Playbook : ElastAlert query works, but rule doesn't seem to filter properly #9610
Replies: 2 comments 1 reply
-
Good morning! Can you share one of the log entries that it is erroneously alerting on? I'd like to see what the user_agent.name field is that's not being matched properly by the filter. |
Beta Was this translation helpful? Give feedback.
1 reply
-
The docs say that the keyword "sofilter" is important for tuning the results - perhaps swapping that in for "filter" would help? https://docs.securityonion.net/en/2.3/playbook.html#tuning-plays |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I'm trying to set up a specific Playbook for Office 365, which will alert when certain User Agents are NOT being used. The use case is that people in the respective tenant should only use iOS and MS Edge browsers and everything else should generate an alert. Long story as to why, but it is what it is...
The Playbook Sigma rule is set up as follows:
title: Redacted-Name - Microsoft O365 - Logins from unauthorized User Agents
status: experimental
description: Detects any login from unauthorized User Agents
author: Me
date: 2023/01/20
modified: 2023/01/20
logsource:
index: so-beats*
detection:
selection:
event.dataset:
- o365.audit
o365.audit.Operation:
- UserLoggedIn
host.name:
- redacted-name.onmicrosoft.com
filter:
user_agent.name:
- Edge
- Mobile Safari UI/WKWebView
- Mobile Safari
- Electron
user_agent.original:
- Windows-AzureAD-Authentication-Provider/1.0
source.ip:
- <redacted.ip.address>
condition: selection and not filter
falsepositives:
- Legitimate User Agents
level: high
======================
The thing is, it converts to an ElastAlert query which seems to do the trick just fine. However, the Alerts that I'm getting from this particular Playbook still include the user_agent.name: Edge for instance. The tenant name and everything else works as expected; I only see alerts for that particular O365 tenant and User Logged In-events.
What am I missing?
Beta Was this translation helpful? Give feedback.
All reactions