Example: Detect unauthorized access attempts that might indicate malicious intent
To detect unauthorized access attempts, perform the following steps:
Actions involved
- Lookup
- Function
- Variable
- Enrich
- If-Then-Else
To define the event selection criteria
- Select Configuration > Event Policies and click Create.
- In the Event Selection Criteria, define a condition to select login failure events.
The following image illustrates how the event selection criteria will look.
To build the policy workflow
On the Advanced Enrichment page, perform the following steps to build the policy workflow:
- Add the Lookup action. Under the Lookup Settings, select With custom criteria and define a condition to look up existing open events that occurred in the last 600 seconds.
- Under Update new event, add the Function action to drop incoming login failure events.
- Under Update old events, add a Variable action and set the value to the value of the custom slot name, attempt. The value of this variable can be further used to define an Enrich action.
- Under the previous action, add an Enrich action to increase the attempt count of the existing event by 1 for every duplicate attempt.
- Under the previous action, add an Enrich action to update the existing event severity with the new event severity.
- Under the previous action, add the If action to check if the number of attempts is greater than 2.
- Under Then, add an Enrich action to raise the severity of the existing login failure event to Critical.
- Under Else, add an Enrich action to raise the severity of the existing login failure event to Warning.
Results
The resulting policy workflow enriches the event severity to Critical if the number of attempts is greater than 2. Otherwise, enriches the event severity to Warning as shown in the following image:
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*