Insert Comments into Admin GUI Threshold /Disable SID #12446
Replies: 5 comments 6 replies
-
Should look like this below: 2019401: #ET POLICY Vulnerable Java Version 1.8.x Detected
- suppress:
gen_id: 1
track: by_src
ip: xxx.xx.xx.x |
Beta Was this translation helpful? Give feedback.
-
It is actually a VERY important thing. All configuration changes in security systems (like SO) MUST be ticketed and documented. And we MUST have ticket ## or admin name next to every line of code in configuration. It looks as it works as 'extra line next to the sid' or I can use 're: ' but it can be MUCH better if we can have comments (by # or something) in every such line. As for example our requirement is all configuration changes must be backed by the tickets and it includes DNS, firewalls, routers, and yes, IDS systems like SO. In addition syntax check in the system is weak - it's pretty often when we made change, change passed config check, but broke application (it is expected so not a huge issue, but anyway). PS. SO I did it this way But comment must be simple else it broke idstool (no '(' etc) |
Beta Was this translation helpful? Give feedback.
-
Checked this video already. Great idea. It looks as a first implementation
- for example, I did not see an easy way to reclassify events (especially
by the group - I can clone then disable old then modify new, but it is not
so useful) or to use regexp in the rules but I appreciate the overall idea.
We just started to run SO (we deployed 2 instances to replace aging
SNORT/SNORBY/NTOPNG) and it was 2.4.60 (so it missed Detection dashboard)
and detection looks as absolutely right thing, but I expect it to be
improved in the next releases (allow group updates, allow timed and
permanent reclassification, and so so on).
So thanks for the information, it was very useful.
(I skipped SO many years ago, when it was still in baby status, but I see
that it became a very powerful system eventually. We are just learning how
to get maximum from it /and we teach our INFOSEC teams how to use it, too/.)
…On Mon, Jun 10, 2024 at 4:45 PM Mike Reeves ***@***.***> wrote:
Yes this was introduced in 2.4.70. The whole idea around detections is
there is no more config files any more. Everything is done in the gui.
Check out the video:
https://www.youtube.com/watch?v=oxR4q53N6OI
—
Reply to this email directly, view it on GitHub
<#12446 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AFQ2RZPKTKVZ2O6H43WGRBTZGY3CXAVCNFSM6AAAAABD4UCJHOVHI2DSMVQWIX3LMV43SRDJONRXK43TNFXW4Q3PNVWWK3TUHM4TOMZSGU2TM>
.
You are receiving this because you commented.Message ID:
<Security-Onion-Solutions/securityonion/repo-discussions/12446/comments/9732556
@github.com>
|
Beta Was this translation helpful? Give feedback.
-
We upgraded and started to test this feature.
1) It is step in the right direction. But it looks as a very first step.
2) One problem is that there is not an easy way to change event severity.
Which is necessary pretty often.
3) One more problem is that it is often necessary to reclassify or disable
GROUP of events. For example all 'access to .. network group' for some
groups - we do have offices in China so all access to chinese groups is
100% OK, and there are many events related to it.
4) And one more thing. It is OFTEN necessary to disable event temporarily.
We found few BT usages, we opened cases, we do not want to see these events
anymore for next week or 2, but then we expect that problem must be
resolved so we want to monitor events again.
If I check zabbix (as an example) it allows all these things, as they are
very common (temporarily reclassification, or reclassification of the group
instead of disabling).
(CASES sync with jira is another story, but it is outside of this thread
scope).
…On Mon, Jun 10, 2024 at 4:56 PM Alexei Roudnev ***@***.***> wrote:
Checked this video already. Great idea. It looks as a first implementation
- for example, I did not see an easy way to reclassify events (especially
by the group - I can clone then disable old then modify new, but it is not
so useful) or to use regexp in the rules but I appreciate the overall idea.
We just started to run SO (we deployed 2 instances to replace aging
SNORT/SNORBY/NTOPNG) and it was 2.4.60 (so it missed Detection dashboard)
and detection looks as absolutely right thing, but I expect it to be
improved in the next releases (allow group updates, allow timed and
permanent reclassification, and so so on).
So thanks for the information, it was very useful.
(I skipped SO many years ago, when it was still in baby status, but I see
that it became a very powerful system eventually. We are just learning how
to get maximum from it /and we teach our INFOSEC teams how to use it, too/.)
On Mon, Jun 10, 2024 at 4:45 PM Mike Reeves ***@***.***>
wrote:
> Yes this was introduced in 2.4.70. The whole idea around detections is
> there is no more config files any more. Everything is done in the gui.
>
> Check out the video:
> https://www.youtube.com/watch?v=oxR4q53N6OI
>
> —
> Reply to this email directly, view it on GitHub
> <#12446 (reply in thread)>,
> or unsubscribe
> <https://github.com/notifications/unsubscribe-auth/AFQ2RZPKTKVZ2O6H43WGRBTZGY3CXAVCNFSM6AAAAABD4UCJHOVHI2DSMVQWIX3LMV43SRDJONRXK43TNFXW4Q3PNVWWK3TUHM4TOMZSGU2TM>
> .
> You are receiving this because you commented.Message ID:
> <Security-Onion-Solutions/securityonion/repo-discussions/12446/comments/9732556
> @github.com>
>
|
Beta Was this translation helpful? Give feedback.
-
Sorry, what is the best way to ask questions about automation / scripting? What we want is to run script when CASE is created / updated / closed (so we can create case in JIRA with reference to SOC, for example)? Regardihng detection dashboard. It is great but few things can be improved: |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Version
2.4.50
Installation Method
Security Onion ISO image
Description
configuration
Installation Type
Distributed
Location
on-prem with Internet access
Hardware Specs
Exceeds minimum requirements
CPU
lots
RAM
lots more
Storage for /
not alot, but enough
Storage for /nsm
like ... ~120TB
Network Traffic Collection
span port
Network Traffic Speeds
1Gbps to 10Gbps
Status
Yes, all services on all nodes are running OK
Salt Status
No, there are no failures
Logs
No, there are no additional clues
Detail
I would like to add comments to the text fields in the admin GUI for thresholding and disabling SIDs. When I was hand editing the files I could use the jinja comment style {#...#} but the web interface doesn't like that.
I checked the documentation and didn't see anything on how to achieve this. It is possible I missed something. Any assistance is appreciated.
Guidelines
Beta Was this translation helpful? Give feedback.
All reactions