IBM QRadar: Rules: Difference between revisions

From Wiki
Line 32: Line 32:
|
|
Apply '''Disk Space Alert'''</br>
Apply '''Disk Space Alert'''</br>
'''and''' when the event QID is one of the following '''(38750076) Disk Sentry Disk Usage Exceed Warn Threshold''','''(38750038) Disk sentry disk usage exceeded threshold'''
'''and''' when the event QID is one of the following </br> '''(38750076) Disk Sentry Disk Usage Exceed Warn Threshold''',</br>  '''(38750038) Disk sentry disk usage exceeded threshold'''
||
||
Login após horário de trabalho
Alerta de Falta de Espaço em Disco
|-
|-
| . || .
| . || .

Revision as of 18:42, 31 January 2025

Uma Rule (regra) é um grupo de testes que podem desencadear uma ação se condições específicas forem atendidas.


Artigos

Exemplos

Rule Description

Apply Potential Windows Enumeration Detected
and when an event matches any of the following BB: Windows Endpoint Events
and when the event matches Event ID is any of 4688
and when the event matches Command (custom) any of [whoami or tasklist or system info]
and NOT when the source OP is on of the following IP addresses

Comandos que hackers pegam informações em servidores MS Windows

Apply Login After Work Hours
and NOT when the event occur between 09:00 AND 17:00
and when an event were detected by on or more of Netgate pfSense
and when the event QID is one of the following (11xx) pfSense - Login on console

Login após horário de trabalho

Apply Disk Space Alert
and when the event QID is one of the following
(38750076) Disk Sentry Disk Usage Exceed Warn Threshold,
(38750038) Disk sentry disk usage exceeded threshold

Alerta de Falta de Espaço em Disco

. .

Exemplo: (Github) Sigma - Curl Download And Execute Combination

title: Curl Download And Execute Combination
...
selection:
  CommandLine|contains|windash: ' -c '
  CommandLine|contains|all:
    - 'curl '
    - 'http'
    - '-o'
    - '&'
condition: selection

And in IBM QRadar Rule:

Apply Curl Download And Execute Combination
and when an event matches any of the following BB: Windows Endpoint Events
and when the event matches Event ID is any of 4688
and when the event matches Command (custom) contains all of [/c or curl or http or -o or &]

Ver também