Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Check what rules can be used with the current settings #7

Open
YamatoSecurity opened this issue Mar 8, 2025 · 7 comments
Open

Check what rules can be used with the current settings #7

YamatoSecurity opened this issue Mar 8, 2025 · 7 comments
Assignees
Labels
enhancement New feature or request high priority
Milestone

Comments

@YamatoSecurity
Copy link
Contributor

After the necessary config files are created, we can check what rules are usable and not usable.

Ex:

Checking event log audit settings. Please wait.

Detection rules that can be used on this system versus total possible rules:
Critical rules: 20 / 200 (xx%)
High rules: 10 / 1000 (xx%)
等々

Detection rules that cannot be used on this system:
Critical rules: 180 / 200 (xx%)
High rules: 160 / 1000 (xx%)
等々

Usable detection rules list saved to: UsableRules.csv
Unusable detection rules list saved to: UnusableRules.csv

You can only utilize 10% of your Security detection rules.

For now, we can save the detailed rule list to CSV but later want to create two HTML reports that are easy to read.

@YamatoSecurity YamatoSecurity added the enhancement New feature or request label Mar 8, 2025
@YamatoSecurity YamatoSecurity added this to the v1.0.0 milestone Mar 8, 2025
@fukusuket
Copy link
Collaborator

memo:

Output auditpol results in English

open cmd.exe

chcp 437
auditpol /get /category:* /r

@fukusuket
Copy link
Collaborator

fukusuket commented Mar 12, 2025

@YamatoSecurity
I created and tested this feature prototype! Could you check it when you have time?🙏

Checking event log audit settings. Please wait.

Detection rules that can be used on this system versus total possible rules:
critical rules: 3 / 11 (27.27%)
high rules: 29 / 88 (32.95%)
informational rules: 27 / 43 (62.79%)
low rules: 20 / 32 (62.50%)
medium rules: 43 / 83 (51.81%)

Detection rules that cannot be used on this system:
critical rules: 8/ 11 (72.73%)
high rules: 59 / 88 (67.05%)
informational rules: 16 / 43 (37.21%)
low rules: 12 / 32 (37.50%)
medium rules: 40 / 83 (48.19%)

Usable detection rules list saved to: UsableRules.csv
Unusable detection rules list saved to: UnusableRules.csv

You can only utilize 47.47% of your Security detection rules.

@fukusuket
Copy link
Collaborator

fukusuket commented Mar 12, 2025

In the prototype, we're starting with Security.evtx. It seems like we might be able to include other logs for checking as well?🤔 what do you think? (This would mean including all logs except Sysmon)

@fukusuket
Copy link
Collaborator

fukusuket commented Mar 12, 2025

Strictly speaking, some logs, such as PowerShell:4103/4104, are not output unless enabled, but counting rules other than Security.evtx as enabled, the results were as follows. (to the extent that Sysmon is excluded)

Checking event log audit settings. Please wait.

Detection rules that can be used on this system versus total possible rules:
critical rules: 22 / 30 (73.33%)
high rules: 140 / 199 (70.35%)
informational rules: 41 / 57 (71.93%)
low rules: 47 / 59 (79.6%)
medium rules: 116 / 156 (4.36%)

Detection rules that cannot be used on this system:
critical rules: 8 / 30 (26.67%)
high rules: 59 / 199 (29.65%)
informational rules: 16 / 57 (28.07%)
low rules: 12 / 59 (20.34%)
medium rules: 40 / 156 (25.64%)

Usable detection rules list saved to: UsableRules.csv
Unusable detection rules list saved to: UnusableRules.csv

You can only utilize 73.05% of your detection rules.

73.05% could be misleading in the opposite direction, that the log setting is sufficient... 😅

@YamatoSecurity
Copy link
Contributor Author

In the prototype, we're starting with Security.evtx. It seems like we might be able to include other logs for checking as well?🤔 what do you think? (This would mean including all logs except Sysmon)

Yes! Don't worry, I will create issues to check all logs except Sysmon. 😄
For now, we should focus on Security though as that is the biggest and most complex.

@YamatoSecurity
Copy link
Contributor Author

@fukusuket Can you put WELA.ps1 in the root folder instead of inside config.

Right now, since we only look at Security the utilization percent will be high but as we add (especially Sysmon at the end) more, it will decrease over time.

@fukusuket
Copy link
Collaborator

@YamatoSecurity
I moved WELA.ps! I see! I'm looking forward to the next issue being opened! :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request high priority
Projects
None yet
Development

No branches or pull requests

2 participants