Sigma rule syntax to generate an alert whenever an "alert" syslog message is received #14319
-
Hello Security Onion, We are currently in the process of tuning our Onion instance which will be used primarily for the ingestion and analysis of syslog messages from our network perimeter. I have tried to write a simple Sigma detection rule to generate an Onion alert on all "alert" level syslog messages forwarded from our network devices, of which we receive about a dozen a day. I am new to Sigma configuration so I have read the documentation on rule creation and log sources from the default rule template and have rewritten the detection rule several times, but haven't managed to get it to work. Since it appears that there is something I am not understanding about the correct Sigma syntax for such a rule, I wanted to provide the latest version of the rule below for review by the Onion community. Any other examples of simple Sigma rules that generate similar alerts would be very helpful as well:
To reiterate: the rule's intended function is to trigger an Onion alert whenever an "alert" level syslog message is received from any of the perimeter network appliances that are currently forwarding to our Onion instance. Any suggestions/insight on how I can make this rule function as intended would be very much appreciated. Please let me know if you have any questions and I would be glad to respond ASAP. Thank you! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
After testing this further I believe I've landed on the correct configuration for the rule:
|
Beta Was this translation helpful? Give feedback.
After testing this further I believe I've landed on the correct configuration for the rule: