Sigma rule to alert whenever a syslog message containing certain text is received #14344
Replies: 1 comment
-
You have a log that has a fieldname of As a side note you can use a modifier instead of manually specifying the asterisks:
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Good afternoon Onion community,
I am still getting the hang of Sigma detection rules and for the sake of example am trying to write a rule that alerts in Onion whenever a syslog message concerning Nmap is received from our perimeter firewalls. So far I have based my rule on an earlier one that I wrote for "ALERT" level syslog messages (mentioned in this thread) and have tried to follow the same template by looking at the corresponding message fields in Kibana. However, I haven't managed to make the rule work yet and wanted to reproduce it here for review.
This is what I have so far:
In general I would like to build a template for a rule that will trigger an alert whenever syslog messages containing a certain text in the "message" field (in this case, anything related to nmap) are received. However, even though it was relatively easy to write a rule concerning the syslog.severity_label field in a similar way, I am unsure why I haven't been able to do the same with the message field in Kibana. Any suggestions for changes to the above rule to ensure the desired functionality would be very much appreciated.
Thank you as always!
Beta Was this translation helpful? Give feedback.
All reactions