Example: Detect unauthorized access attempts that might indicate malicious intent
Generally login failures occur due to forgotten passwords. However, a high number of login failures to sensitive systems can indicate malicious intent. Suppose you want to look up the existing login failure events that occurred in the last 600 seconds. Additionally, suppose you want to:
- Drop the incoming login failure events (associated to the LOGIN_FAILURE1 custom class).
- Increase the attempt count of the existing event based on the number of duplicate attempts (duplicate events).
- Update the existing event severity with the new event severity.
- Raise the event severity to Critical if the number of attempts is greater than 2. Otherwise, raise the event severity to Warning.
Actions involved: Lookup, Function, Variable, Enrich, If-Then-Else
Event selection criteria: Define a condition to select login failure events.
The following image illustrates how the event selection criteria will look.
Build the policy workflow:
- Add the Lookup action. Under the Lookup Settings, select With custom criteria and define a condition to look up existing open events that occurred in the last 600 seconds.
- Under Update new event, add the Function action to drop incoming login failure events.
- Under Update old events, add a Variable action and set the value to the value of the custom slot name, attempt. The value of this variable can be further used to define an Enrich action.
- Under the previous action, add an Enrich action to increase the attempt count of the existing event by 1 for every duplicate attempt.
- Under the previous action, add an Enrich action to update the existing event severity with the new event severity.
- Under the previous action, add the If action to check if the number of attempts is greater than 2.
- Under Then, add an Enrich action to raise the severity of the existing login failure event to Critical.
- Under Else, add an Enrich action to raise the severity of the existing login failure event to Warning.
Final workflow: The following image illustrates how the policy workflow will look.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*