2018-11-19 06:28 AM
Hello everyone,
can anyone say me,
whats the difference between Incident rules, ESA rules, NetWitness rules?
2018-11-19 08:46 AM
Mohammed
There are many types of alert rules within the system. Netwitness rules could come in the form of the following:
Application Rules - These look for specific values in logs or network sessions and the result is meta is added to the system. For example, when you have a session that has a source address of 1.2.3.4 and a destination port of 80 add the word "suspicious" into the meta key "alert.id"
Reporting Engine Alert Rules - These are similar to an application rule, however the main function is to provide an output action, such as sending an email or a syslog message. Reporting engine rules are very limited as they can not look for sequences, such as a Log in to a VPN system followed by a windows log in.
ESA Rules - The ESA engine is a full Correlation engine with very few limitations. Rules looking for patterns or sequences are written here, as well as more complex rules.
Incident rules are run within the Respond module. Think of these rules as correlation rules run on top of existing rules that have triggered. For example aggregate all rules that have fired for my CEO and group them into a single incident.
Hope this helps
Dave
2018-11-19 09:16 AM
Thank You..! Dave
Friday
Hello DaveGlover,
Can we create an email notification for any generated alert ID? For example, if a user is added to Active Directory, I need an email notification instead of a scheduled report.