OSSEC Alert: Possible attack detected

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when an OSSEC alert of level 13 or 14 is raised.

Strategy

This rule monitors unusual and high importance events with severity level 13 or 14. OSSEC rules are classified in multiple levels, from the lowest (00) to the maximum level 16.

  • Severity level 13 signifies Unusual error (high importance) - Most of the times it matches a common attack pattern.
  • Severity level 14 signifies High importance security event - Most of the times done with correlation and indicative of an attack.

Triage and Response

  1. Check the attack detected for the system: {{@syslog.hostname}}.
  2. Analyze the rule that triggered, the brief description, and message attached with the log:
    • Rule ID: {{@rule_id}}
    • Description: {{@description}}
    • Log Message:{{@log}}
  3. Contact your system administrator in order to perform the necessary actions to mitigate the issue.
PREVIEWING: rtrieu/product-analytics-ui-changes