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Display video and animation on a webpage that does not use external media player||Dis||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Download signed ActiveX controls||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Download unsigned ActiveX controls||Pro||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Initialize and script ActiveX controls not marked as safe for scripting||Pro||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run ActiveX controls and plug-Ins||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Script ActiveX controls marked safe for scripting||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Downloads|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Automatic prompting for file downloads||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| File download||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Font download||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Enable .NET Framework setup||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Miscellaneous|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Access data sources across domains||En||Pro||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow META REFRESH||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow scripting of Internet Explorer web browser control||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow script-initiated windows without size or position constraints||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Web pages to use restricted protocols for active content||Pro||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow websites to open windows without address or status bars||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Display mixed content||Pro||Pro||Pro||Pro||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Don\&#039;t prompt for client certificate selection when no certificates or only one certificate exists||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Drag and drop or copy and paste files||En||En||En||En||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Include local directory path when uploading files to a server||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Installation of desktop items||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Launching applications and unsafe files||En||En||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Launching programs and files in an IFRAME||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Navigate sub-frames across different domains||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Open files based on content, not file extension||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Software channel permissions|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Submit nonencrypted form data||En||En||En||En||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Use Phishing Filter||Dis||Dis||En||En||En&lt;br /&gt;
|-&lt;br /&gt;
| Use Pop-up Blocker||Dis||Dis||En||En||En&lt;br /&gt;
|-&lt;br /&gt;
| Userdata persistence||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Web sites in less privileged web content zone can navigate into this zone||Pro||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Scripting|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Active scripting||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Programmatic clipboard access||En||En||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow status bar updates via script||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow websites to prompt for information using scripted windows||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Scripting of Java applets||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|User Authentication - Logon||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon with current user name and password||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Prompt for user name and password&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*En - Enabled, Dis - Disabled, Pro - Prompt, Hi - High, Med - Medium, Lo - Low&lt;br /&gt;
&lt;br /&gt;
=Kokkuvõte=&lt;br /&gt;
=Kasutatud kirjandus=&lt;br /&gt;
*http://www.sevenforums.com/tutorials/144766-internet-explorer-security-zones-add-remove-sites.html&lt;br /&gt;
*http://support.microsoft.com/kb/174360&lt;br /&gt;
*http://technet.microsoft.com/en-us/library/dd361896.aspx&lt;br /&gt;
*http://25yearsofprogramming.com/blog/2008/20080525.htm&lt;br /&gt;
&lt;br /&gt;
=Autor=&lt;br /&gt;
Kristjan Rõõm&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security_zones&amp;diff=37783</id>
		<title>Security zones</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security_zones&amp;diff=37783"/>
		<updated>2011-10-10T18:27:00Z</updated>

		<summary type="html">&lt;p&gt;Kroom: /* Vaikimisi seatud turvataseme muutmine */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Sissejuhatus&#039;&#039;=&lt;br /&gt;
Security zones on osa Internet Exploreri turbemeetoditest, mis annab kasutajatele võimalusele mugavalt ja efektiivselt hallata veebikeskkonna turvalisust. Security zones-i tüübid jaguned viieks: internet, local intranet, trusted sites, restricted sites ning my computer. Iga piirkonda saab seadistada vastavalt vajadusele, kasutades olemasolevaid seadistusi vastavalt turvatasemele või kohandades endale sobivate spetsifikatsioonidega turvataseme.&lt;br /&gt;
&lt;br /&gt;
=Turvapiirkonna struktuur=&lt;br /&gt;
Piirkonna struktuur&lt;br /&gt;
Kui Inrernet Explorer avab HTML lehekülje, siis dünaamiliste linkide kogum nimega Urimon.dll teeb kindlaks piirkonna, millega lehekülg avati. Selle tagamiseks teeb antud fail järgmised sammud:&lt;br /&gt;
*Teeb kindlaks proxy-serveri seose HTML lehega. Kui on seos, siis  automaatselt pannakse leht intraneti piirkonda.&lt;br /&gt;
*Kontrollib registrist lehekülje kuuluvust Usaldatud lehtede piirkonda ning määrab vastavalt tulemustele turvapiirkonna.&lt;br /&gt;
&lt;br /&gt;
=Turvapiirkondade tüübid=&lt;br /&gt;
&lt;br /&gt;
==Internet==&lt;br /&gt;
Antud piirkonda paigutatakse kõik need veebilehed, mis kuhugi mujale pole liigitatud(seetõttu ei saa ka lisada veebilehti antud piirkonda). Vaikimisi on antud piirkonna turvatase Medium-High.&lt;br /&gt;
&lt;br /&gt;
==Local Intranet==&lt;br /&gt;
Sisaldab kõiki veebilehti, mis asuvad seespool organisatsiooni tulemüüri. Vaikimisi on antud piirkonna turvatase Medium-Low.&lt;br /&gt;
&lt;br /&gt;
==Trusted Sites==&lt;br /&gt;
Piirkonda lisatakse tavaliselt kõige turvalisemad ja usaldusväärsemad lehed, mis soovitatavalt kasutavad https protokolli. Vaikimis on turvatasemeks Medium.&lt;br /&gt;
&lt;br /&gt;
==Restrcted Sites==&lt;br /&gt;
Kõik veebilehed, mis kujutavad endas ohtu, tasub liigitada Restricted Sitesi turvapiirkonda, millel on vaikimisi turvatase seadistatud High peale.&lt;br /&gt;
&lt;br /&gt;
==My Computer==&lt;br /&gt;
My Computer piirkonda(sisaldab faile ainult lokaalsest arvutist) saab hallata ainult Internet Explorer Administration Kitiga(IEAK) ning seetõttu antud valikuvõimalust ei ole Internet Exploreri Security Optionsi all. Administraatoritele on soovitatav kasutada algseadistust, kui just organisatsioonil ei ole erisoove.&lt;br /&gt;
&lt;br /&gt;
=Vaikimisi seatud turvataseme muutmine=&lt;br /&gt;
Vaikimisi seatud turvaseadme muutmiseks tuleb kõigepealt käivitada Internet Explorer. Seejärel avada Tools menüü(Alt+X), kus asub Internet Options. Kui vajutada security tabi avaneb selline vaade:&lt;br /&gt;
&lt;br /&gt;
[[File:Slevel.JPG]]&lt;br /&gt;
&lt;br /&gt;
Turvataseme muutmine on tehtud väga lihtsaks. Lihtsalt valida sobiv turvapiirkond ning kerida scrollbari vastavalt vajadusele.&lt;br /&gt;
&lt;br /&gt;
=Veebilehtede lisamine turvapiirkonda=&lt;br /&gt;
&lt;br /&gt;
==Internet zone==&lt;br /&gt;
Nagu eelpool mainitud ei saa lisada veebilehti Interneti turvapiirkonda, vaid sinna paigutatakse automaatselt kõik saidid, mida pole teistesse turvapiirkondadesse lisatud.&lt;br /&gt;
&lt;br /&gt;
==Local intranet==&lt;br /&gt;
A) Valige Local Intranet ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Intranetsites.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Vaadake üle seaded sisevõrgu lehtedele. Vaikimisi on valitud automaatne intraneti tuvastamine.&lt;br /&gt;
&lt;br /&gt;
[[File:Localintranet2.JPG]]&lt;br /&gt;
&lt;br /&gt;
*Include all local (intranet) sites not listed in other zones.&lt;br /&gt;
Intraneti leheküljed näiteks nagu http://local ehk aadressid, mis ei sisalda punkti.&lt;br /&gt;
*Include all sites that bypass the proxy server. &lt;br /&gt;
Tüüpiline intraneti seadistus kasutab interneti saamiseks proxy serverit ning intraneti serveriga otseühendust. Antud seadistus võimaldab intraneti ja interneti sisud lahus hoida. Kui proxy server ei ole nii konfigureeritud, siis tasub antud kast märgistamata jätta. Ning süsteemidele, mis ei kasuta proxy serverit, ei oma antud seadistus mingit tähtsust.&lt;br /&gt;
*Include all network paths(UNCs). &lt;br /&gt;
Võrguaadressi näiteks nagu  \\servername\sharename\file.txt kasutatakse tavaliselt lokaalvõrgus, mis tuleks lisada Local intranet-i piirkonda.&lt;br /&gt;
&lt;br /&gt;
==Trusted sites==&lt;br /&gt;
A) Valige Trusted sites ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Trusted.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Sisestage usaldusväärse veebilehe url ning vajutage add nuppu. Kui require server verification (https:) for all sites in this zone on märgitud, siis saab lisada ainult https protokolliga veebilehti.&lt;br /&gt;
&lt;br /&gt;
[[File:Trusted2.JPG]]&lt;br /&gt;
&lt;br /&gt;
==Restricted sites==&lt;br /&gt;
A) Valige Restricted sites ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Restricted.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Sisestage aadress ning vajutage Add nuppu.&lt;br /&gt;
&lt;br /&gt;
[[File:Restricted2.JPG]]&lt;br /&gt;
&lt;br /&gt;
=Turvaseaded=&lt;br /&gt;
&lt;br /&gt;
Siinkohal on väljatoodud erinevad turvaseaded ning nende staatus(En - lubatud, Dis - keelatud, Pro - üleküsimine, Hi - High, Med - Medium, Lo - Low) vastavas turvatasemes. Seadeid on võimalik muuta piirkonna Custom Leveli alt. &lt;br /&gt;
&lt;br /&gt;
{| {{table}}&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Security Setting&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;| .NET Framework|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Loose XAML||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| XAML browser applications||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| XPS documents||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|.NET Framework-Reliant Components|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Permissions for components with manifests||Hi||Hi||Hi||Hi||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run components not signed with Authenticode||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run components signed with Authenticode||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|ActiveX Controls and Plug-Ins|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Allow previously unused ActiveX controls to run without prompt||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Scriptlets||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Automatic prompting for ActiveX controls||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Binary and script behaviors||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Display video and animation on a webpage that does not use external media player||Dis||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Download signed ActiveX controls||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Download unsigned ActiveX controls||Pro||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Initialize and script ActiveX controls not marked as safe for scripting||Pro||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run ActiveX controls and plug-Ins||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Script ActiveX controls marked safe for scripting||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Downloads|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Automatic prompting for file downloads||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| File download||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Font download||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Enable .NET Framework setup||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Miscellaneous|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Access data sources across domains||En||Pro||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow META REFRESH||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow scripting of Internet Explorer web browser control||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow script-initiated windows without size or position constraints||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Web pages to use restricted protocols for active content||Pro||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow websites to open windows without address or status bars||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Display mixed content||Pro||Pro||Pro||Pro||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Don\&#039;t prompt for client certificate selection when no certificates or only one certificate exists||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Drag and drop or copy and paste files||En||En||En||En||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Include local directory path when uploading files to a server||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Installation of desktop items||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Launching applications and unsafe files||En||En||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Launching programs and files in an IFRAME||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Navigate sub-frames across different domains||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Open files based on content, not file extension||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Software channel permissions|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Submit nonencrypted form data||En||En||En||En||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Use Phishing Filter||Dis||Dis||En||En||En&lt;br /&gt;
|-&lt;br /&gt;
| Use Pop-up Blocker||Dis||Dis||En||En||En&lt;br /&gt;
|-&lt;br /&gt;
| Userdata persistence||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Web sites in less privileged web content zone can navigate into this zone||Pro||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Scripting|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Active scripting||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Programmatic clipboard access||En||En||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow status bar updates via script||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow websites to prompt for information using scripted windows||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Scripting of Java applets||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|User Authentication - Logon||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon with current user name and password||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Prompt for user name and password&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*En - Enabled, Dis - Disabled, Pro - Prompt, Hi - High, Med - Medium, Lo - Low&lt;br /&gt;
&lt;br /&gt;
=Kokkuvõte=&lt;br /&gt;
=Kasutatud kirjandus=&lt;br /&gt;
http://www.sevenforums.com/tutorials/144766-internet-explorer-security-zones-add-remove-sites.html&lt;br /&gt;
http://support.microsoft.com/kb/174360&lt;br /&gt;
http://technet.microsoft.com/en-us/library/dd361896.aspx&lt;br /&gt;
http://25yearsofprogramming.com/blog/2008/20080525.htm&lt;br /&gt;
&lt;br /&gt;
=Autor=&lt;br /&gt;
Kristjan Rõõm&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security_zones&amp;diff=37781</id>
		<title>Security zones</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security_zones&amp;diff=37781"/>
		<updated>2011-10-10T18:26:23Z</updated>

		<summary type="html">&lt;p&gt;Kroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Sissejuhatus&#039;&#039;=&lt;br /&gt;
Security zones on osa Internet Exploreri turbemeetoditest, mis annab kasutajatele võimalusele mugavalt ja efektiivselt hallata veebikeskkonna turvalisust. Security zones-i tüübid jaguned viieks: internet, local intranet, trusted sites, restricted sites ning my computer. Iga piirkonda saab seadistada vastavalt vajadusele, kasutades olemasolevaid seadistusi vastavalt turvatasemele või kohandades endale sobivate spetsifikatsioonidega turvataseme.&lt;br /&gt;
&lt;br /&gt;
=Turvapiirkonna struktuur=&lt;br /&gt;
Piirkonna struktuur&lt;br /&gt;
Kui Inrernet Explorer avab HTML lehekülje, siis dünaamiliste linkide kogum nimega Urimon.dll teeb kindlaks piirkonna, millega lehekülg avati. Selle tagamiseks teeb antud fail järgmised sammud:&lt;br /&gt;
*Teeb kindlaks proxy-serveri seose HTML lehega. Kui on seos, siis  automaatselt pannakse leht intraneti piirkonda.&lt;br /&gt;
*Kontrollib registrist lehekülje kuuluvust Usaldatud lehtede piirkonda ning määrab vastavalt tulemustele turvapiirkonna.&lt;br /&gt;
&lt;br /&gt;
=Turvapiirkondade tüübid=&lt;br /&gt;
&lt;br /&gt;
==Internet==&lt;br /&gt;
Antud piirkonda paigutatakse kõik need veebilehed, mis kuhugi mujale pole liigitatud(seetõttu ei saa ka lisada veebilehti antud piirkonda). Vaikimisi on antud piirkonna turvatase Medium-High.&lt;br /&gt;
&lt;br /&gt;
==Local Intranet==&lt;br /&gt;
Sisaldab kõiki veebilehti, mis asuvad seespool organisatsiooni tulemüüri. Vaikimisi on antud piirkonna turvatase Medium-Low.&lt;br /&gt;
&lt;br /&gt;
==Trusted Sites==&lt;br /&gt;
Piirkonda lisatakse tavaliselt kõige turvalisemad ja usaldusväärsemad lehed, mis soovitatavalt kasutavad https protokolli. Vaikimis on turvatasemeks Medium.&lt;br /&gt;
&lt;br /&gt;
==Restrcted Sites==&lt;br /&gt;
Kõik veebilehed, mis kujutavad endas ohtu, tasub liigitada Restricted Sitesi turvapiirkonda, millel on vaikimisi turvatase seadistatud High peale.&lt;br /&gt;
&lt;br /&gt;
==My Computer==&lt;br /&gt;
My Computer piirkonda(sisaldab faile ainult lokaalsest arvutist) saab hallata ainult Internet Explorer Administration Kitiga(IEAK) ning seetõttu antud valikuvõimalust ei ole Internet Exploreri Security Optionsi all. Administraatoritele on soovitatav kasutada algseadistust, kui just organisatsioonil ei ole erisoove.&lt;br /&gt;
&lt;br /&gt;
=Vaikimisi seatud turvataseme muutmine=&lt;br /&gt;
Vaikimisi seatud turvaseadme muutmiseks tuleb kõigepealt käivitada Internet Explorer. Seejärel avada Tools menüü(kiirklahv Alt+X), kus asub Internet Options. Kui vajutada security tabi avaneb selline vaade:&lt;br /&gt;
&lt;br /&gt;
[[File:Slevel.JPG]]&lt;br /&gt;
&lt;br /&gt;
Turvataseme muutmine on tehtud väga lihtsaks. Lihtsalt valida sobiv turvapiirkond ning kerida scrollbari vastavalt vajadusele.&lt;br /&gt;
&lt;br /&gt;
=Veebilehtede lisamine turvapiirkonda=&lt;br /&gt;
&lt;br /&gt;
==Internet zone==&lt;br /&gt;
Nagu eelpool mainitud ei saa lisada veebilehti Interneti turvapiirkonda, vaid sinna paigutatakse automaatselt kõik saidid, mida pole teistesse turvapiirkondadesse lisatud.&lt;br /&gt;
&lt;br /&gt;
==Local intranet==&lt;br /&gt;
A) Valige Local Intranet ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Intranetsites.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Vaadake üle seaded sisevõrgu lehtedele. Vaikimisi on valitud automaatne intraneti tuvastamine.&lt;br /&gt;
&lt;br /&gt;
[[File:Localintranet2.JPG]]&lt;br /&gt;
&lt;br /&gt;
*Include all local (intranet) sites not listed in other zones.&lt;br /&gt;
Intraneti leheküljed näiteks nagu http://local ehk aadressid, mis ei sisalda punkti.&lt;br /&gt;
*Include all sites that bypass the proxy server. &lt;br /&gt;
Tüüpiline intraneti seadistus kasutab interneti saamiseks proxy serverit ning intraneti serveriga otseühendust. Antud seadistus võimaldab intraneti ja interneti sisud lahus hoida. Kui proxy server ei ole nii konfigureeritud, siis tasub antud kast märgistamata jätta. Ning süsteemidele, mis ei kasuta proxy serverit, ei oma antud seadistus mingit tähtsust.&lt;br /&gt;
*Include all network paths(UNCs). &lt;br /&gt;
Võrguaadressi näiteks nagu  \\servername\sharename\file.txt kasutatakse tavaliselt lokaalvõrgus, mis tuleks lisada Local intranet-i piirkonda.&lt;br /&gt;
&lt;br /&gt;
==Trusted sites==&lt;br /&gt;
A) Valige Trusted sites ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Trusted.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Sisestage usaldusväärse veebilehe url ning vajutage add nuppu. Kui require server verification (https:) for all sites in this zone on märgitud, siis saab lisada ainult https protokolliga veebilehti.&lt;br /&gt;
&lt;br /&gt;
[[File:Trusted2.JPG]]&lt;br /&gt;
&lt;br /&gt;
==Restricted sites==&lt;br /&gt;
A) Valige Restricted sites ning seal vajutage nupule Sites.&lt;br /&gt;
&lt;br /&gt;
[[File:Restricted.JPG]]&lt;br /&gt;
&lt;br /&gt;
B) Sisestage aadress ning vajutage Add nuppu.&lt;br /&gt;
&lt;br /&gt;
[[File:Restricted2.JPG]]&lt;br /&gt;
&lt;br /&gt;
=Turvaseaded=&lt;br /&gt;
&lt;br /&gt;
Siinkohal on väljatoodud erinevad turvaseaded ning nende staatus(En - lubatud, Dis - keelatud, Pro - üleküsimine, Hi - High, Med - Medium, Lo - Low) vastavas turvatasemes. Seadeid on võimalik muuta piirkonna Custom Leveli alt. &lt;br /&gt;
&lt;br /&gt;
{| {{table}}&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;Security Setting&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;| .NET Framework|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Loose XAML||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| XAML browser applications||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| XPS documents||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|.NET Framework-Reliant Components|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Permissions for components with manifests||Hi||Hi||Hi||Hi||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run components not signed with Authenticode||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run components signed with Authenticode||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|ActiveX Controls and Plug-Ins|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Allow previously unused ActiveX controls to run without prompt||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Scriptlets||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Automatic prompting for ActiveX controls||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Binary and script behaviors||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Display video and animation on a webpage that does not use external media player||Dis||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Download signed ActiveX controls||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Download unsigned ActiveX controls||Pro||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Initialize and script ActiveX controls not marked as safe for scripting||Pro||Dis||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Run ActiveX controls and plug-Ins||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Script ActiveX controls marked safe for scripting||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Downloads|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Automatic prompting for file downloads||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| File download||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Font download||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Enable .NET Framework setup||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Miscellaneous|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Access data sources across domains||En||Pro||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow META REFRESH||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow scripting of Internet Explorer web browser control||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow script-initiated windows without size or position constraints||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Web pages to use restricted protocols for active content||Pro||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow websites to open windows without address or status bars||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Display mixed content||Pro||Pro||Pro||Pro||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Don\&#039;t prompt for client certificate selection when no certificates or only one certificate exists||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Drag and drop or copy and paste files||En||En||En||En||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Include local directory path when uploading files to a server||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Installation of desktop items||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Launching applications and unsafe files||En||En||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Launching programs and files in an IFRAME||En||Pro||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Navigate sub-frames across different domains||En||En||Dis||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Open files based on content, not file extension||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Software channel permissions|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Submit nonencrypted form data||En||En||En||En||Pro&lt;br /&gt;
|-&lt;br /&gt;
| Use Phishing Filter||Dis||Dis||En||En||En&lt;br /&gt;
|-&lt;br /&gt;
| Use Pop-up Blocker||Dis||Dis||En||En||En&lt;br /&gt;
|-&lt;br /&gt;
| Userdata persistence||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Web sites in less privileged web content zone can navigate into this zone||Pro||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Scripting|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-Low||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Medium-high||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|High&lt;br /&gt;
|-&lt;br /&gt;
| Active scripting||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow Programmatic clipboard access||En||En||Pro||Pro||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow status bar updates via script||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Allow websites to prompt for information using scripted windows||En||En||En||Dis||Dis&lt;br /&gt;
|-&lt;br /&gt;
| Scripting of Java applets||En||En||En||En||Dis&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|User Authentication - Logon||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon with current user name and password||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Automatic logon only in Intranet Zone||align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|Prompt for user name and password&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*En - Enabled, Dis - Disabled, Pro - Prompt, Hi - High, Med - Medium, Lo - Low&lt;br /&gt;
&lt;br /&gt;
=Kokkuvõte=&lt;br /&gt;
=Kasutatud kirjandus=&lt;br /&gt;
http://www.sevenforums.com/tutorials/144766-internet-explorer-security-zones-add-remove-sites.html&lt;br /&gt;
http://support.microsoft.com/kb/174360&lt;br /&gt;
http://technet.microsoft.com/en-us/library/dd361896.aspx&lt;br /&gt;
http://25yearsofprogramming.com/blog/2008/20080525.htm&lt;br /&gt;
&lt;br /&gt;
=Autor=&lt;br /&gt;
Kristjan Rõõm&lt;/div&gt;</summary>
		<author><name>Kroom</name></author>
	</entry>
</feed>