This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Discussions
  • NetWitness Community
  • Discussions
  • Rule configuring/customazation
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page

Rule configuring/customazation

HaroldTsatsi
HaroldTsatsi New Contributor
New Contributor
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2018-06-11 03:52 AM

is it possible in security analytics(packet capture)to trigger a specific event for a specific IOC like'31.148.219.177' & 'ptsecurity.com'?

Labels:
  • Labels:
  • RSA NetWitness Orchestrator
  • Community Thread
  • Discussion
  • Forum Thread
  • NetWitness
  • NetWitness Orchestrator
  • NW
  • NWO
  • NWP
  • Orchestration
  • Orchestrator
  • RSA NetWitness
  • RSA NetWitness Orchestrator
  • RSA NetWitness Platform
  • SOAR
0 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
3 REPLIES 3

EmmanueleLaPort
EmmanueleLaPort Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2018-06-11 04:14 AM

Hello Harold,

 

https://community.rsa.com/docs/DOC-83630 

 

Please use the App rules.

The way should be:
ip.dst='yourIP' && url='ptsecurity.com' -->
This triggers an alert on alert.id with the name you specify in the apprule.

 

To find the correct syntax investigate the meta from the investigator select them and then do copy and paste.

0 Likes
Share
Reply

HaroldTsatsi
HaroldTsatsi New Contributor
New Contributor
In response to EmmanueleLaPort
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2018-06-11 04:27 AM

if possible would you please share the correct syntax,then will replace that with the IOC i have?

0 Likes
Share
Reply

Arasnick
Arasnick Contributor
Contributor
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2018-07-18 09:58 AM

If you are creating an app rule, you could call it "PTsecurity alert":

Condition - ip.dst = 31.148.219.177 && alias.host = "ptsecurity.com" 

 

Check Stop Rule Processing, and pick what your intentions are with the session (Keep/Filter/Truncate), Check Alert and Alert on Alert so it shows up under the Alert key in your Investigator module.

0 Likes
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.