Example: Detect a security attack after failed login attempts to a server
To correlate matching events, perform the following steps:
To define the event selection criteria
- Select Configuration > Event Policies and click Create.
- In the Event Selection Criteria, define a condition to select events from the LOGIN_FAILURE class that contain the message "login failure".
The following image illustrates how the event selection criteria will look.

To learn how to construct the event selection criteria, see Creating and enabling event policies.
To specify the correlation settings
On the Create Event Policy page, perform the following steps to specify the correlation settings:
- In Policy Configuration, select Correlation.
- Set the matching criteria to correlate events as shown in the following image:

- Specify the settings for the aggregated event formed by correlating multiple login attempt events as shown in the following image:

Results
The correlation policy aggregates multiple events into a single aggregated event as shown in the following image. You can click the aggregated event to view related events.


Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*