Hello everyone,
How can I correlate two alerts into a third one?
For instance:
I have alert 1 and alert 2 both with medium severity.
I need the following validation in alert 3:
If, after 6 hours since alert 1 was triggered, alert 2 is triggered as well, generate alert 3 with high severity.
Alerts are based on results of a search - for an alert to be triggered based on two conditions, your search needs to find both conditions.
I understand. You can make a little progress using the strategy of pulling alerts that are triggered. My research is as follows:
index=_audit action="alert_fired" ss_app=search ss_name="alert 1" OR ss_name="alert 2"
| rename ss_name AS title
| stats count by title, ss_app, _time
| sort -_timeIn this research I can bring up the two alerts that I want to combine. Is it possible to get certain fields from these two alerts?
In this case, I want to get the user. I can only generate the alert if the user is the same, the problem is that there are two different log providers and therefore, the field that has the user value has different names.
Hi @matheusvortex ,
you could write the results of the two searches in one summary index (called e.g. Notables), adding in each alert all the fields you need and then execute the third alert on the summary index displaying the fields you need.
Ciao.
Giuseppe
This is the approach of Enterprise Security.
Could you support me, what would this research look like?
I understand. I managed to make a little progress using the strategy of pulling through triggered alerts. My research is as follows:******