Skip to content

Adding event data to SIEM alerting actions #66587

@aarju

Description

@aarju

Describe the feature:
As a security analyst often use my mobile device to keep an eye on high priority and critical alerts during off hours via slack. I want to have as much information as possible in my slack messages about an alert.

Describe a specific use case for the feature:
In Infosec we currently use watchers to send alerts to slack. Within the watcher context we can access the field values of the events that triggered the watch using the ctx.payload Here are some examples of slack output we currently use in watcher:

This is a generic example from one of our linux process rules:

{{#ctx.payload._value}}\n - {{@timestamp}} - `{{user.name}}` executed `{{process.title}}` on `{{agent.hostname}}` in `{{fields.team}}`\n\n{{/ctx.payload._value}}"

In this example we send Endgame alert information and include a link to VirusTotal and another link to the alert in the Endgame SMP:

{{#ctx.payload._value}}\n - `At {{@timestamp}}` - MalwareScore:`{{endgame.data.malware_classification.score}}` - `{{endgame.data.file_name}}` - `{{endgame.data.file_operation}}` by `{{endgame.data.alert_details.acting_process.exe}}` on `{{host.name}}` <https://endgamesmp/alerts/{{endgame.metadata.message_id}}|SMP Link> - <https://www.virustotal.com/gui/file/{{endgame.data.hashes.sha256}}|VT Link>\n\n{{/ctx.payload._value}}

Metadata

Metadata

Assignees

Labels

Feature:Detection RulesSecurity Solution rules and Detection EngineTeam: SecuritySolutionSecurity Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.Team:SIEMenhancementNew value added to drive a business resultv7.11.0

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions