OSSEC Alert: Attack detected

This rule is part of a beta feature. To learn more, contact Support.
This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when an OSSEC alert of level 15 is raised.

Strategy

This rule monitors OSSEC logs for an alert classified as level 15. OSSEC rules are classified in multiple levels, from the lowest (00) to the maximum level 16. Level 15 references a ‘severe attack’ and immediate attention is necessary.

Triage and Response

  1. Check the attack detected for the system: {{@syslog.hostname}}.
  2. Analyze the rule that triggered, the brief description, and message attached with the log:
    • Rule ID: {{@rule_id}}
    • Description: {{@description}}
    • Log Message: {{@log}}
  3. Contact the system administrator immediately to perform the necessary actions to mitigate the cause. This attack requires urgent attention and this rule has no chance of generating false positives.
PREVIEWING: rtrieu/product-analytics-ui-changes