Missing source ip in ElastAlert with Sigma Rules and Data from Wazuh Client #4779
Replies: 1 comment 2 replies
-
You should be able to use |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
i imported a Sigma Rule in the playbook and turned it into an active play. Rules below
`title: Whoami Execution
id: e28a5a99-da44-436d-b7a0-2afc20a5f413
status: experimental
description: Detects the execution of whoami, which is often used by attackers after
exloitation / privilege escalation but rarely used by administrators
references:
author: Florian Roth
date: 2018/08/13
tags:
logsource:
category: process_creation
product: windows
detection:
selection:
Image: '*\whoami.exe'
selection2:
OriginalFileName: whoami.exe
condition: selection or selection2
falsepositives:
level: high`
In the ElastAlert Dashboard i see the events triggered on a host where the wazuh client is running but how can i get the ip of the machine where this was triggered? The problem is when i rollout the wazuh client on multiple machines i´m unable to find the host where the binary was executed.
Beta Was this translation helpful? Give feedback.
All reactions