How to create custom filter rules to filter out innocuous events
Technical Articles ID:
KB74834
Last Modified: 10/19/2022
Last Modified: 10/19/2022
Affected Products
Languages:
This article is available in the following languages:
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
How to create custom filter rules to filter out innocuous events
Technical Articles ID:
KB74834
Last Modified: 10/19/2022 Environment
SIEM Enterprise Security Manager (ESM) 11.x SIEM Event Receiver (Receiver) 11.x SummaryThe ESM uses Perl Compatible Regular Expressions (PCRE) when creating specific filter (discard) rules. This article describes how to create filter rules that tag matched events from a custom rule with a Do not parse tag. This tag prevents the event from getting added to the data source's data file for parsing.
NOTE: This article assumes that you're familiar with the
The following PCRE expression looks for one of the event codes listed inside the brackets and then another field in the message text containing one of two strings. The specific strings are Account Name or User Name. They're followed by a string of characters, spaces, or tabs before the final $ sign at the end of the User or Account name. The $ sign indicates that the events are computer-generated logon events that occur all day, every day, on Windows systems. They aren't useful in forensics reports, but are more useful to search for user account names that contain the source workstation name or IP address in the message text of the event.
The following PCRE expression looks for Microsoft Windows event code 4771 and a text string of characters after 4771 has been detected. This
The following PCRE expression looks for a specific text string listed in the message text of a Windows event. In the following example, it looks for Windows Filtering Platform in the message text and takes the appropriate route. (Send to ELM or discard. No route):
The following PCRE expression looks for a text string 'outside' followed by any number of characters until the first three octets of an IP address 64.39.111 are detected. In the following example, it would include any events with the text string 'outside' and any IP address that matches the first three octets:
Related Information
These websites are useful for testing your Affected ProductsLanguages:This article is available in the following languages: |
|