Creating a new Sigma detection to alert on Elastic Agent malware quarantine #15279
-
Version2.4.190 Installation MethodSecurity Onion ISO image Descriptionconfiguration Installation TypeDistributed Locationon-prem with Internet access Hardware SpecsExceeds minimum requirements CPU8 RAM128 GB Storage for /300 GB Storage for /nsm10 TB Network Traffic Collectionspan port Network Traffic Speeds1Gbps to 10Gbps StatusYes, all services on all nodes are running OK Salt StatusNo, there are no failures LogsNo, there are no additional clues DetailI have a new install of Security Onion and I have Elastic Agent on a handful of test machines. I had a internal application get quarantined by the agent, and realized I need an alert for this to occur in SOC Alerts. I tried setting up a Sigma detection, but it fails to convert. Here's the error text: I feel like it's either syntax or I'm not pointing to the logsource correctly. Any tips? Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
|
It's your tags. Follow https://sigmahq.io/docs/basics/rules.html#metadata-tags for your tags and it will convert. |
Beta Was this translation helpful? Give feedback.
It's your tags. Follow https://sigmahq.io/docs/basics/rules.html#metadata-tags for your tags and it will convert.