Skip to content
Discussion options

You must be logged in to vote

After testing this further I believe I've landed on the correct configuration for the rule:

# This is a Sigma rule template, which uses YAML. Replace all template values with your own values.
# The id (UUIDv4) is pregenerated and can safely be used.
# Click "Convert" to convert the Sigma rule to use Security Onion field mappings within an EQL query
#
# Rule Creation Guide: https://github.com/SigmaHQ/sigma/wiki/Rule-Creation-Guide
# Logsources: https://sigmahq.io/docs/basics/log-sources.html

title: 'Syslog ALERT findings rule 2'
id:  [UUID]
status: 'experimental'
description: |
    This rule, [UUID], is designed to trigger an alert in Onion whenever a syslog level 1 ("ALERT") message is r…

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by S6T0Sa0B1v
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
1 participant