IBM QRadar: Rules: Difference between revisions
Line 10: | Line 10: | ||
* [https://github.com/SigmaHQ/sigma (Github) Sigma - Generic Signature Format for SIEM Systems] | * [https://github.com/SigmaHQ/sigma (Github) Sigma - Generic Signature Format for SIEM Systems] | ||
* [https://github.com/Xboarder56/QRCE-Rules Open Source Rules for QRadar QRCE] | * [https://github.com/Xboarder56/QRCE-Rules (Github) Open Source Rules for QRadar QRCE] | ||
= Exemplos = | = Exemplos = |
Latest revision as of 19:51, 2 March 2025
Uma Rule (regra) é um grupo de testes que podem desencadear uma ação se condições específicas forem atendidas.
Artigos
Exemplos
Exemplos
Rule | Description |
---|---|
Apply Potential Windows Enumeration Detected |
Comandos que hackers pegam informações em servidores MS Windows |
Apply Login After Work Hours |
Login após horário de trabalho |
Apply Disk Space Alert |
Alerta de Falta de Espaço em Disco |
Apply No Events on the last 2 hours |
Log Source sem eventos a 2 horas |
Apply Alert about dropped events |
Alerta sobre eventos descartados |
Exemplo: (Github) Sigma - Curl Download And Execute Combination
title: Curl Download And Execute Combination ... selection: CommandLine|contains|windash: ' -c ' CommandLine|contains|all: - 'curl ' - 'http' - '-o' - '&' condition: selection
And in IBM QRadar Rule:
Apply Curl Download And Execute Combination and when an event matches any of the following BB: Windows Endpoint Events and when the event matches Event ID is any of 4688 and when the event matches Command (custom) contains all of [/c or curl or http or -o or &]