Investigation. Triggered rules with the same hostname

Expand all | Collapse all

The "Investigation. Triggered rules with the same hostname" predefined playbook allows you to identify other correlation rules that were triggered for the same host within a specified time window around the current alert. It queries KUMA for rules where the same value appears in the DeviceHostName field and adds a summary comment to the alert, helping to assess whether the host is involved in broader malicious activity.

Before using the playbook, you must download the scripts and dependencies list, which are required for playbook to work correctly.

Click here to see how to download and prepare the scripts

To create a playbook, refer to the "Creating playbooks" article.

Click here to see the full expression that the playbook trigger contains

Functions used by the playbook: executeCustomScript, addCommentToAlert.

During execution, this playbook launches the following response actions:

  1. Performing a KUMA query to find triggered correlation rules where the same hostname (DeviceHostName) as in the alert appears within the configured time window around the alert timestamp. The time window is defined in the playbook input parameters by the timewindow property.
  2. Adding a comment to the alert with brief information about the found events. The comment states that the same host was detected in other triggered correlation rules before and after the alert within the specified time window and lists these rules by name.

Click here to see the sequence of response actions that the playbook algorithm contains

Page top