Alert Rules Use Cases

  • 1
  • Idea
  • Updated 5 months ago
  • (Edited)
Below, are examples of 5 alert rule use cases, including rule description and syntax.

1. Alert on non-proxy web access events\Direct web access

Detect all access not through the proxy server. Proxy server is 192.168.127.131.

Rule needs to exclude web access from client to proxy, so has dst qualifier.

RULE:
http, web_access src!=192.168.127.131 && dst!=192.168.127.131

2. Alert on any smtp traffic from a user machine
Detect any smtp message not from mail server 192.168.127.21

RULE: smtp, envelope src!=192.168.127.21

3. Alert on any email with attachment known as "invoice.pdf" not going to the accounts department
Detect any email with attachment invoice.pdf not to account.department

RULE:
smtp, attachment recipient!="accounts@xyz.com" && filename=~"invoice.pdf"

4.
Alert on any file renames
Detect any smb rename on path mp3_uploads

RULE smb, rename_file from=~"mp3_uploads"

5. Alert when host connects to ip address
Detect traffic to specific IP address 192.168.127.22

RULE: flow, new dst=192.168.127.22
Photo of Aisling Brennan

Aisling Brennan, Official Rep

  • 386 Posts
  • 8 Reply Likes

Posted 1 year ago

  • 1
Photo of Daniel Orchard-Robson

Daniel Orchard-Robson

  • 1 Post
  • 0 Reply Likes
trying to figure out the syntax for a rule to detect when the BitTorrent protocol is detected, thought flow,new proto=~"BITTORRENT" would work but it doesn't like it!  Any suggestions?
Photo of Laura Murphy

Laura Murphy

  • 3 Posts
  • 0 Reply Likes
The modules that our metdata alerting engine covers flow, http, smb and smtp. Further reading can be found here

We appreciate your feedback on this feature and plan to incorporate support for the bittorrent module in an upcoming release (probably Q1 2017). 

In the meantime, we can deal with this by creating a report alert. Please see this forum post on how to do this. 

We are very interested in the type of alerts our customers require, so if you have further suggestions, let us know at support@netfort.com.