You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 4, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: Correlation Rules/CustomizableRules.md
+75-49Lines changed: 75 additions & 49 deletions
Original file line number
Diff line number
Diff line change
@@ -7,10 +7,32 @@ nav_order: 3
7
7
8
8
# Customizable Rules
9
9
10
-
UTMStack allows users to define customizable rules to enhance the monitoring and alerting based on specific requirements of their network environments. Below are a few examples of such customizable rules, each tailored for different use-cases:
10
+
UTMStack allows users to define customizable rules to enhance the monitoring and alerting based on specific requirements of their network environments.
11
11
12
-
## Rule 1: Whitelist of Internal IPs
13
-
Users can define a whitelist of internal IPs that are considered safe. Any activity detected from IPs not in this whitelist will trigger an alert.
12
+
## Follow these steps:
13
+
14
+
1. Access the directory where the system correlation rules are located.
4. Check that they are correctly placed and that their names match the system rules you want to modify.
24
+
25
+
## Modifying system rules:
26
+
27
+
If you need to adjust a system rule, simply create a new custom rule with the same name as the system rule you wish to modify. This will allow your custom rule to take precedence over the original system rule.
28
+
29
+
## Rule Priority:
30
+
31
+
Remember that if there is a custom rule and a system rule with the same name, the custom rule will be used instead of the system rule. This ensures that your settings take priority and are applied by the system instead of the default rules.
32
+
33
+
Below are a few examples of such customizable rules, each tailored for different use-cases:
34
+
35
+
## 1. Windows: Activity detected from non-whitelisted internal IPs
14
36
15
37
### YAML Configuration:
16
38
```yaml
@@ -19,7 +41,8 @@ Users can define a whitelist of internal IPs that are considered safe. Any activ
19
41
description: "Activity has been detected from an IP that is not on the whitelist of allowed internal IPs"
20
42
solution: "We recommend carefully reviewing the logs to verify activity from an IP that is not on the whitelist of allowed internal IPs"
21
43
category: "Connection from non-whitelisted"
22
-
tactic: ""
44
+
tactic: "Exfiltration"
45
+
dataTypes: ["wineventlog"]
23
46
reference:
24
47
- "https://en.wikipedia.org/wiki/Whitelist"
25
48
frequency: 60
@@ -36,26 +59,31 @@ Users can define a whitelist of internal IPs that are considered safe. Any activ
In this rule, an alert is generated if there is any activity detected from IPs not listed in the whitelist 10.0.2.27,192.168.22.128,fe80::97d1:5df4:10fe:7b8d.
73
+
In this rule, users can define their whitelist of internal IPs. As an example, you have the internal IPs whitelist 10.0.2.27,192.168.22.128,fe80::97d1:5df4:10fe:7b8d Which you can change to your list
74
+
47
75
48
-
## Rule 2: Whitelist of Allowed Applications
49
-
Users can define a whitelist of applications that are permitted to run on the servers. Any activity detected from applications not in this whitelist will trigger an alert.
76
+
## 2. Windows: Detected application that is not in the white list of allowed applications
50
77
51
78
### YAML Configuration:
52
-
```yml
79
+
```yaml
53
80
- name: "Windows: Detected application that is not in the white list of allowed applications"
54
81
severity: "High"
55
82
description: "This alert is generated when an application that is not on the white list of allowed applications is detected."
56
83
solution: "We recommend carefully reviewing the logs to verify applications that are not whitelisted"
57
84
category: "Connection from non-whitelisted"
58
85
tactic: ""
86
+
dataTypes: ["wineventlog"]
59
87
reference:
60
88
- "https://en.wikipedia.org/wiki/Whitelist"
61
89
frequency: 60
@@ -78,28 +106,30 @@ Users can define a whitelist of applications that are permitted to run on the se
In this rule, an alert is generated if any application other than svchost.exe, services.exe, or poqexec.exe is detected running on the servers.
89
-
90
-
## Rule 3: Whitelist of IPs for Microsoft 365 Logins
119
+
### Example
120
+
In this rule, users can define their whitelist of applications that are allowed to be on the servers and have activity. As an example, you have the whitelist of applications (svchost.exe|services.exe|poqexec.exe), which you can change to your list
91
121
92
-
Users can define a whitelist of IPs from which logins to Microsoft 365 are allowed. Any login attempts from IPs not in this whitelist will trigger an alert.
122
+
## 3. Microsoft 365: Login detected from non-whitelisted IP
93
123
94
124
### YAML Configuration:
95
-
96
-
```yml
125
+
```yaml
97
126
- name: "Microsoft 365: Login detected from non-whitelisted IP"
98
127
severity: "High"
99
128
description: "A user is trying to login from an IP that is not on the whitelist"
100
129
solution: "We recommend carefully reviewing the logs to verify users attempting to login from an IP that is not on the whitelist"
101
130
category: "Connection from non-whitelisted"
102
131
tactic: ""
132
+
dataTypes: ["o365"]
103
133
reference:
104
134
- "https://en.wikipedia.org/wiki/Whitelist"
105
135
frequency: 60
@@ -124,57 +154,51 @@ Users can define a whitelist of IPs from which logins to Microsoft 365 are allow
124
154
125
155
```
126
156
127
-
### Example
128
-
In this rule, an alert is generated if a user tries to login to Microsoft 365 from any IP other than 163.225.184.79, 92.22.1.40, 19.144.24.179, 37e4:dd49:a173:02f4:3164:1df0:8849:6ef9.
129
-
130
-
131
-
## Rule 4: Whitelist of Allowed Users for Microsoft 365 Activity
157
+
### Example
158
+
In this rule, you can define their whitelist of IPs. As an example, you have the ips whitelist 163.225.184.79,92.22.1.40,19.144.24.179,37e4:dd49:a173:02f4:3164:1df0:8849:6ef9 which you can change to your list
132
159
133
-
Users can define a whitelist of user accounts that are allowed to have activity in Microsoft 365. Any activity from user accounts not in this whitelist will trigger an alert.
160
+
## 4. Microsoft 365: Detected user activity that is not in the white list of allowed users
134
161
135
162
### YAML Configuration:
136
-
137
-
```yml
138
-
- name: "Microsoft 365: Activity detected from non-whitelisted user"
163
+
```yaml
164
+
- name: "Microsoft 365: Detected user activity that is not in the white list of allowed users"
139
165
severity: "High"
140
-
description: "Activity has been detected from a user that is not on the whitelist"
141
-
solution: "We recommend carefully reviewing the logs to verify activity from a user that is not on the whitelist"
166
+
description: "This alert is generated when a user is detected that is not on the white list of allowed users."
167
+
solution: "We recommend carefully reviewing the logs to verify users who are not whitelisted."
In this rule, an alert is generated if any activity is detected from user accounts other than john.doe@example.com or jane.doe@example.com in Microsoft 365.
184
+
- field: "logx.o365.ClientIP"
185
+
alias: "SourceIP"
164
186
165
-
## Rule 5: Windows User Activity Outside Whitelist Detected
187
+
```
188
+
### Example
189
+
In this rule, you can define your whitelist of users who can have activity. As an example, you have the whitelist of users cafroixeunnouxe-7608@yopmail.com,bineppohuno-6676@yopmail.com,keven_mohr@gmail.com which you can change to your list
166
190
167
-
In this rule, you can define a whitelist of users who are authorized to carry out activities on the Windows environment. For instance, the whitelist of users is specified as cafroixeunnouxe-7608@yopmail.com, bineppohuno-6676@yopmail.com, and keven_mohr@gmail.com, which can be tailored to match your list of authorized users. Users should be delineated by commas.
191
+
## 5. Windows: Detected user activity that is not in the white list of allowed users
168
192
169
193
### YAML Configuration:
170
-
171
-
```yml
194
+
```yaml
172
195
- name: "Windows: Detected user activity that is not in the white list of allowed users"
173
196
severity: "High"
174
197
description: "This alert is generated when a user is detected that is not on the white list of allowed users."
175
198
solution: "We recommend carefully reviewing the logs to verify users who are not whitelisted."
176
199
category: "Connection from non-whitelisted"
177
200
tactic: ""
201
+
dataTypes: ["wineventlog"]
178
202
reference:
179
203
- "https://en.wikipedia.org/wiki/Whitelist"
180
204
frequency: 60
@@ -188,12 +212,14 @@ In this rule, you can define a whitelist of users who are authorized to carry ou
In this rule configuration, an alert is triggered whenever user activity is detected from accounts other than those listed in the whitelist: cafroixeunnouxe-7608@yopmail.com, bineppohuno-6676@yopmail.com, and keven_mohr@gmail.com. The aim is to promptly identify and respond to potential unauthorized access or malicious activities by unlisted users within the Windows environment.
224
+
### Example
225
+
In this rule, you can define your whitelist of users who can have activity. As an example, you have the whitelist of users cafroixeunnouxe-7608@yopmail.com,bineppohuno-6676@yopmail.com,keven_mohr@gmail.com which you can change to your list
0 commit comments