notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
This referral link gives you 10% off a account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

Port details
ossec-hids-server-config Configuration manager for ossec-hids-server
3.7.0 security on this many watch lists=0 search for ports that depend on this port Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 3.6.0_1Version of this port present on the latest quarterly branch.
Maintainer: search for ports maintained by this maintainer
Port Added: 2018-11-09 18:52:47
Last Update: 2021-04-07 08:09:01
Commit Hash: cf118cc
License: GPLv2
OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS). It has a powerful correlation and analysis engine, integrating log analysis, file integrity checking, Windows registry monitoring, centralized policy enforcement, rootkit detection, real-time alerting and active response. This package adds the configuration overlay with samples, additional rules, commands, scripts and support for multiple configuration files.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (45 items)
Collapse this list.
  1. /usr/local/share/licenses/ossec-hids-server-config-3.7.0/
  2. /usr/local/share/licenses/ossec-hids-server-config-3.7.0/LICENSE
  3. /usr/local/share/licenses/ossec-hids-server-config-3.7.0/GPLv2
  4. @dir(,ossec,0550) /usr/local/ossec-hids
  5. @dir(,ossec,0550) /usr/local/ossec-hids/active-response
  6. @dir(,ossec,0550) /usr/local/ossec-hids/active-response/bin
  7. @(,ossec,0550) /usr/local/ossec-hids/active-response/bin/
  8. @dir(,,0550) /usr/local/ossec-hids/bin
  9. @dir(,,0550) /usr/local/ossec-hids/bin/command
  10. @(,,0550) /usr/local/ossec-hids/bin/command/
  11. @(,,0550) /usr/local/ossec-hids/bin/command/
  12. @dir(,,0550) /usr/local/ossec-hids/bin/config
  13. @(,,0550) /usr/local/ossec-hids/bin/config/agent-conf
  14. @(,,0550) /usr/local/ossec-hids/bin/config/ossec-conf
  15. @dir(,ossec,0550) /usr/local/ossec-hids/etc
  16. @dir(,ossec,0550) /usr/local/ossec-hids/etc/agent.conf.d
  17. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/120.rootcheck.conf
  18. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/130.syscheck.conf
  19. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/150.logs.conf
  20. @dir(,ossec,0550) /usr/local/ossec-hids/etc/agent.conf.d/disabled
  21. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/disabled/520.rootcheck.local.conf
  22. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/disabled/530.syscheck.local.conf
  23. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/disabled/550.logs.local.conf
  24. @sample(,ossec,0640) /usr/local/ossec-hids/etc/command.conf.sample
  25. @dir(,ossec,0550) /usr/local/ossec-hids/etc/ossec.conf.d
  26. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/100.rules.conf
  27. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/
  28. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/120.rootcheck.conf
  29. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/130.syscheck.conf
  30. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/140.command-output.conf
  31. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/150.logs.conf
  32. @sample(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/900.local.conf.sample
  33. @dir(,ossec,0550) /usr/local/ossec-hids/etc/ossec.conf.d/disabled
  34. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/500.rules.local.conf
  35. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/
  36. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/520.rootcheck.local.conf
  37. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/530.syscheck.local.conf
  38. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/540.command-output.local.conf
  39. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/550.logs.local.conf
  40. @dir(,ossec,0550) /usr/local/ossec-hids/rules
  41. @(,ossec,0640) /usr/local/ossec-hids/rules/freebsd_cmdout_rules.xml
  42. @(,ossec,0640) /usr/local/ossec-hids/rules/freebsd_config_rules.xml
  43. @owner
  44. @group
  45. @mode
Collapse this list.
Dependency lines:
  • ossec-hids-server-config>0:security/ossec-hids-server-config
  • ossec-hids-client
  • ossec-hids-agent
  • ossec-hids-local
Conflicts Matches:
There are no Conflicts Matches for this port. This is usually an error.
To install the port:
cd /usr/ports/security/ossec-hids-server-config/ && make install clean
To add the package, run one of these commands:
  • pkg install security/ossec-hids-server-config
  • pkg install ossec-hids-server-config
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: ossec-hids-server-config
Flavors: there is no flavor information for this port.
TIMESTAMP = 1656551293 SHA256 (ossec-ossec-hids-3.7.0_GH0.tar.gz) = 23f5ede50f5de449db0a571fc453977f7079b4b47ce90b0ef31feed20df100e9 SIZE (ossec-ossec-hids-3.7.0_GH0.tar.gz) = 2518737

Packages (timestamps in pop-ups are UTC):
Master port: security/ossec-hids-local-config
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Runtime dependencies:
  1. ossec-hids-server>=3.7.0 : security/ossec-hids-server
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for ossec-hids-server-config-3.7.0: ====> Alerting Rules DEFAULT_R=on: Rules provided by OSSEC CONFIG_R=on: Alert changes of the OSSEC main configuration files CMDOUT_R=on: Alert changes of output of the monitored commands ====> Active Response DEFAULT_C=on: Commands provided by OSSEC MERGE_C=on: Commands to merge configuration files MERGE_AR=on: Merge configuration files when they change RESTART_AR=on: Restart OSSEC when main configuration files change HOSTDENY_AR=off: Block the attacker's IP using access control files FWDROP_AR=off: Block the attacker's IP on the firewall ====> System Audit and Rootkit Detection (rootcheck) BASIC_RC=on: Basic audit and rootkits ====> File Integrity Checking (syscheck) NEWFILES_SC=on: Alert on new files created NOAUTO_SC=on: Disable auto_ignore feature BASIC_SC=on: "bin", "sbin" and "etc" directories OSSEC_SC=on: OSSEC directories PGSQL_SC=off: PostgreSQL configuration files ====> Command Output Monitoring LOGINS=on: Last logins PORTS_TCP=on: Open TCP ports PORTS_UDP=on: Open UDP ports ====> Log Monitoring BASIC=on: Basic system logs OSSEC=on: OSSEC active response logs APACHE=off: Apache logs NGINX=off: Nginx logs RADIUS=off: FreeRADIUS logs VSFTPD=off: Vsftpd logs ====> Pushed System Audit and Rootkit Detection (rootcheck) BASIC_RC_P=on: Basic audit and rootkits (profile: basic) CIS_RC_P=on: CIS benchmark - Legacy (profile: cis) CIS_L1_RC_P=on: CIS benchmark - Level 1 (profile: cis-level1) CIS_L2_RC_P=on: CIS benchmark - Level 2 (profile: cis-level2) ====> Pushed File Integrity Checking (syscheck) BASIC_SC_P=on: "bin", "sbin" and "etc" directories (profile: basic) OSSEC_SC_P=on: OSSEC directories (profile: ossec) PGSQL_SC_P=on: PostgreSQL configuration files (profile: postgresql) ====> Pushed Log Monitoring BASIC_P=on: Basic system logs (profile: basic) OSSEC_P=on: OSSEC active response logs (profile: ossec) APACHE_P=on: Apache logs (profile: apache) NGINX_P=on: Nginx logs (profile: nginx) RADIUS_P=on: FreeRADIUS logs (profile: radius) VSFTPD_P=on: Vsftpd logs (profile: vsftpd) ====> Active Response Firewall: you have to select exactly one of them NOFW=on: Custom or no firewall IPF=off: ipfilter IPFW=off: ipfirewall PF=off: Packet Filter ===> Use 'make config' to modify these settings
Options name:
FreshPorts was unable to extract/find any pkg message
Master Sites:
  1. There is no master site for this port.

Number of commits found: 3

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
This is a slave port. You may also want to view the commits to the master port: security/ossec-hids-local-config
CommitCreditsLog message
07 Apr 2021 08:09:01
commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c files touched by this commit
Mathieu Arnold (mat) search for other commits by this committer
One more small cleanup, forgotten yesterday.
Reported by:	lwhsu
06 Apr 2021 14:31:07
commit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344eb files touched by this commit
Mathieu Arnold (mat) search for other commits by this committer
Remove # $FreeBSD$ from Makefiles.
09 Nov 2018 18:52:22
Revision:484537Original commit files touched by this commit
swills search for other commits by this committer
security/ossec-hids-server: update from 2.8.3 to 3.1.0

PR:		232794
Submitted by:	Dominik Lisiak <> (maintainer)

Number of commits found: 3