Investigation. The same triggered rule

Expand all | Collapse all

The "Investigation. The same triggered rule" predefined playbook allows you to identify where the same correlation rule for a suspicious process was triggered on other hosts within a specified time window. It queries KUMA for additional occurences of the same rule and adds a summary comment to the alert, helping to assess whether the activity is isolated or widespread in the environment.

Before using the playbook, you must download the scripts and dependencies list, which are required for playbook to work correctly.

Click here to see how to download and prepare the scripts

To create a playbook, refer to the "Creating playbooks" article.

Click here to see the full expression that the playbook trigger contains

Functions used by the playbook: executeCustomScript, addCommentToAlert.

During execution, this playbook launches the following response actions:

  1. Performing a KUMA query to find events where the same correlation rule (by name) was triggered within the configured time window around the current alert timestamp. The time window is defined in the playbook input parameters by the timewindow property.
  2. Adding a comment to the alert with brief information about the found events. The comment states that the same correlation rule was detected before and after the alert within the specified time window and lists the host name, user name, and process name.

Click here to see the sequence of response actions that the playbook algorithm contains

Page top