IBM Security QRadar

 View Only
  • 1.  Rule did not trigger Offense

    Posted Thu March 30, 2023 09:12 AM

    Hi Community,

    We have a basic rule that would trigger an offense and send an email notification whenever a Severity 7 or higher events are triggered from Carbon Black.

    Below is the rule logic:

    and when the event(s) were detected by one or more of CarbonBlackCloudCustom @ localhost
    and when the event matches Alert Category (custom) is any of THREAT
    and when the event matches CB Severity (custom) is any of [7 or 8 or 9]

    Very basic rule, has been working as expected since forever. I ran a search in Log Activity using the same logic and did find a Sev8 event from this morning for which it should have triggered an Offense.

    I did ran a sample test rule and it fired an Offense right away, as expected. What could be wrong with this particular rule for it to not trigger an Offense?

    Thanks in Advance.

    Sahil



    ------------------------------
    sahil arora
    ------------------------------


  • 2.  RE: Rule did not trigger Offense

    Posted Thu March 30, 2023 09:22 AM
    Dear Sahil,

    if i understand correctly, your rule is not firing an offense, but the same search criteria is working in the log activity tab. In this case I would suggest disabling and enabling the rule 1-2 times. this should fire an offense.

    if Disabling and Enabling of rule is not worked expected. then enable the rule and restart the ecs-ep process from CLI.

    Thanks & Regards,
    Jaswinder Singh









  • 3.  RE: Rule did not trigger Offense

    Posted Mon April 10, 2023 03:08 AM

    Hi, 
    I am also facing a similar problem, the rule is to run alerts for a few events but not for another similar event.
    I have tried to disable and enable, restarted the ecs-ep, and duplicated the rule.

    Any solution found to resolve this issue?


    Thanks



    ------------------------------
    Arunkumar R
    ------------------------------



  • 4.  RE: Rule did not trigger Offense

    Posted Mon April 10, 2023 11:32 AM

    Hi Arun,

    What worked in our case was under Rule Action, 'Index offense based on' was referring to a property that was no longer valid. After changing the property the rule was fixed and offense is working now.



    ------------------------------
    sahil arora
    ------------------------------



  • 5.  RE: Rule did not trigger Offense

    Posted Tue April 11, 2023 05:17 AM

    Which property are you using for indexing the offense in Rule Action and Rule Response? If the property doesn't have a value, the rule will fail to create an offense when it triggers.



    ------------------------------
    Raphaël Langella
    SIEM Architect
    IMS Networks
    ------------------------------



  • 6.  RE: Rule did not trigger Offense

    Posted Tue April 11, 2023 06:41 AM

    Hi,
    Index offense based on Hostname (custom), attached the event and rule wizard snapshots.  All the criteria are the same as an alert created event, but the event is not marked as expected.


    Thanks



    ------------------------------
    Arunkumar R
    ------------------------------



  • 7.  RE: Rule did not trigger Offense

    Posted Fri March 31, 2023 08:44 AM

    Hi Sahil,
    did you check the event if it matches a false positivePositive rule? I had this once where the source was in such a BB hence Rule. In my case it was in the "BB:HostDefinition: VA Scanner Source IP". Such a rule will be evaluated first and the action is not to create an event and this will also create no offense.
    Good luck and have a great day!
    Martin



    ------------------------------
    Martin Schmitt
    ------------------------------