Creating an Alert Rule

Alert rules can be based on any Logpoint query to check logs for signs of malicious activity or for operational messages and thresholds. Once you create an alert rule, it is automatically shared with the users in the Logpoint Administrator user group.

To create an alert rule:

  1. Go to Settings >> Knowledge Base from the navigation bar and click Alert Rules. Click ADD. Alternatively, you can go to Dashboard or Search Template widget, click the drop down icon. Click Alert. If you are creating an alert rule from a widget, Logpoint automatically adds the widget’s query in the Query field.

    ../_images/LP_DB_Widget_Alert.png

    Creating alert from widgets

  2. Go to Overview and click Edit on the specific field to edit. Alternatively, you can edit from Parameters, Criteria, Meta-Data, Ownership, and Data Template pages in the right.

../_images/LP_KB_AlertRules_Overview_Tab.png

Overview

  1. Enter the Name of the alert.

  2. Enter a Description.

../_images/LP_KB_AlertRules_Parameters_Tab.png

Parameters

  1. In Query, enter an alert query. If Data Privacy is enabled, the values for all the configured Data Privacy Module fields are encrypted. For queries that have specific configured fields values, Logpoint does not generate an incident. However, for the queries that have all their values an incident is generated with encrypted field values. For example, if you have configured the device_name field under the Data Privacy Module, then the query device_name=localhost does not generate any incident. However, the query device_name=* generates the incidents with encrypted values.

Next to the Query field use Browse, Expand, and Search to enter or select a query.

../_images/LP_KB_AlertRules_Query_Helper_Icons.png

Browse, Expand, and Search

  1. Browse

    Clicking Browse takes you to the query picker. It allows you to select a predefined query on which to base the alert rules.

    The queries are:

    • Search History: Lists all the recent search queries executed in Logpoint.

    • Saved searches: Lists all the queries saved by the user.

    • Vendor searches: Lists the predefined queries provided by the vendor.

    • Search Labels: Lists the search labels of Logpoint. Labels are assigned while writing signatures for the logs.

    • Live Searches: Lists the queries used by other created alerts.

    Click Select Query to select the queries from the lists.

    ../_images/LP_KB_AlertRules_Query_Picker.png

    Query Picker

  2. Expand

    If your query is long, click Expand. Click Collapse to return to the default view.

    You can collapse the expanded field by clicking Collapse.

    ../_images/LP_KB_AlertRules_Expanded_Query_Field.png

    Expanded Query Field

  3. Search

    Use it to perform a search using the query you entered. You are redirected to Logpoint search and your query is auto-filled.

  1. Select the Repos to be monitored to match the alert condition. You can also select the repo using Repo Selector by clicking on Advanced Selection.

    ../_images/LP_KB_AlertRules_Repo_Selector.png

    Repo Selector

    In Repo Selector, you can fetch all the repos from remote Logpoints by clicking Fetch Remote.

  2. Select a Query Time-range for the alert. Query Time-range is a time frame within which the search is performed. For example, when the query time range is set to 3 days, Logpoint will search for logs from last 3 days. You can set a time range in either minutes, hours or days. The maximum time range limit is 30 days or its equivalent in hours and minutes.

  3. In Results Limit, enter the maximum number of logs to retrieve using the Query. It is hidden if you enter an aggregation query in the Query field.

  4. If Data Privacy is enabled, you will see Data Privacy Module: Alert Using Original data. This determines whether the data is encrypted or not. By default they are encrypted. To decrypt them, select Alert Using Original Data.

    ../_images/LP_KB_AlertRules_Data_Privacy_Module.png

    Data Privacy Module

  5. Select the Search Interval. If you set the search interval to two, Logpoint performs the search every two minutes.

    • The search interval should be a factor of the Query Time-range value in minutes. Logpoint recommends changing the Search Interval of any previously configured alert rules to the factor of the Query Time-range value in minutes for better performance.

    • The maximum value for the search interval is 1440 minutes, and if the factor of the Query Time-range exceeds this threshold value, then the factor just below it is used. For example, for 2-days (2880 minutes) time range, the maximum usable value is 1440 minutes (24 hours), meaning the search interval can be set to once a day.

    • Search Intervals do not work with correlation queries. Therefore, if you have used a correlation query in the Query field, the search is not performed in the specified Search Interval.

  6. Enter the Delay Alert. Logpoint waits until the delay time passes before processing the logs to ensure that all relevant logs are collected before generating any incidents.

    Important

    • Delay Alert can only be used with log_ts based searches.

    • While defining Search Interval and Delay Alert, we recommend you define the delay alert value in the multiple of the search interval value. For example: If the search interval is 5 min, the recommended delay alert is 5 min, 10 min, 15 min, 20 min and so on.

    • The maximum value of the Delay Alert can be up to 24 hours.

  7. Enable Flush On Trigger to ensure the next alert is triggered only based on a new set of events.

  8. Set Alert Throttling to ensure that Logpoint does not create multiple alerts for the same set of values for a specified time. Enter the Field and the time in Minutes. Once an alert is triggered for a value set of the particular Field, it does not trigger another alert with the same set of values until the time specified minutes has passed.

  9. Go to Criteria.

../_images/LP_KB_AlertRules_Add_Criteria_Tab.png

Criteria

  1. Select the Condition, Risk, and Risk Calculating Function from the dropdowns.

    Based on the Risk level and Risk Calculation Function, Logpoint calculates the Risk Value of the alerts and incidents they generated. If the search result of the query contains the device_ip, the Risk Calculation Function takes the Risk Value of the devices and Risk level of the alert as arguments.

    For example:

    If the Risk level of an alert is Medium, Risk Calculation Function is Maximum, and the Risk Value of its associated device(s) is Critical, the Risk Value of the generated alert and incident is: Maximum(Risk level, Risk value of device(s)). That means the Risk value of the incident is Critical.

    The risk value of a device is calculated from the values of Confidentiality, Availability, and Integrity.

    Whereas for search queries with pipeline commands or without device_ip in the search results, the Risk Value of the alert and its generated incident(s) is equal to the Risk level of the alert.

    Condition is the number of logs the search will return. Setting a limit controls the number of logs for the search. The number of logs you select should not exceed the previously set limit. Logpoint compares the limit value to the value set in the condition to the added alert rule. For example, if you set the limit to 30 logs, your condition must be 30 or less.

    Average returns the average of the sum of Confidentiality, Availability, Integrity, and Risk divided by the number of times they happened. Maximum returns the highest value and Minimum returns the lowest.

  2. Go to Meta-Data.

../_images/LP_KB_AlertRules_Add_Meta_Data_Tab.png

Meta-Data

  1. Select the ATT&CK Techniques from the dropdown. You can select multiple techniques to categorize the alert.

  2. Enter Additional Meta-Data as Field and Value to categorize the alert rules. You can add new fields and values by clicking Add Field. The Metadata Field should contain letters or a combination of letters, numbers, or underscores (_), and must start with a letter.

Warning

  • You cannot enter Logpoint reserved Jinja placeholders as Metadata field in the Field column. Go to Logpoint Reserved Jinja Placeholders to view the list of publicly available Logpoint reserved Jinja placeholders.

  • You cannot repeat the Metadata Field.

  • Value associated with the Metadata Field cannot be empty and vice-versa.

  1. Select Log Source from the dropdown or add new log sources associated with the alert rule.

  2. Go to Ownership. If Data Privacy Module is enabled, users with the Can Grant Access permission can grant access to alerts to users with the Can Request Access permission. If you are a user who can grant access, you can view the requests from Settings >> Configurations >> Data Privacy Module >> Pending Request.

../_images/LP_KB_AlertRules_Add_Ownership_Tab_Assign_Manage.png

Ownership

If you are a user who requested access to an alert, you can view the status of your requests from Settings >> Configurations >> Data Privacy Module >> My Request.

  1. You need to assign the Alert rule to a user, user group or yourself. Assigned users can re-assign, comment on, and view the data of the generated incident. They can also resolve the alert.

Alert Rules can be exported and imported. If you export an Alert Rule, the ownership is lost. If you import an Alert Rule, you get the ownership.

To assign the alert to

  • An individual user, use the Assigned to dropdown to select them.

  • A group, use the Manageable By to select them.

  • To yourself, deselect all of the Incident User Groups in Manageable By.

If you do not belong to any Incident User Groups, both the Assigned to and Manageable by are hidden and you get the following:

../_images/LP_KB_AlertRules_Add_Ownership_Tab_Empty.png

Ownership when you don’t belong to an incident group

  1. Go to Data Template.

../_images/LP_KB_AlertRules_Data_Template.png

Data Template

  1. Enable Apply Jinja Template and enter the template code in the text field. The template will not appear in a formatted manner, but this will not impact its functionality. Logpoint allows you to view the details of the incidents triggering the alert in a format specified in the Jinja template.

Important

When using a Jinja template that includes a timestamp, applying the datetime filter is mandatory to ensure the timestamp remains in its raw epoch format and the date is clearly displayed.

../_images/LP_KB_AlertRules_Data_Template_Jinja.png

Jinja Syntax

  1. Click Create Alert.

When the alert is successfully created, you will get a confirmation message.

../_images/LP_KB_AlertRules_Alert_Creation_Success.png

Alert is Successfully Created

After configuring the Alert Rule, Logpoint automatically notifies you when an alert is triggered. Go to Setting Up Alert Notifications to learn how to set up alert notifications.

An alert is triggered and an incident for the alert is generated every time the search query meets all the alerting criteria.

To view all incidents, go to the Navigation bar and click Incidents.


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support