OSSEC Alert: Possible attack detected

This rule is part of a beta feature. To learn more, contact Support.
This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when an OSSEC alert of level 13 or 14 is raised.

Strategy

This rule monitors unusual and high importance events with severity level 13 or 14. OSSEC rules are classified in multiple levels, from the lowest (00) to the maximum level 16.

  • Severity level 13 signifies Unusual error (high importance) - Most of the times it matches a common attack pattern.
  • Severity level 14 signifies High importance security event - Most of the times done with correlation and indicative of an attack.

Triage and Response

  1. Check the attack detected for the system: {{@syslog.hostname}}.
  2. Analyze the rule that triggered, the brief description, and message attached with the log:
    • Rule ID: {{@rule_id}}
    • Description: {{@description}}
    • Log Message:{{@log}}
  3. Contact your system administrator in order to perform the necessary actions to mitigate the issue.
PREVIEWING: Cyril-Bouchiat/add-vm-package-explorer-doc