notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photos
All times are UTC
Ukraine
Port details on branch 2026Q2
ossec-hids-server-config Configuration manager for ossec-hids-server
3.8.0 security on this many watch lists=0 search for ports that depend on this port Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout Package not present on quarterly.This port was created during this quarter. It will be in the next quarterly branch but not the current one.
Maintainer: dominik.lisiak@bemsoft.pl search for ports maintained by this maintainer
Port Added: 2026-04-08 11:42:19
Last Update: unknown
License: GPLv2
WWW:
https://ossec.github.io
Description:
OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS). It has a powerful correlation and analysis engine, integrating log analysis, file integrity checking, Windows registry monitoring, centralized policy enforcement, rootkit detection, real-time alerting and active response. This package adds the configuration overlay with samples, additional rules, commands, scripts and support for multiple configuration files.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb - no subversion history for this port

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (45 items)
Collapse this list.
  1. /usr/local/share/licenses/ossec-hids-server-config-3.8.0/catalog.mk
  2. /usr/local/share/licenses/ossec-hids-server-config-3.8.0/LICENSE
  3. /usr/local/share/licenses/ossec-hids-server-config-3.8.0/GPLv2
  4. @dir(,ossec,0550) /usr/local/ossec-hids
  5. @dir(,ossec,0550) /usr/local/ossec-hids/active-response
  6. @dir(,ossec,0550) /usr/local/ossec-hids/active-response/bin
  7. @(,ossec,0550) /usr/local/ossec-hids/active-response/bin/merge-config.sh
  8. @dir(,,0550) /usr/local/ossec-hids/bin
  9. @dir(,,0550) /usr/local/ossec-hids/bin/command
  10. @(,,0550) /usr/local/ossec-hids/bin/command/last-logins.sh
  11. @(,,0550) /usr/local/ossec-hids/bin/command/open-ports.sh
  12. @dir(,,0550) /usr/local/ossec-hids/bin/config
  13. @(,,0550) /usr/local/ossec-hids/bin/config/agent-conf
  14. @(,,0550) /usr/local/ossec-hids/bin/config/ossec-conf
  15. @dir(,ossec,0550) /usr/local/ossec-hids/etc
  16. @dir(,ossec,0550) /usr/local/ossec-hids/etc/agent.conf.d
  17. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/120.rootcheck.conf
  18. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/130.syscheck.conf
  19. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/150.logs.conf
  20. @dir(,ossec,0550) /usr/local/ossec-hids/etc/agent.conf.d/disabled
  21. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/disabled/520.rootcheck.local.conf
  22. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/disabled/530.syscheck.local.conf
  23. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/disabled/550.logs.local.conf
  24. @sample(,ossec,0640) /usr/local/ossec-hids/etc/command.conf.sample
  25. @dir(,ossec,0550) /usr/local/ossec-hids/etc/ossec.conf.d
  26. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/100.rules.conf
  27. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/110.active-response.conf
  28. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/120.rootcheck.conf
  29. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/130.syscheck.conf
  30. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/140.command-output.conf
  31. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/150.logs.conf
  32. @sample(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/900.local.conf.sample
  33. @dir(,ossec,0550) /usr/local/ossec-hids/etc/ossec.conf.d/disabled
  34. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/500.rules.local.conf
  35. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/510.active-response.local.conf
  36. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/520.rootcheck.local.conf
  37. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/530.syscheck.local.conf
  38. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/540.command-output.local.conf
  39. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/550.logs.local.conf
  40. @dir(,ossec,0550) /usr/local/ossec-hids/rules
  41. @(,ossec,0640) /usr/local/ossec-hids/rules/freebsd_cmdout_rules.xml
  42. @(,ossec,0640) /usr/local/ossec-hids/rules/freebsd_config_rules.xml
  43. @owner
  44. @group
  45. @mode
Collapse this list.
USE_RC_SUBR (Service Scripts)
  • no SUBR information found for this port
Dependency lines:
  • ossec-hids-server-config>0:security/ossec-hids-server-config
Conflicts:
CONFLICTS_INSTALL:
  • ossec-hids-client
  • ossec-hids-agent
  • ossec-hids-local
To install the port:
cd /usr/ports/security/ossec-hids-server-config/ && make install clean
To add the package, run one of these commands:
  • pkg install security/ossec-hids-server-config
  • pkg install ossec-hids-server-config
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: ossec-hids-server-config
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1740298126 SHA256 (ossec-ossec-hids-3.8.0_GH0.tar.gz) = bd857a2dd7d0559ef59b4a9ec276f3a8ade6830f8aed257e8f4a62106cfe5f38 SIZE (ossec-ossec-hids-3.8.0_GH0.tar.gz) = 2524057

No package information for this port in our database
Sometimes this happens. Not all ports have packages. Perhaps there is a build error. Check the fallout link: pkg-fallout
Master port: security/ossec-hids-local-config
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Runtime dependencies:
  1. ossec-hids-server>=3.8.0 : security/ossec-hids-server
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for ossec-hids-server-config-3.8.0: ====> Alerting Rules DEFAULT_R=on: Rules provided by OSSEC CONFIG_R=on: Alert changes of the OSSEC main configuration files CMDOUT_R=on: Alert changes of output of the monitored commands ====> Active Response DEFAULT_C=on: Commands provided by OSSEC MERGE_C=on: Commands to merge configuration files MERGE_AR=on: Merge configuration files when they change RESTART_AR=on: Restart OSSEC when main configuration files change HOSTDENY_AR=off: Block the attacker's IP using access control files FWDROP_AR=off: Block the attacker's IP on the firewall ====> System Audit and Rootkit Detection (rootcheck) BASIC_RC=on: Basic audit and rootkits ====> File Integrity Checking (syscheck) NEWFILES_SC=on: Alert on new files created NOAUTO_SC=on: Disable auto_ignore feature BASIC_SC=on: "bin", "sbin" and "etc" directories OSSEC_SC=on: OSSEC directories PGSQL_SC=off: PostgreSQL configuration files ====> Command Output Monitoring LOGINS=on: Last logins PORTS_TCP=on: Open TCP ports PORTS_UDP=on: Open UDP ports ====> Log Monitoring BASIC=on: Basic system logs OSSEC=on: OSSEC active response logs APACHE=off: Apache logs NGINX=off: Nginx logs RADIUS=off: FreeRADIUS logs VSFTPD=off: Vsftpd logs ====> Pushed System Audit and Rootkit Detection (rootcheck) BASIC_RC_P=on: Basic audit and rootkits (profile: basic) CIS_RC_P=on: CIS benchmark - Legacy (profile: cis) CIS_L1_RC_P=on: CIS benchmark - Level 1 (profile: cis-level1) CIS_L2_RC_P=on: CIS benchmark - Level 2 (profile: cis-level2) ====> Pushed File Integrity Checking (syscheck) BASIC_SC_P=on: "bin", "sbin" and "etc" directories (profile: basic) OSSEC_SC_P=on: OSSEC directories (profile: ossec) PGSQL_SC_P=on: PostgreSQL configuration files (profile: postgresql) ====> Pushed Log Monitoring BASIC_P=on: Basic system logs (profile: basic) OSSEC_P=on: OSSEC active response logs (profile: ossec) APACHE_P=on: Apache logs (profile: apache) NGINX_P=on: Nginx logs (profile: nginx) RADIUS_P=on: FreeRADIUS logs (profile: radius) VSFTPD_P=on: Vsftpd logs (profile: vsftpd) ====> Active Response Firewall: you have to select exactly one of them NOFW=on: Custom or no firewall IPF=off: ipfilter IPFW=off: ipfirewall PF=off: Packet Filter ===> Use 'make config' to modify these settings
Options name:
security_ossec-hids-server-config
FreshPorts was unable to extract/find any pkg message
Master Sites:
  1. There is no master site for this port.

Number of commits found: 0

Number of commits found: 0

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
Security Policy
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
firefoxApr 09
firefoxApr 09
firefoxApr 09
firefoxApr 09
firefox-esrApr 09
firefox-esrApr 09
gitlabApr 09
thunderbirdApr 09
thunderbirdApr 09
thunderbirdApr 09
thunderbirdApr 09
opensslApr 07
openssl111Apr 07
openssl34Apr 07
openssl35Apr 07

20 vulnerabilities affecting 414 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last processed:
2026-04-09 10:36:35 UTC


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)

Calculated hourly:
Port count 34328
Broken 100
Deprecated 177
Ignore 218
Forbidden 0
Restricted 1
No CDROM 1
Vulnerable 37
Expired 9
Set to expire 106
Interactive 0
new 24 hours 3
new 48 hours12
new 7 days67
new fortnight105
new month260