Correlation Rules to Meaningful Alert? #1011
Unanswered
hackdefendr
asked this question in
Q&A
Replies: 1 comment 2 replies
-
Hi @hackdefendr the rules are grouped and named by datasource type, the only thing you have to do is send logs to the platform according to the rules that you want to check, for example: windows agent integration (sends windows event logs) -> windows rules. So, first you have to check the rules folder and then, send logs that matches the rules (the matching rules will raise). Best regards |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I see all of the SYSTEM Correlation rules, but I have no idea what to do with them. I'm an experienced cybersecurity professional and system administrator, but I am at a loss here. I would expect that I should be able to edit a SYSTEM rule, customize it, save it, and start it some how. I am probably missing something.
For example:
/data/alert/alert-rule-management
is empty. How do I put rules in there so they become meaningful alerts?Regards,
Jeff
Beta Was this translation helpful? Give feedback.
All reactions