Skip to content

Commit a0505d2

Browse files
SUMO-252682: Adding monitors info for otel apps - set 5
1 parent 0aa5c4f commit a0505d2

File tree

3 files changed

+45
-0
lines changed

3 files changed

+45
-0
lines changed

docs/integrations/cloud-security-monitoring-analytics/opentelemetry/windows-opentelemetry.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -305,3 +305,18 @@ The **WWindows - Security Monitoring - Critical Events** dashboard provides anal
305305
The **Windows - Security Monitoring - Inventory** dashboard helps you to monitor windows events provided by computer, channel, and provider. This dashboard also provides additional information on computer reboots.
306306

307307
<img src='https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/Windows-Cloud-Security-Monitoring-and-Analytics/OpenTelemetry/Windows-Security-Monitoring-Inventory.png' style={{border: '1px solid gray'}} alt="Windows-Security-Monitoring-Inventory" />
308+
309+
310+
## Create monitors for Windows - Cloud Security Monitoring and Analytics - OpenTelemetry app
311+
312+
import CreateMonitors from '../../../reuse/apps/create-monitors.md';
313+
314+
<CreateMonitors/>
315+
316+
### Windows - Cloud Security Monitoring and Analytics - OpenTelemetry Alerts
317+
318+
| Name | Description | Alert Condition | Recover Condition |
319+
|:--|:--|:--|:--|
320+
| `Windows CSMA - Audit Log Tampering Detection` | This alert is triggered when attempts to clear or tamper with Windows audit logs are detected, indicating potential attempts to cover malicious activities. | Count >= 1 | Count < 1 |
321+
| `Windows CSMA - Failed Authentication Spike` | This alert is triggered when unusual spikes in failed authentication attempts are detected, indicating potential brute force attacks. | Count >= 10 | Count < 10 |
322+
| `Windows CSMA - Windows Update Failures` | This alert is triggered when repeated Windows Update failures are detected, indicating potential vulnerabilities to known exploits. | Count >= 3 | Count < 3 |

docs/integrations/pci-compliance/opentelemetry/linux-opentelemetry.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -220,3 +220,17 @@ Use this dashboard to:
220220
- Monitor actions performed by users with administrative privileges.
221221

222222
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/PCI-Compliance-For-Linux/OpenTelemetry/PCI-Compliance-Req-10.png')} alt="PCI Compliance for Linux dashboards" style={{border: '1px solid gray'}}/>
223+
224+
## Create monitors for PCI Compliance for Linux - OpenTelemetry app
225+
226+
import CreateMonitors from '../../../reuse/apps/create-monitors.md';
227+
228+
<CreateMonitors/>
229+
230+
### PCI Compliance for Linux - OpenTelemetry Alerts
231+
232+
| Name | Description | Alert Condition | Recover Condition |
233+
|:--|:--|:--|:--|
234+
| `PCI Linux - Excessive Failed Authentication` | This alert is triggered when multiple failed login attempts are detected over a 5-minute period, indicating potential brute force attempts and addressing PCI Requirement 10.2.4 for invalid logical access attempts. | Count > 5 | Count <= 5 |
235+
| `PCI Linux - Privileged User Account Changes` | This alert is triggered when privileged user accounts (UID < 1000 or root accounts) are created, deleted, or modified, addressing PCI Requirement 10.2.5 for changes to identification and authentication mechanisms. | Count > 0 | Count <= 0 |
236+
| `PCI Linux - Unauthorized Sudo Elevation` | This alert is triggered when unauthorized users attempt to use sudo, addressing PCI Requirement 7.2 for implementing an access control system for system components with multiple users. | Count > 2 | Count <= 2 |

docs/integrations/pci-compliance/opentelemetry/windows-json-opentelemetry.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -264,3 +264,19 @@ Track user activities such as password changes, password resets, excessive faile
264264
Track your Windows Update activities.
265265

266266
<img src='https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/PCI-Compliance-For-Windows-JSON/OpenTelemetry/Windows-PCI-Req-06-Windows-Updates-Activity.png' alt="Windows - PCI Req 06 - Windows Updates Activity" />
267+
268+
## Create monitors for PCI Compliance For Windows JSON - OpenTelemetry app
269+
270+
import CreateMonitors from '../../../reuse/apps/create-monitors.md';
271+
272+
<CreateMonitors/>
273+
274+
### PCI Compliance For Windows JSON - OpenTelemetry Alerts
275+
276+
| Name | Description | Alert Condition | Recover Condition |
277+
|:--|:--|:--|:--|
278+
| `Windows PCI - Critical Policy Changes` | This alert is triggered when modifications to security policies or audit policies are detected, indicating potential changes to the system's security posture. It supports PCI DSS Requirements 10.2.2 (Track changes to system-level objects) and 10.2.5.b (Track use of identification and authentication mechanisms). | Count >= 1 | Count < 1 |
279+
| `Windows PCI - Excessive Failed Login Attempts` | This alert is triggered when authentication failures across Windows environments are detected and analyzed, examining mechanisms like local Windows authentication, Kerberos, and network logons. It correlates failure patterns with specific error codes to identify potential security threats such as password guessing, account enumeration, or attempts to access disabled accounts. This helps security teams differentiate between benign issues and malicious activities. | Count >= 5 | Count < 5 |
280+
| `Windows PCI - Failed Windows Updates` | This alert is triggered when Windows Update failures are detected, which could leave systems vulnerable to known exploits. It aligns with PCI DSS Requirement 6.2 for installing critical security patches within one month of release. | Count >= 3 | Count < 3 |
281+
| `Windows PCI - Security Audit Log Tampering` | This alert is triggered when attempts to clear or tamper with Windows security audit logs are detected, indicating potential attempts to hide malicious activities. It supports PCI DSS Requirements 10.2 (Implement automated audit trails) and 10.3 (Record audit trail entries). | Count >= 1 | Count < 1 |
282+
| `Windows PCI - User Account State Change` | This alert is triggered when critical user account state changes are detected, including account creation, deletion, enablement, and disablement, to comply with PCI DSS Requirement 8.1.3 for immediately revoking access for terminated users. | Count >= 1 | Count < 1 |

0 commit comments

Comments
 (0)