Hi Community,
I configured a rule to monitor whether log sources stopped sending events.
As Rule Action, I created an Event that triggers an offense. As offense source, I chose "Source IP".
My expectation: For every Log Source which stopped sending events, there will be an offense.
Reality: For Log Sources whose Identifier is an IP, this will work fine. However, for log sources whose Identifier is something else such as Hostname an offense will be created with source ip 0.0.0.0. Everytime one of those log sources stops sending events, this offense indexed by 0.0.0.0 is updated.
I then noticed that the CRE event that I created contains the name of the Log Source. Something like "Log source ' WindowsAuthServer @ bruno.balacobaco ". I then extracted the property and set it to use it in rules. I then changed my rule as offense Source to use this new property. Whenever QRadar detects that some log source stopped sending events, this event will be generated by CRE and I can see my property there and also that this event matches my rule. However, no offense is created.
For ordinary Events I created some custom properties and configured those as "offense source" for my rules. It worked fine.
Is this an issue? It refers to custom properties within Events generated by the Custom Rule Engine.
Thank you
Regards,
Bruno
------------------------------
BrunoMarX
------------------------------