help with setting up email alerts from Security Onion #10280
-
Hi, most of the critical/high playbooks, are active, and winlogbeat with sysmon is set up on various Windows servers to send logs. alerts are appearing in the Alerts section, so all good. what I'd like is to set up is some email alerting please whenever a critical or high severity event is detected I've had a search for other similar discussions in this forum and a had a look at the info below, but it doesn't work and can't get a concrete answer on how to configure this so need some guidance. https://docs.securityonion.net/en/2.3/elastalert.html#email-internal if I create an smtp-alert.yaml in /opt/so/rules/elastalert/ and populated this, but no emails are sent, and so-elasticalert-test says 'test failed'. from the Security onion server I can ping and connect to port 25 successfully on our SMTP relay server. smtp-alert.yaml example e.g.: alert:
am I missing something here ? thanks in advance |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments
-
Hello, Not sure if you pasted the full rule you created but you need to create a criteria for the rule to trigger. Here is what I use and it works fine
This will send 1 email for each unique rule that triggers on each unique system. To remove this and send an email for every single rule that triggers remove the query_key line. |
Beta Was this translation helpful? Give feedback.
-
Hi, |
Beta Was this translation helpful? Give feedback.
Hello,
Not sure if you pasted the full rule you created but you need to create a criteria for the rule to trigger. Here is what I use and it works fine
This will send 1 email for each unique rule that triggers on each unique system. To remove this …