Example: Detect a security attack after failed login attempts to a server
To correlate matching events, perform the following steps:
To define the event selection criteria
- Select Configuration > Event Policies and click Create.
- In the Event Selection Criteria, define a condition to select events from the LOGIN_FAILURE class that contain the message "login failure".
The following image illustrates how the event selection criteria will look.
To learn how to construct the event selection criteria, see Creating-and-enabling-event-policies.
To specify the correlation settings
On the Create Event Policy page, perform the following steps to specify the correlation settings:
- In Policy Configuration, select Correlation.
- Set the matching criteria to correlate events as shown in the following image:
- Specify the settings for the aggregated event formed by correlating multiple login attempt events as shown in the following image:
Results
The correlation policy aggregates multiple events into a single aggregated event as shown in the following image. You can click the aggregated event to view related events.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*