Investigation. Triggered rules with the same account

Expand all | Collapse all

The "Investigation. Triggered rules with the same account" predefined playbook allows you to identify other correlation rules that were triggered for the same account within a specified time window around the current alert. It queries KUMA for rules where the same user name appears in the SourceUserName or DestinationUserName fields and adds a summary comment to the alert, helping to assess whether the account is involved in broader malicious activity.

Before using the playbook, you must download the scripts and dependencies list, which are required for playbook to work correctly.

Click here to see how to download and prepare the scripts

To create a playbook, refer to the "Creating playbooks" article.

Click here to see the full expression that the playbook trigger contains

Functions used by the playbook: executeCustomScript, addCommentToAlert.

During execution, this playbook launches the following response actions:

  1. If SourceUserName is defined in the alert, it performs a KUMA query to find triggered correlation rules where the same user name appears in the SourceUserName or DestinationUserName fields within the configured time window around the alert timestamp. The time window is defined in the playbook input parameters by the timewindow property.
  2. If DestinationUserName is defined and different from from SourceUserName, the playbook repeats the query for this user name, again within the same time window. For each successfully processed user name, the playbook adds a comment to the alert that states the account name and lists the correlation rules in which this account was found before and after the alert time.

Click here to see the sequence of response actions that the playbook algorithm contains

Page top