How to quickly filter by rule.name in SOC Alerts by OQL #12181
-
Version2.4.0 Installation MethodSecurity Onion ISO image Descriptionother (please provide detail below) Installation TypeStandalone Locationon-prem with Internet access Hardware SpecsExceeds minimum requirements CPUn/a RAMn/a Storage for /n/a Storage for /nsmn/a Network Traffic Collectiontap Network Traffic SpeedsLess than 1Gbps StatusYes, all services on all nodes are running OK Salt StatusYes, there are salt failures (please provide detail below) LogsNo, there are no additional clues DetailIf someone could point me in the right direction: I want to filter quickly using rule.name and wildcards or similar. For example, to filter rules starting with "ET", I'd like to use something like this: Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
In the alerts dashboard at the top of the page click 'options' then toggle on "Temporarily enable advanced features". Once that is enabled you can run the search you posted to not show rules matching |
Beta Was this translation helpful? Give feedback.
In the alerts dashboard at the top of the page click 'options' then toggle on "Temporarily enable advanced features".
Once that is enabled you can run the search you posted to not show rules matching
rule.name: ET*