This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Discussions
  • NetWitness Community
  • Discussions
  • Report rules based on alert root events
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page

Report rules based on alert root events

PavelIusco
PavelIusco Contributor
Contributor
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2020-06-11 08:06 AM

Hello,

 

Is there a way in which you can generate reports/dashlets based on the root event(s) that caused an alert?

Rules using Respond DB as a source will not help since they are lacking in granularity. I want to generate some rules that will take the username, ip.src and device.id of the alert generators, this is not hard if you have simple rules that generate the alerts but becomes really impractical when you have complex correlation rules (as an example, i would like to report on the user.dst and ip.src from the root events that fired the "Multiple failed logins followed by a successful login" rule).

 

Any suggestion is greatly appreciated,

 

Pavel

  • Community Thread
  • Discussion
  • ESA Rules
  • Forum Thread
  • NetWitness
  • NW
  • NWP
  • Reporting Engine
  • respond
  • RSA NetWitness
  • RSA NetWitness Platform
0 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
3 REPLIES 3

WaleedAhmed
Contributor WaleedAhmed Contributor
Contributor
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2020-06-11 08:20 AM

The simplest approach I can think of is forwarding the alert as syslog to a decoder and including, for example, the username, ip.source and device.id in the syslog template.

You will then be able to report on the alert meta while including the username,ip.src and device.id from the alert events.

0 Likes
Share
Reply

PavelIusco
PavelIusco Contributor
Contributor
In response to WaleedAhmed
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2020-06-11 08:43 AM

Thank you for your reply.

I had this option in mind. I was hoping there would be a better way than creating a syslog template for almost each ESA alert, since some alerts require information gathered from multiple events and you will need multiple templates containing, as an example, (shost=${events[0].host_src!" "})  where the events[0] becomes events[1], and, as a consequence, the templates will quickly become hard to manage/maintain.

I will give this option a try and see how feasible it is

0 Likes
Share
Reply

PavelIusco
PavelIusco Contributor
Contributor
In response to WaleedAhmed
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2020-06-15 04:37 AM

Hello,

I have come with a, in my opinion, more universal solution for this problem and i would like your thoughts for this.

I have made ESA forward the sessionid of the root events in the alert and then i am taking those root events, putting them in a new metakey called sessionid.alert. I will, therefore, use reporting engine in order to create a list that has the sessionid's of the root events and use that in order to create further rules.

 

I have also created an Ideea based on this:

 

 

Also, I have changed the name of this question so it better reflects the actual intent.

0 Likes
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.