Alert Rules and Incidents

Alert Rules

Alerts are warnings generated to notify users when any significant events occur. They fire incidents that enable you to execute appropriate actions. Any valid search query can trigger an alert to generate incidents.

You can create an alert rule and select a mechanism to notify you of the incident. Logpoint can notify you via Email, Syslog, SNMP, HTTP, or SSH. You have the flexibility to design an alert mechanism based on your requirements.

The Alert Rules section in LPSM allows you to set up, manage, and perform actions on the Alert Rules on behalf of the Fabric-enabled Logpoints connected to its pools.

../_images/LPSM_LPConfig_ARtab.png

Alert Rules

Note

  • You can perform alert rules actions individually or in bulk. However, to perform the alert rules actions in bulk, the alert rules of Fabric-enabled Logpoint instances must be compatible with each other. The version compatibility of the alert rules actions are:

    Fabric-enabled Logpoint

    Compatible Fabric-enabled Logpoint Versions

    6.11.x

    6.11.x

    6.12.x

    6.12.x to 7.1.0

    7.0.x

    6.12.x to 7.1.0

    7.1.0

    6.12.x to 7.1.0

    7.1.1, 7.1.2, 7.1.3

    7.1.1, 7.1.2, 7.1.3

    7.2.x

    7.2.x

    7.3.0

    7.3.0

Selecting Page View of Alert Rules

You can view the alert rules in two ways:

  1. Tabular view

  2. Coverage view

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

    ../_images/LPSM_AlertRule_SelectingAView.png

    Alert Rules

  2. Select a view from the drop-down.

    ../_images/LPSM_AlertRule_View_Dropdown.png

    Alert Rules View Drop-down

    Note

    Only the alert rules under My Rules, Used Rules, Vendor Rules, and used Shared Rules can be viewed from the views.

  3. Select a Pool, a Machine, and a Logpoint User.

    ../_images/LPSM_AlertRule_PMU.png

    Select Pool, Machine and User

  4. Click Coverage View/Tabular View.

Tabular View

Select Tabular View to display additional columns that list the Log Source, Attack Category, and Attack Tag of the alert rules. You can also see whether the alert rule is active or inactive in the Name column.

Note

You can filter alert rules by multiple log sources from Logpoint v7.4.0 and later, prior to v7.4.0 you can only apply a single alert rule as a filter.

../_images/LPSM_AlertRule_TabularView.png

Tabular View of Alert Rules

Coverage View

Select Coverage view to view the categorization of the alert rules based on various attack categories and attack tags associated with the attack tactics, attack techniques and, attack sub-techniques of the MITRE attack framework. The attack categories are displayed as column headers with the respective attack tags listed under. You can further drill down the attack tags.

../_images/LPSM_AlertRule_CoverageView.png

Coverage View of Alert Rules

You can click the attack tags to view the list of associated alerts rules. The alert rules are listed as similar to the tabular view.

Note

  • The total count of active alerts rules with respect to the total number of alert rules is highlighted in green under the attack tag.

  • The total count of alert rules doesn’t change when the vendor alert rules are used, however the used vendor alerts will be listed along with the vendor alert rule in the dialog box.

../_images/LPSM_AlertRule_Coverage_popup.png

List of Alert Rules Associated with the Attack Tag

Click the Help (helpicon) icon on the top of the dialog box to view the description of the attack tag associated with the attack techniques and sub-techniques of the MITRE attack framework.

../_images/LPSM_AlertRule_Coverage_Description.png

Description of the Attack Tag

View Actions

The tabular/coverage view consists of an action bar allowing you to perform the following actions:

Pool

Shows the pool name that you have selected for the view. You can click the pool name to open the Select Pool, Machine and User pop-up where you can make the necessary changes.

Machine

Shows the name of the machine that you have selected for the view. You can click the machine name to open the Select Pool, Machine and User pop-up where you can make the necessary changes.

User

Shows the name of the user that you have selected for the view. You can click the user name to open the Select Pool, Machine and User pop-up where you can make the necessary changes.

Close view

Allows you to close the tabular/coverage view and return to the My Alert Rules page.

Add

Allows you to create a new alert rule using the alert creation wizard. Go to Creating an Alert Rule for more details.

Select Log Source

Allows you to filter the alert rules according to the log sources using the drop-down. The drop-down is only available for tabular view.

Filter Active Rules

Allows you to view only the active alert rules by selecting the checkbox. This checkbox is only available for tabular view.

More

The More drop-down near the top-right corner of the tabular view page lists additional actions.

../_images/LPSM_AlertRule_Tabular_More.png

More Drop-Down

  • The Activate Selected Alert Rules option lets you activate multiple alert rules at once.

  • The Deactivate Selected Alert Rules option lets you deactivate multiple alert rules at once.

Note

You cannot activate or deactivate vendor rules from the Tabular View.

Creating an Alert Rule

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Click Add.

    ../_images/LPSM_LPConfig_AR_Add.png

    Add Alert Rule

    ../_images/LPSM_LPConfig_AR_Add_Step1.png

    Logpoint Selection - Step 1

  3. Select Pool, Machine, and Logpoint user in the Select Logpoint field where you want to create the Alert Rule.

  4. Click Next.

    ../_images/LPSM_LPConfig_AR_Add_Step2.png

    Create Alert - Step 2

  5. Enter the Name of the alert.

  6. Enter the Query for which you want the alert to trigger an incident. You can either manually enter a search query or pick a query from the Advanced Query Picker using the Select option.

    Note

    • In Data Privacy Module enabled systems, the values for all the fields configured under the Data Privacy Module appear in encrypted form. For queries using specified values for the configured fields, Logpoint does not generate any incidents. However, for the queries specified with all values, the incident is generated with encrypted values of the fields.

      For example, if you have configured the device_name field under the Data Privacy Module, then the query device_name=localhost does not generate any incident. However, the query device_name=* generates incidents with encrypted values.

  7. Select the Repos that you want the alert rule to monitor for the matching alert condition.

  8. In the Limit field, enter the maximum number of logs to retrieve using the entered Query.

    Note

    The Limit selection field disappears if you enter an aggregation query in the Query field.

  9. Enter a Description.

  10. Enter a Time-range of the alert.

Note

  • You can set a time range of either only minutes or only day and hour.

  • The maximum limit for the day time range is 30.

  1. Select Define Search Interval to apply a time interval to the search.

  2. Enter the Search Interval in minutes. For example, if you set the search interval to two, Logpoint performs the search every two minutes. If you have used a pattern finding query in the Query field, the search is not performed in the specified Search Interval even if you select the Enable Search Interval checkbox as Search Intervals do not work with pattern finding.

  3. Enable Delay Alert to define the delay threshold.

  4. Enter the Delay Threshold in minutes. Logpoint waits until the delay threshold has passed before processing the logs, to ensure that all relevant logs are collected before generating the incidents.

Note

  • Delay Threshold can only be used with log_ts based searches. The col_ts based queries may not consider all logs while generating alerts due to log transmission and processing delays.

  • While defining Search Interval and Delay Threshold, we recommend you define the delay threshold in the multiple of the search interval.

  • The maximum value of the Delay Threshold can be up to 24 hours.

  1. Check Flush On Trigger if you want the next alert to be triggered only by a new set of events.

  2. Select Alert Throttling to ensure that multiple alerts are not created for the same set of values for a specified time.

  3. Enter the Field and the time in Minutes. Once an alert is triggered for a value of the particular Field, it does not trigger another alert for the same value specified in Minutes.

  4. Click Next.

../_images/LPSM_LPConfig_AR_Add_Step3.png
  1. Select the Attack Tag from the drop-down. You can select multiple tags to categorize the alert.

  2. Attack Category is selected based on the associated Attack Tags selected.

  3. To categorize the alert rule, use both Field and Value to add metadata to the alert rule.

    • You can use letters, numbers, underscores (_), or a combination. Always start with a letter.

    • You can add as many metadata rows as you like. Click ADD NEW VALUE.

    • You cannott use the same Field name for two different values.

    • You cannot use Logpoint Jinja placeholders as categorization metadata. Go to Logpoint Reserved Jinja Placeholders to learn more.

  4. Select Log Sources from the drop-down or enter new log sources associated with the alert rule. New log sources are also updated in the drop-down after submission.

  5. Click Next.

    ../_images/LPSM_LPConfig_AR_Add_Step4.png

    Alert Ownership - Step 4

  6. Select the Condition, Risk, and Risk Calculating Function from the drop-downs.

Based on the Risk level and Risk Calculation Function, Logpoint calculates the Risk Value of the alerts and incidents they generated. If the search result of the query contains the device_ip, the Risk Calculation Function takes the Risk Value of the devices and Risk level of the alert as arguments.

For example:

If the Risk level of an alert is Medium, Risk Calculation Function is Maximum, and the Risk Value of its associated device(s) is Critical, the Risk Value of the generated alert and incident is: Maximum(Risk level, Risk value of device(s)). That means the Risk value of the incident is Critical.

The risk value of a device is calculated from the values of Confidentiality, Availability, and Integrity.

Whereas for search queries with pipeline commands or without device_ip in the search results, the Risk Value of the alert and its generated incident(s) is equal to the Risk level of the alert.

Note

  • Condition is the number of logs the search will return. Setting a limit controls the number of logs for the search. The number of logs you select should not exceed the previously set limit. Logpoint compares the limit value to the value set in the condition to the added alert rule. For example, you set the limit to 30 logs. Then you need to make sure that your condition is 30 or less. It cannot be greater than 30.

  • Average returns the average of the sum of Confidentiality, Availability, Integrity, and Risk divided by the number of times they happened. Maximum returns the highest value and Minimum returns the lowest.

  1. Click Next.

If required, you can assign an Alert Rule to an individual Logpoint user by selecting none of the Incident User Groups in the Manageable by tree node structure. For more information on Incident User Groups, refer to the Incident User Groups in Logpoint.

../_images/LPSM_LPConfig_AR_Add_Step5.png

Alert Ownership - Step 5

  1. Select a user from the Assigned to drop-down. You need to assign the Alert rule to a user or user group. To select an individual user, select them in Assigned to. You can assign an Alert Rule to yourself by deselecting all of the Incident User Groups in Manageable by.

  2. To assign the alert rule to a group, select the group in Manageable by.

Users selected in both the Assigned to and Manageable by section can re-assign, comment on and view the data of the generated incident. However, only the Assigned to user can resolve it.

Note

If you do not belong to any of the Incident User Groups, the Assigned to and Manageable by are hidden and in LPSM you get the following:

../_images/LPSM_LPConfig_AR_Add_Step4Alternative.png

Creating Alert Rule - Step 5

  1. LPSM allows you to view the details of the incidents triggering the alert in a specific format. Enable Apply Jinja template and enter the template in the Template syntax field.

Note

  • To view the details of the incident in the specified Jinja format, click the Incident Data icon of the incident generated by the alert rule.

  • While including timestamp data in the Jinja template, it is mandatory to include the datetime filter. The timestamp is displayed in raw epoch format if the datetime filter is not included.

  • Select Toggle Simple View to enable or disable the advanced text editor.

../_images/LPSM_LPConfig_AR_Add_Step6.png

Creating Alert Rule - Step 6

  1. If the Data Privacy Module is enabled in the system, the Data Privacy Request window will appear. Check the Alert using original data option if you want the fields in the alert to be decrypted, else, the alert will be generated with encrypted values.

../_images/LPSM_LPConfig_AR_Add_Step7.png

Creating Alert Rule - Step 7

  1. Click Finish.

If you have checked the Alert using original data option, you will be notified with a confirmation message. Click Yes to create a data privacy request for the alert. The alert created hereby will be deactivated until the data privacy request is granted.

../_images/LPSM_LPConfig_AR_Add_Step8.png

Data Privacy Module Confirmation

Note

  • Alert Rules can be exported as per your requirement. However, the ownership information will be lost while exporting the Alert Rule. This behavior is also observed while using the Shared and Cloned Alert Rule.

  • In the Data Privacy Module enabled systems, after successfully configuring the settings for the alert by the users with Can Request Access, the users with Can Grant Access privilege will be prompted with a message regarding the request. This can be viewed under Settings >> Configuration >> Data Privacy Module >> Pending Request.

  • Similarly, after the request is granted, the users with Can Request Access will be prompted with a message, which can be viewed under Settings >> Configuration >> Data Privacy Module >> Request. Only then will the users be able to view the alert with original data.

After completing the configuration, LPSM shows you a notification dialog box asking whether you want to configure the notifications for the rule. Click Yes. Once the alert is created, you can view it under My Rules. The alert is also created in the Fabric-enabled Logpoint.

You can also configure or change it later by clicking the Notification icon from the Actions column of the alert rule.

../_images/LPSM_LPConfig_AR_Add_Step9.png

Alert Rules

Now, whenever a search query meets all the alerting criteria, the alert is triggered, and it generates the corresponding incident. To view the incident, click the Incident tab.

Setting Up Alert Notifications

After creating an alert rule on behalf of a Fabric-enabled Logpoint, you can set up the following notifications for the rule.

  • Email notification

  • SMS notification

  • Syslog notification

  • SNMP notification

  • HTTP notification

  • SSH notification

The message and command fields of the SMTP and SSH notifications support Jinja2 syntax. The message field of the Syslog notification supports Jinja syntax. For more information on how Jinja and Jinja2 syntaxes are implemented in the SMTP, SSH, and Syslog services, go to Setting Up Alert Notifications in Logpoint Alerts and Incidents.

In LPSM v2.2.0 and later, you can

  • Use the {{lpsm_search_link}} Jinja command to display the link to search for the logs that triggered the alert.

  • In Fabric-enabled Logpoint, the link redirects you to the LPSM search page.

  • In standard Logpoint, it redirects you to the Logpoint search page.

  • To use this Jinja command, Server Alias in System Settings >> General must be selected and a valid value specified. be empty and specified.

  • For more information on supported Jinja syntax for alert notification setup, go to Logpoint Reserved Jinja Placeholders in Logpoint Alerts and Incidents.

Configuring Email Notification

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Click the Setup Notification icon from the Actions column of the alert rule.

  3. Select Email Notification and enable Notify via email.

../_images/LPSM_LPConfig_AR_Notification_Email.png

Email Notification Setup

  1. In the Notification Trigger section:

    • Select Automatic to send a notification every time the alert rule is triggered.

    • Select Manual to manually send the notification from the Generated Incidents.

  2. Enter valid email addresses under Emails.

  3. Enter a Subject. Logpoint supports the following Jinja commands for the alert rules:

    • {{alert_name}}

    • {{detection_timestamp}}

    • {{risk_level}}

    • {rows}}

    • {{rows_count}}

You can write them in a query as: Logs from {{rows.col_type}} on date {{rows.col_ts|datetime}}.

  1. Select Toggle Simple View to enable or disable the advanced text editor.

  2. Select Disable Search Link to remove the search link in the email. The search link redirects to the search page of the LPSM machine from which the email notification is configured.

  3. Enter a Message.

  4. Set the Threshold.

  5. Select Enable Logo if you want to include the Logpoint logo in the email notification.

  6. Browse for the image in the JPG/JPEG format if you want to provide a custom logo. The maximum dimension for the custom logo is 600*400.

  7. Click Save.

Note

  • You can use the Jinja commands {{attack_id}}, {{attack_tag}}, {{attack_category}}, and {{log_source}} in the Subject and Message fields. You can also use the metadata fields associated with the alert as Jinja commands in these Jinja supported fields. If the metadata fields associated with the alert are threatactor, Associated_Malware, and System, then you can use them as Jinja commands as {{threatactor}}, {{Associated_Malware}}, and {{System}}.

  • If you do not want to include the Logpoint logo in the email, deselect Enable Logo and click Save.

  • To configure the SMTP service, go to Settings >> System >> System Settings before sending email notifications. Go to the SMTP section for details.

Configuring SMS Notification

Before configuring SMS notification, the SMSC server must be accessible from Logpoint.

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Click the Setup Notification (notification) icon from the Actions.

  3. Select SMS Notification and enable Notify via SMS.

../_images/LPSM_LPConfig_AR_Notification_SMS.png

SMS Notification Setup

  1. In Notification Trigger:

    • Select Automatic to send an SMS notification every time the alert rule is triggered.

    • Select Manual to manually send the SMS notification from the Generated Incidents.

  2. Enter SMSC Server/Port. the SMSC server supports both hostname and IP address.

  3. Enter Username, Password, and Sender ID of the server.

  4. In Receivers, enter the phone numbers including the country code.

  5. In Body, enter a template in Jinja format for the SMS.

  6. Set the Threshold time to trigger the SMS notification after enabling it.

  7. Click Save.

Configuring Syslog Notification

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Click the Setup Notification icon from the Actions column of the alert rule.

  3. Select Syslog Notification and enable Notify via Syslog.

    ../_images/LPSM_LPConfig_AR_Notification_Syslog.png

    Syslog Notification Setup

  4. In the Notification Trigger section:

    • Select Automatic to send a notification every time the alert rule is triggered.

    • Select Manual to manually send the notification from the Generated Incidents.

  5. Enter the IP Address and the Port number for the syslog receiver in the Server/Port textboxes.

  6. Select the level of Severity and Facility from the drop-downs.

  7. Enter a Message that gives the information about the event. You can use the Jinja template to construct a message that extracts specific information about the event.

    Note

    You can use the Jinja commands {{attack_id}}, {{attack_tag}}, {{attack_category}}, and {{log_source}} in the Message field. You can also use the metadata fields associated with the alert as Jinja commands in these Jinja supported fields. If the metadata fields associated with the alert are threatactor, Associated_Malware, and System, then you can use them as Jinja commands as {{threatactor}}, {{Associated_Malware}}, and {{System}}.

  8. Set the Threshold.

  9. Choose either the UDP or the TCP protocol to send the Syslog Notification.

    Note

    1. If you use UDP, the log message may be dropped or it may arrive out of order.

    2. If you use TCP, the log message arrives without being dropped and in order.

  10. Select the Send each new line as separate syslog notification checkbox to generate one syslog message for each log message in the search results. If you do not select it, all the messages within the chosen time range of the incident are compressed into one syslog message in the search results.

Note

The Send each new line as separate syslog notification option is useful only if the Message textbox contains a Jinja template with a for loop.

Configuring SNMP Notification

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Click the Setup Notification icon from the Actions column of the alert rule.

  3. Select SNMP Notification and enable Notify via SNMP Traps.

../_images/LPSM_LPConfig_AR_Notification_SNMP_v2.png

SNMP Notification Setup

  1. In the Notification Trigger section:

    • Select Automatic to send a notification every time the alert rule is triggered.

    • Select Manual to manually send the notification from the Generated Incidents.

  2. Enter the trap receiver’s IP address and the Port number.

  3. Enter a valid SNMP trap or Enterprise specific OID (Object Identifier) in the dotted decimal format. Make sure to not use the OID with a leading dot.

  4. Select either the SNMPv2c version or the SNMPv3 version according to the security level you require.

    The notification settings change according to the version you pick.

    1. For SNMPv2c configuration

      1. Enter the name of the Agent that sends the SNMP trap.

      2. Enter a passphrase in the Community String. The passphrase should be recognizable by the manager.

      3. Enter the OID’s corresponding value in the Message.

    2. For SNMPv3c configuration

      1. Enter the Username.

      2. Enter the Authorization Key and Private Key.

      Note

      You can toggle the SHOW/HIDE button to show or hide the Authorization Key and Private Key.

      1. At the Message tab, enter the OID’s corresponding value.

    Note

    You can use the Jinja commands {{attack_id}}, {{attack_tag}}, {{attack_category}}, and {{log_source}} in the Message field. You can also use the metadata fields associated with the alert as Jinja commands in these Jinja supported fields. If the metadata fields associated with the alert are threatactor, Associated_Malware, and System, then you can use them as Jinja commands as {{threatactor}}, {{Associated_Malware}}, and {{System}}.

    ../_images/LPSM_LPConfig_AR_Notification_SNMP_v3.png

    SNMPv3 Configuration

  5. Set the Threshold.

  6. Click Save.

Configuring HTTP Notification

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Click the Setup Notification icon from the Actions column for the alert rule.

  3. Select HTTP Notification and enable Notify via HTTP/S.

../_images/LPSM_LPConfig_AR_Notification_HTTP.png

HTTP Notification Setup

  1. In Notification Trigger:

    • Select Automatic to send a notification every time the alert rule is triggered.

    • Select Manual to send the notification from the Generated Incidents manually.

  2. In Protocol:

    • Select HTTP to send a notification using HTTP protocol.

    • Select HTTPS to send a notification using a more secure HTTPS protocol.

  3. Enter either a valid IP address or domain name in the Base URL field.

  4. Select a Request Type from the drop-down.

  5. Enter a Query String. Logpoint supports the following Jinja commands for the alert rules:

    • {{alert_name}}

    • {{detection_timestamp}}

    • {{risk_level}}

    • {{rows}}

    • {{rows_count}}

    You can write them in a query as: user='admin'&count={{rows_count}}.

  6. Select an authentication Header type.

    • If you select Basic Auth, enter the required Key and Password.

    • If you choose API Token, enter the required Key and Value.

    • If you select Bearer Token, enter the required Key.

  7. Enter a template for the Body of the HTTP notification in the Jinja format.

Note

You can enter the template Body only for the POST, PUT, and PATCH request methods.

  1. Set the Threshold. Threshold is a time after which next HTTP/S notification can be triggered.

  2. Click Save.

Configuring SSH Notification

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Click the Setup Notification icon from the Actions column of the alert rule.

  3. Select SSH Notification and enable Notify via SSH.

../_images/LPSM_LPConfig_AR_Notification_SSH.png

SSH Notification Setup

  1. In the Notification Trigger section:

    • Select Automatic to send a notification every time the alert rule is triggered.

    • Select Manual to manually send the notification from the Generated Incidents.

  2. Enter a Server address and a Port number.

  3. Enter a Username for the user in the destination server.

  4. Enter a Command you want to execute when the alert rule is fired. Make sure that the command is a valid bash command and is executable.

    Note

    You can use the Jinja commands {{attack_id}}, {{attack_tag}}, {{attack_category}}, and {{log_source}} in the Message field. You can also use the metadata fields associated with the alert as Jinja commands in these Jinja supported fields. If the metadata fields associated with the alert are threatactor, Associated_Malware, and System, then you can use them as Jinja commands as {{threatactor}}, {{Associated_Malware}}, and {{System}}.

  5. Choose the required mode of Authentication: Password or SSH Certificate.

    1. If you choose Password, enter a passkey in the Password tab.

    2. If you choose SSH Certificate, select the Certificate type: System Certificate or User Certificate. The SSH Certificate key is automatically generated. You must add the key to the authorized keys at ~/.ssh/authorized_keys in your system.

      • If you choose System Certificate, LPSM uses system-specific certificate for authentication.

      • If you choose User Certificate, LPSM uses individual user-specific certificate for authentication.

    Please note the password or the SSH certificate key, as it is required later for user-validation.

  6. Set the Threshold.

  7. Click Finish.

Pushing Alert Rules

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Select the alert rules and click Push.

    Alert Rules

    Push

    The Push Alert Rules pop-up menu appears.

    Alert Rules

    Push Alert Rules

    Note

    You cannot push an alert rule from a Logpoint user to itself.

  3. Select the Pool, Logpoint, or User where you want to push the selected alert rules.

  4. Click Push.

Push History

You can click the Push History (pushhistory) button to check the push history.

Alert Rules

Push History

The Push History page lists the Push Summary, Status, Date, and Actions of all push attempts.

Click the Retry (retry) icon from the Actions column to retry the failed push attempt.

Click the Details (pushdetails) icon from the Actions column to open the Push Detail page.

Alert Rules

Push Detail

Note

For failed push attempts:

  • Click the Retry (retry) icon from the Actions column to retry individual failed push attempts.

  • Click the Details (details) icon from the Actions column to view the error details about failed push attempts.

Exporting Alert Rules

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Select the alert rules and click Export.

    ../_images/LPSM_LPConfig_AR_Export.png

    Export

  3. Select the export format for the alert rules.

    ../_images/LPSM_LPConfig_AR_Export_Format.png

    Export Format

Note

After downloading the .pak files, you can upload them to any other Fabric-enabled Logpoint from the Analytics Packages section.

Editing an Alert Rule

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Click the Name of the alert rule.

    Alert Rules

    Editing selected Alert Rule

  3. Update the information.

  4. Click Submit.

Editing Notification Configuration for Multiple Alert Rules

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Select the alert rules for which you want to setup notifications.

  3. Click the More drop-down.

    ../_images/LPSM_LPConfig_AR_EditMultipleAlertNotification.png

    Setup Alert Notifications of Selected Alert Rules

  4. Select Setup Notifications of Selected Alert Rules.

  5. Configure the notifications and click Save.

Note

Enable Overwrite existing notifications to update the notifications of the alert rules that do not have the notifications configured. By default, LPSM only updates the alert rules that do not already have the notifications configured.

Activating Alert Rules

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Click the Activate alert rule (activate) icon from the Actions column for the alert rule.

    • To activate multiple Alert Rules, select the concerned rules. Click the More drop-down and select Activate Selected Alert Rules.

      ../_images/LPSM_LPConfig_AR_ActivateSelected.png

      Activate Selected Alert Rules

    • To activate all the Alert Rules, click the More drop-down and select Activate All Alert Rules.

      ../_images/LPSM_LPConfig_AR_ActivateAll.png

      Activate All Alert Rules

Note

You can De-activate the alert rules using the same method.

Cloning Alert Rules

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Click the Clone (clone) icon from the Actions column for the alert rule.

    ../_images/LPSM_LPConfig_AR_ClonePanel.png

    Clone Alert Rules

  3. Select the Logpoint user from the drop-down. The Pool and the Machine cannot be changed.

  4. Enter a new Name for the cloned alert rule.

  5. Check the Replace Existing? checkbox to replace an existing alert rule with the same name.

  6. Click Clone.

Sharing Alert Rules with Users

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Select the alert rule you want to share and click the Share to other users (share) icon.

    1. To share multiple alert rules, select the rules. Click the More drop-down and select Share Selected Alert Rules With Users.

      ../_images/LPSM_LPConfig_AR_ShareSelected.png

      Share Selected Alert Rules With Users

Note

Make sure the alert rules are compatible with each other. Use the version compatibility table in the Alert Rules to check for compatibility.

  1. Select a User Group. All the users in the user group are listed in the drop-down.

  2. Select the Read, Edit, or Full permissions for the users.

    ../_images/LPSM_LPConfig_AR_RBAC.png

    Role-based Access Alert Rules

  3. Click Submit.

Note

  • You can unshare the alert rules with the users using the same method.

Using Shared Alert Rules

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Select Shared Rules from the drop-down.

  3. Click the More icon from the Actions column.

    ../_images/LPSM_LPConfig_AR_SharedRules_List.png

    Shared Alert Rules

  4. Click the Use Alert icon from the Actions column.

    ../_images/LPSM_LPConfig_AR_SharedRules.png

    Using a Shared Alert Rule

Note

  • If a user does not have access to a repo used in the shared alert rule, the incident is triggered from other selected repos.

  • If only one repo is selected in the shared alert rule, and the user does not have access to the repo, the incident is not triggered.

  • After using the alert rules, you can Activate or Deactivate them from the Actions column.

Cloning Shared Alert Rules

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Select Shared Rules from the drop-down.

  3. Click the Clone icon from the Actions column.

    ../_images/LPSM_KB_AR_CloneRules.png

    Cloning a Shared Alert Rule

  4. Enter a Name for the cloned rule.

  5. Select the Replace Existing? checkbox to replace an existing rule with the same name.

  6. Click Clone.

Deleting Alert Rules

  1. Go to Settings >> Logpoint Configuration >> Alert Rules.

  2. Click the Delete (delete) icon under the Actions column for the concerned alert rule.

    • To delete multiple alert rules, select the concerned rules. Click the More drop-down and choose Delete Selected Alert Rules.

      ../_images/LPSM_LPConfig_AR_DeleteSelected.png

      Delete Selected Alert Rule

    • To delete all the alert rules, click the More drop-down and choose Delete All Alert Rules.

      ../_images/LPSM_LPConfig_AR_DeleteAll.png

      Delete All Alert Rules

  3. Click Yes on the delete confirmation dialog box.

Category of Alert Rules

There are four categories of alert rules: My Rules, Shared Rules, Used Rules, and Vendor Rules. They can be accessed from the drop-down at the top-left corner of the panel.

../_images/LPSM_LPConfig_AR_ARCategory.png

Category of Alert Rules

My Rules

Lists all the alert rules created by the LPSM user or the Fabric-enabled Logpoint user.

Note

You can Setup Notifications, De-activate/ Activate, Share, Clone, or Delete alert rules under the Action column.

Shared Rules

Lists all the shared alert rules.

Used Rules

Lists all the used alert rules.

Vendor Rules

Lists all the alert rules provided in your application packages.

Note

You can click the Clone (clone) icon under the Actions column, to use the shared and vendor alert rules. Enter a name for the clone and hit enter. The alert rule is activated, and the clone appears under the My Rules page.

Incident

Incidents are used to identify, analyze, correct, and prevent information hazards in the future. Logpoint lets you find events such as a system crash, power down, cables unplugged, high disk usage, high CPU usage, and forensics by creating incidents for each of them. Incidents can be created from one of three incident sources; Alert Rules, Search or UEBA.

You can subscribe to incident sources of the connected Fabric-enabled instances from Investigation >> Incidents the navigation bar. Once the incidents of the subscribed sources are created, you can resolve, re-open, close, and comment on the incidents. The incidents are updated automatically in real time.

../_images/lpsm_incident.png

Incident

Subscribing Incident Sources

To view incidents for other Fabric-enabled Logpoints, you need to subscribe to the incident sources.

  1. Go to Incidents from the navigation bar.

  2. Click SUBSCRIPTIONS.

  3. At the top-right, click Subscribe.

    ../_images/lpsm_subscribe.png

    Subscribe

  4. Select the required incident source.

    ../_images/LPSM_Incident_selected_incidents_re.png

    Selected Incident Sources

  5. Click Done.

    After successful selection, incident sources are populated under SUBSCRIPTIONS.

    ../_images/LPSM_Incident_subscribed_incidents.png

    Subscribed Incident Sources

Note

  • If a pool is selected while subscribing to incidents, the new sources added in the Fabric-enabled Logpoints of that pool are subscribed automatically.

  • If a Fabric-enabled Logpoint is down or unreachable, its corresponding subscribed incident sources are dimmed.

    ../_images/LPSM_Incidents_host_down1_incident.png

    Dimmed Incident Sources

    ../_images/LPSM_Incident_host_down2_incidents.png

    Dimmed Incident Sources

  • When a Fabric-enabled Logpoint is down, its corresponding incident sources cannot be selected or deselected individually. When a pool is selected or deselected, all the subscribed reports are selected or deselected irrespective of any Fabric-enabled Logpoint being down or unreachable.

Unsubscribing Incident Sources

  1. Go to Incident from the navigation menu.

  2. Click SUBSCRIPTIONS.

  3. Click Unsubscribe for the incident source.

    ../_images/lpsm_alert_rule_unsubscribe.png

    Unsubscribe

To unsubscribe incident sources in bulk:

  1. Go to Subscribe button on the top right.

  2. Deselect the incident sources to unsubscribe.

Generated Incidents

When a subscribed alert rule is triggered, an incident is generated and listed in Incidents section.

../_images/LPSM_Incidents_generated_incidents.png

Generated Incidents

In the Incident feed, the list of all the incidents is displayed along with their corresponding status. You can perform actions such as: Resolve, Re-open, Close, Re-assign, and Comment on any incident. Additionally, you can send incident notifications for investigation if you have configured the Manual notification trigger for the corresponding alert rules.

Resolving an Incident

Once the appropriate action is taken on a particular incident, you can Resolve that incident.

  1. Go to Incident >> Incidents.

  2. Click the Resolve button of the incident.

    ../_images/LPSM_Incidents_generated_incidents_resolve.png

    Resolving an Incident

Closing an Incident

After an incident is resolved, you can close the incident. Once an incident is closed, it is not shown in the incident feed.

  1. Go to Incident >> Incidents.

  2. Click the Close button of the incident.

    ../_images/LPSM_Incidents_generated_incidents_close.png

    Closing an Incident

Re-opening an Incident

  1. Go to Incident >> Incidents.

  2. Click the Re-open button of the incident.

    ../_images/LPSM_Incidents_generated_incidents_reopen.png

    Re-opening an Incident

Commenting on an Incident

You can post comments about the incidents seen in the incident feed. You can track the actions taken over an incident via the comments.

  1. Go to Incident >> Incidents.

  2. Click the Comment button of the incident.

    ../_images/LPSM_Incidents_generated_incidents_comment.png

    Comment

Viewing Incident Data

You can view the details of an incident in a format specified while creating its alert rule.

  1. Go to Incident >> Incidents.

  2. Click the Incident Data button of the incident.

    ../_images/LPSM_Incidents_generated_incidents_incident_data.png

    Incident Data

You can monitor each incident’s status using the Incident ID, which is a unique ID of an incident. You can also view the corresponding alert rule’s AlertRule ID.

Note

An AlertRule ID is only available in incidents generated from an alert.

../_images/LPSM_Incidents_generated_incidents_alert_incident_data.png

Incident Data View

Viewing Incident Logs

You can view the logs that triggered an incident from the View Data option, which directs you to the Search page to view the logs.

  1. Go to Incident >> Incidents.

  2. Click the View Data button of the incident.

../_images/LPSM_Incidents_generated_incidents_view_data.png

View Data

../_images/LPSM_Incidents_generated_incidents_view_data_search_page.png

Incident Data Logs

Note

You can view the incident information like Alert Name, Incident ID, and Incident Timestamp from the Incident Info (incidentinfo) icon on the redirected tab.

../_images/LPSM_Incident_Viewdata_Incidentinfo.png

Alert Incident Data

Reassigning an Incident

You can reassign an incident to another user only if the user assigned to its corresponding alert rule is deleted from the Fabric-enabled Logpoint. You can reassign the incident to the owner of the alert rule or a user with the Manageable by ownership.

  1. Go to Incident >> Incidents.

  2. Click the Assign to button of the incident.

    ../_images/LPSM_Incidents_generated_incidents_reassign.png

    Assign to

  3. Select the User.

    ../_images/LPSM_Incidents_generated_incidents_reassign_assignuser.png

    Assign to User

    ../_images/LPSM_Incidents_generated_incidents_reassign_new_assign_user.png

    Incident Reassigned

Note

You cannot perform other incident actions without reassigning the incident to another user.

Sending Incidents for Investigation

You can use the Send For Investigation and Re-Send For Investigation options to manually send incident notifications for further investigation.

  1. Go to Incident >> Incidents.

  2. Click the Send for Investigation button.

../_images/LPSM_Incidents_generated_incidents_sendforinvestigation.png

Send for Investigation

Note

  • The Send For Investigation and Re-Send For Investigation options only appear if one of the notifications has been set to trigger manually in the corresponding alert rule.

  • When you click Send For Investigation, only the notifications configured with the Manual trigger for the corresponding alert rule are sent.

  • You can send incidents generated from Search, Dashboard, Search template, and UEBA for investigation manually. The Send For Investigation and Re-Send For Investigation options are not available for these incidents. You can use the Send Selected For Investigation option under the More drop-down to send the incident(s) for investigation.

Other Incident actions

The More drop-down in the Incident page lists additional actions. You can select the incidents and choose to Resolve Selected, Resolve All, Close Selected, Close All Resolved, and Send Selected For Investigation.

../_images/LPSM_incidents_more.png

More

  • The Resolve Selected and Resolve All options let you resolve multiple incidents at once.

  • The Close Selected and Close All Resolved options let you close multiple incidents at once.

    Note

    The incidents cannot be closed without being resolved first.

  • The Reassign Selected and Reassign All Selected options let you reassign multiple incidents at once. Reassigning opens a window prompting you to select a user to reassign the incidents to.

  • The Send Selected For Investigation option lets you send the notifications configured for the selected incidents. You can either select a single incident or multiple incidents and send them in an email using the Send Incident(s) for Investigation dialog box.

    ../_images/LPSM_Incident_SendforInvestigation.png

    Send Incident(s) for Investigation dialog box

    1. Enter valid email addresses under Emails.

    2. Enter a Subject.

    3. Select Disable Search Link to remove the search link from the email. The search link redirects you to the search page of the Logpoint instance where the email notification is configured.

    4. Select Enable Logo if you want to include the Logpoint logo in the email notification.

    5. Browse for the image in JPG/JPEG format if you want to provide a custom logo. The maximum dimension for the custom logo is 600*400.

    6. Click Submit.

Note

  • You cannot close an incident without resolving it first.

  • Any pre-configured settings for email notification are replaced with the configurations set in the Send Incident(s) for Investigation dialog box for the particular instance.

  • Only the incidents corresponding to the alert rules configured for manual trigger in email notification are sent in email.

  • To perform incident actions in bulk, the incidents of the Fabric-enabled Logpoint instances must be compatible with each other. The version compatibility of the incident actions are:

    Fabric-enabled Logpoint

    Compatible Fabric-enabled Logpoint Versions

    6.9.x

    6.9.x

    6.10.x

    6.10.x

    6.11.x

    6.11.x to 6.12.x

    6.12.x

    6.11.x to 6.12.x

    7.0.x

    6.11.x to 7.0.x

Filtering an Incident

To simplify or narrow down the search for a particular incident, you can use filters such as Logpoint Pool, Machine, Name Or ID, Time Range, Risk, Attack Category, Attack Tag, Log Sources, Type, and Status.

../_images/LPSM_Filter_incident.png

Filter

The filters are described below:

  • Pool: Using this filter, incidents can be filtered by the selected Logpoint Pool.

  • Machine: Using this filter, incidents can be filtered by the selected machine belonging to the selected Logpoint Pool.

  • Name Or ID: Using this filter, a particular incident can be searched by its name or its Incident ID. You can also search for all the incidents associated with an alert using the AlertRule ID. You can obtain the Incident ID and AlertRule ID by clicking the Incident Data option on the Incident page.

  • Time Range: Using this filter, the incidents generated at a particular time can be viewed.

  • Risk: Using this filter, the incidents can be viewed according to a particular severity level (critical, high, medium, or low).

  • Attack Category: Using this filter, the incidents can be viewed according to the attack categories associated. You can select multiple attack categories from the drop-down.

  • Attack Tag: Using this filter, the incidents can be viewed according to the attack tags associated. You can select multiple attack tags from the drop-down.

  • Log Sources: Using this filter, the incidents can be viewed according to the log sources associated. You can select multiple log sources from the drop-down.

  • Type: Using this filter, the incidents can be viewed by the source (alert, search, or UEBA) where they are generated.

  • Status: Using this filter, the incidents can be viewed according to their status (resolved, unresolved, or closed).


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support