You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
rule_733102_733103 Threat-detection %{word:action} host %{ipOrHost:host} (to|from) shun list
206
210
207
-
rule_733104_733105 %{word:protocol} Intercept SYN flood attack detected to %{ip:network.destination.ip}/%{port:network.destination.port}%{_space}\(%{ip:network.client.ip}/%{port:network.client.port}\). %{word:rate_type} rate of %{number:rate} %{notSpace:rate_unit} exceeded the threshold of %{number:rate_threshold}
211
+
rule_733104_733105 %{word:protocol} Intercept SYN flood attack detected to %{ip:network.destination.ip}/%{port:network.destination.port}\s*\(%{ip:real_ip}/%{port:real_port}\). %{word:rate_type} rate of %{number:rate} %{notSpace:rate_unit} exceeded the threshold of %{number:rate_threshold}
208
212
- type: pipeline
209
213
name: User Authentication
210
214
enabled: true
@@ -231,16 +235,16 @@ pipeline:
231
235
supportRules: ""
232
236
matchRules: >-
233
237
rule_109005_109006 Authentication %{notSpace:evt.outcome} for user
234
-
'%{data:usr.name}' from
238
+
'%{regex("[^']*"):usr.name}' from
235
239
%{ip:network.client.ip}/%{port:network.client.port} to
236
240
%{ip:network.destination.ip}/%{port:network.destination.port} on
237
241
interface %{data:interface}
238
242
239
-
rule_109010 Auth from %{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port} %{notSpace:evt.outcome} \(%{data:reason}\) on interface %{data:interface}
243
+
rule_109010 Auth from %{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port} %{notSpace:evt.outcome} \(%{regex("[^\\)]*"):reason}\) on interface %{data:interface}
240
244
241
-
rule_109023 User from %{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port} on interface %{data:interface} using %{data:service_name} must authenticate before using this service
245
+
rule_109023 User from %{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port} on interface %{regex(".*(?= using )"):interface} using %{regex(".*(?= must authenticate)"):service_name} must authenticate before using this service
242
246
243
-
rule_109033_109034 Authentication %{notSpace:evt.outcome} for %{notSpace:user_type} user %{data:usr.name} from (%{ip:network.client.ip}|%{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port}). Interactive challenge processing is not supported for %{notSpace:protocol}( connections)?
247
+
rule_109033_109034 Authentication %{notSpace:evt.outcome} for %{notSpace:user_type} user %{regex(".*(?= from )"):usr.name} from (%{ip:network.client.ip}|%{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port}). Interactive challenge processing is not supported for %{notSpace:protocol}( connections)?
244
248
- type: pipeline
245
249
name: User Authorization
246
250
enabled: true
@@ -267,12 +271,12 @@ pipeline:
267
271
supportRules: ""
268
272
matchRules: >-
269
273
rule_109007_109008 Authorization %{word:evt.outcome} for user
270
-
'%{data:usr.name}' from
274
+
'%{regex("[^']*"):usr.name}' from
271
275
%{ip:network.client.ip}/%{port:network.client.port} to
272
276
%{ip:network.destination.ip}/%{port:network.destination.port} on
273
277
interface %{data:interface}
274
278
275
-
rule_109024_109025 Authorization %{word:evt.outcome} (\(acl=%{data:acl_id}\) for user '%{data:usr.name}' )?from %{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port} (\(not authenticated\) )?on interface %{data:interface} using %{notSpace:protocol}( to)?
279
+
rule_109024_109025 Authorization %{word:evt.outcome} (\(acl=%{regex("[^\\)]*"):acl_id}\))?( for user '%{regex("[^']*"):usr.name}' )?from %{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port} (\(not authenticated\) )?on interface %{regex(".*(?= using )"):interface} using %{notSpace:protocol}( to)?
rule_110004 %{regex("Egress interface changed"):reason} from %{data:old_interface} to %{data:new_interface} on %{notSpace:protocol} connection %{number:connection_id} for %{notSpace:outside_interface_zone}%{_space}/%{_space}%{notSpace:outside_interface}%{_space}:%{ip:outside_ip}%{_space}/%{_space}%{port:outside_port}%{_space}\(%{ip:outside_mapped_ip}%{_space}/%{_space}%{port:outside_mapped_port}%{_space}\) to %{notSpace:inside_interface_zone}%{_space}/%{_space}%{notSpace:inside_interface}%{_space}:%{ip:inside_ip}%{_space}/%{_space}%{port:inside_port}%{_space}\(%{ip:inside_mapped_ip}%{_space}/%{_space}%{port:inside_mapped_port}%{_space}\)
374
+
rule_110004 %{regex("Egress interface changed"):reason} from %{regex(".*(?= to )"):old_interface} to %{regex(".*(?= on )"):new_interface} on %{notSpace:protocol} connection %{number:connection_id} for %{notSpace:outside_interface_zone}\s*/\s*%{_parse_till_colon:outside_interface}\s*:%{ip:outside_ip}\s*/\s*%{port:outside_port}\s*\(%{ip:outside_mapped_ip}\s*/\s*%{port:outside_mapped_port}\s*\) to %{notSpace:inside_interface_zone}\s*/\s*%{_parse_till_colon:inside_interface}\s*:%{ip:inside_ip}\s*/\s*%{port:inside_port}\s*\(%{ip:inside_mapped_ip}\s*/\s*%{port:inside_mapped_port}\s*\)
369
375
- type: pipeline
370
376
name: Identity Firewall
371
377
enabled: true
@@ -386,17 +392,17 @@ pipeline:
386
392
memory"
387
393
- "user-identity: identity_lookup_store started"
388
394
grok:
389
-
supportRules: _space %{regex("(\\s)*"):}
395
+
supportRules: ""
390
396
matchRules: >-
391
397
rule_746005 user-identity: The AD Agent %{ip:network.client.ip}
rule_106002 %{notSpace:protocol} Connection denied by outbound list %{notSpace:outbound_list} src %{ip:network.client.ip} dest %{ip:network.destination.ip}
454
460
@@ -491,15 +497,15 @@ pipeline:
491
497
local list: mycoolapp-preview.mock, threat-level: 0, category:
0 commit comments