[BUG] Rule Keys are are different in Log Explorer and rulesets causing no alerts #820
Replies: 6 comments 1 reply
-
@c3s4rfred please check it. |
Beta Was this translation helpful? Give feedback.
-
@thedunston please provide more information/evidence related to the issue (screenshots, sample logs, ...). |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Any updates on this issue? Alerting is critical. |
Beta Was this translation helpful? Give feedback.
-
That rule was created based on example logs we got in our lab. And the field names in the example logs are the ones we included in the rule. If for some reason in your instance you are receiving data in different fields you can make a copy of the rule and add it in an additional folder outside of the system rules folder so that it is not removed during upgrades. I will move this to the discussions as we do not identify this as a bug. |
Beta Was this translation helpful? Give feedback.
-
You all wrote code to pull the latest rules from the GitHub repo: https://github.com/utmstack/UTMStack/blob/main/correlation/rules/update.go which also contains the |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Describe the bug
I am using UTMStack 10.5.6. I got it setup in a VM and the install went smoothly. I was able to login, I don't see any errors. However, I noticed that there were no alerts being generated. I reviewed the rules and tried generating events and nothing happened.
I then noticed that the key of the rules in the "Log Explorer" view and the "Manage Correlation rules" have a few differences. The rules below:
logx.wineventlog.event_data.ParentProcessName => logx.wineventlog.event_data.ParentImage
logx.wineventlog.event_data.ProcessName => logx.wineventlog.event_data.Image
are of interest. On the left, is what is in the
rules
for windows events, but on the right is what theLog Explorer
is mapping the log key too. Once I updated all the windows based events, then I started getting alerts. Namely, theParentProcessName
andProcessName
are being logged asParentImage
andImage
, respectively.I also see that the logs are very similar to Sigma Rules. Can you all create a parser for Sigma rules to the UTMStack format or use the Sigma Rule format?
To Reproduce
Steps to reproduce the behavior:
Log Explorer
and search for an event inlogx.wineventlog
.Manage correlation rules
System => windows
and open a rule. You'll notice theLog Explorer
key is different than the rule forProcessName
andParentProcessName
.Possible solution
he rules need to be updated to reflect that change for
logx.wineventlog
.Beta Was this translation helpful? Give feedback.
All reactions