Skip to content

Commit 089b917

Browse files
chetanchoudhary-sumohimanshu219amee-sumoJV0812
authored
SUMO-252682: Adding monitors info for otel apps - set 5 (#4969)
* SUMO-252682: Adding monitors info for otel apps - set 5 * Apply suggestions from code review Co-authored-by: Amee Lepcha <[email protected]> * Apply suggestions from code review Co-authored-by: Jagadisha V <[email protected]> * Apply suggestions from code review Co-authored-by: Jagadisha V <[email protected]> * Update docs/integrations/pci-compliance/opentelemetry/windows-json-opentelemetry.md * Update windows-opentelemetry.md * Update linux-opentelemetry.md * Update windows-json-opentelemetry.md * Update windows-opentelemetry.md * Update linux-opentelemetry.md * Update windows-json-opentelemetry.md --------- Co-authored-by: Himanshu Pal <[email protected]> Co-authored-by: Amee Lepcha <[email protected]> Co-authored-by: Jagadisha V <[email protected]>
1 parent cd42a17 commit 089b917

File tree

3 files changed

+45
-0
lines changed

3 files changed

+45
-0
lines changed

docs/integrations/cloud-security-monitoring-analytics/opentelemetry/windows-opentelemetry.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -305,3 +305,18 @@ The **WWindows - Security Monitoring - Critical Events** dashboard provides anal
305305
The **Windows - Security Monitoring - Inventory** dashboard helps you to monitor windows events provided by computer, channel, and provider. This dashboard also provides additional information on computer reboots.
306306

307307
<img src='https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/Windows-Cloud-Security-Monitoring-and-Analytics/OpenTelemetry/Windows-Security-Monitoring-Inventory.png' style={{border: '1px solid gray'}} alt="Windows-Security-Monitoring-Inventory" />
308+
309+
310+
## Create monitors for Windows - Cloud Security Monitoring and Analytics app
311+
312+
import CreateMonitors from '../../../reuse/apps/create-monitors.md';
313+
314+
<CreateMonitors/>
315+
316+
### Windows - Cloud Security Monitoring and Analytics alerts
317+
318+
| Name | Description | Alert Condition | Recover Condition |
319+
|:--|:--|:--|:--|
320+
| `Windows CSMA - Audit Log Tampering Detection` | This alert is triggered when attempt is detected to clear or tamper with Windows audit logs, indicating potential attempts to cover malicious activities. | Count > = 1 | Count < 1 |
321+
| `Windows CSMA - Failed Authentication Spike` | This alert is triggered when unusual spikes in failed authentication attempts are detected, indicating potential brute force attacks. | Count > = 10 | Count < 10 |
322+
| `Windows CSMA - Windows Update Failures` | This alert is triggered when repeated Windows Update failures are detected, indicating potential vulnerabilities to known exploits. | Count > = 3 | Count < 3 |

docs/integrations/pci-compliance/opentelemetry/linux-opentelemetry.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -220,3 +220,17 @@ Use this dashboard to:
220220
- Monitor actions performed by users with administrative privileges.
221221

222222
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/PCI-Compliance-For-Linux/OpenTelemetry/PCI-Compliance-Req-10.png')} alt="PCI Compliance for Linux dashboards" style={{border: '1px solid gray'}}/>
223+
224+
## Create monitors for PCI Compliance for Linux app
225+
226+
import CreateMonitors from '../../../reuse/apps/create-monitors.md';
227+
228+
<CreateMonitors/>
229+
230+
### PCI Compliance for Linux alerts
231+
232+
| Name | Description | Alert Condition | Recover Condition |
233+
|:--|:--|:--|:--|
234+
| `PCI Linux - Excessive Failed Authentication` | This alert is triggered when multiple failed login attempts are detected over a 5-minute period, indicating potential brute force attempts and addressing PCI Requirement `10.2.4` for invalid logical access attempts. | Count > 5 | Count < = 5 |
235+
| `PCI Linux - Privileged User Account Changes` | This alert is triggered when privileged user accounts (UID < 1000 or root accounts) are created, deleted, or modified, addressing PCI Requirement `10.2.5` for changes to identification and authentication mechanisms. | Count > 0 | Count < = 0 |
236+
| `PCI Linux - Unauthorized Sudo Elevation` | This alert is triggered when unauthorized users attempt to use sudo is detected, which addresses PCI Requirement `7.2.0` for implementing an access control system among system components with multiple users. | Count > 2 | Count < = 2 |

docs/integrations/pci-compliance/opentelemetry/windows-json-opentelemetry.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -264,3 +264,19 @@ Track user activities such as password changes, password resets, excessive faile
264264
Track your Windows Update activities.
265265

266266
<img src='https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/PCI-Compliance-For-Windows-JSON/OpenTelemetry/Windows-PCI-Req-06-Windows-Updates-Activity.png' alt="Windows - PCI Req 06 - Windows Updates Activity" />
267+
268+
## Create monitors for PCI Compliance For Windows JSON app
269+
270+
import CreateMonitors from '../../../reuse/apps/create-monitors.md';
271+
272+
<CreateMonitors/>
273+
274+
### PCI Compliance For Windows JSON alerts
275+
276+
| Name | Description | Alert Condition | Recover Condition |
277+
|:--|:--|:--|:--|
278+
| `Windows PCI - Critical Policy Changes` | This alert is triggered when modifications to security policies or audit policies are detected, indicating potential changes to the system's security posture. It supports PCI DSS Requirements `10.2.2` (track changes to system-level objects) and `10.2.5.b` (track use of identification and authentication mechanisms). | Count >= 1 | Count < 1 |
279+
| `Windows PCI - Excessive Failed Login Attempts` | This alert is triggered when there are multiple authentication failures detected across Windows environments. These are monitored across different authentication mechanisms like local Windows authentication, Kerberos, and network logons. It correlates failure patterns with specific error codes to identify potential security threats such as password guessing, account enumeration, or attempts to access disabled accounts. This helps security teams differentiate between benign issues and malicious activities. | Count >= 5 | Count < 5 |
280+
| `Windows PCI - Failed Windows Updates` | This alert is triggered when Windows update failures are detected, which could leave systems vulnerable to known exploits. It aligns with PCI DSS Requirement `6.2.0` for installing critical security patches within one month of release. | Count > = 3 | Count < 3 |
281+
| `Windows PCI - Security Audit Log Tampering` | This alert is triggered when attempt is detected to clear or tamper with Windows security audit logs, indicating potential attempts to hide malicious activities. It supports PCI DSS Requirements `10.2.0` (implement automated audit trails) and `10.3.0` (record audit trail entries). | Count > = 1 | Count < 1 |
282+
| `Windows PCI - User Account State Change` | This alert is triggered when critical user account state changes are detected, including account creation, deletion, enablement, and disablement. This supports PCI DSS Requirement 8.1.3 for immediately revoking access for terminated users. | Count > = 1 | Count < 1 |

0 commit comments

Comments
 (0)