You can make any changes to custom Sigma rules. You can only add or remove exclusions and change the state of Sigma rules that are supplied by Kaspersky Lab.
To edit a Sigma rule:
The policy properties window opens.
The Changing the Sigma rules collection window opens.
The Changing the Sigma rule window opens.
The table contains basic information about the attributes and sections of a Sigma rule, which are interpreted by Kaspersky Industrial CyberSecurity for Nodes. For more detailed information, follow this link.
Attribute values are case-sensitive. For example, Kaspersky Industrial CyberSecurity for Nodes treats the names of the executable files AnyDesk.exe and anyDesk.exe as different.
Sigma rule structure
Attribute / Section |
Required |
Description |
||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Yes |
The rule name, which indicates what it detects. The maximum length is 256 characters. For example:
|
||||||||||||||||||||||||||||
|
No |
The rule's globally unique identifier. For example:
|
||||||||||||||||||||||||||||
|
No |
Rule status. Possible values: For example:
|
||||||||||||||||||||||||||||
|
No |
A description of the rule and the malicious activity it can detect. The maximum length is 65,535 characters. For example:
|
||||||||||||||||||||||||||||
|
No |
License ID according to the SPDX ID specification. The rule is published under the terms of the specified license type. |
||||||||||||||||||||||||||||
|
No |
Any specifier that indicates the author of the rule. For example, first name and last name, nickname, social network ID. |
||||||||||||||||||||||||||||
|
No |
Link to the source the rule was taken from. For example, a blog article or white paper. |
||||||||||||||||||||||||||||
|
No |
Date when the rule was created in YYYY/MM/DD format. |
||||||||||||||||||||||||||||
|
No |
Date in YYYY/MM/DD format when one of the following rule attributes was changed: |
||||||||||||||||||||||||||||
|
No |
Tag for categorizing the rule. Read more at this link. |
||||||||||||||||||||||||||||
|
Yes |
In this section, you can define the source of events that the application will search for anomalies. The main attributes of this section are Event sources that Kaspersky Industrial CyberSecurity for Nodes supports Event sources supported by Kaspersky Industrial CyberSecurity for Nodes
In Microsoft Windows 7, for Read more at this link. |
||||||||||||||||||||||||||||
|
No |
Defines the category of products whose event logs the application searches for anomalies. For example: firewall, internet, anti-virus, or generic.
|
||||||||||||||||||||||||||||
|
No |
Defines the software product or operating system whose event logs the application searches for anomalies. For example:
|
||||||||||||||||||||||||||||
|
No |
Defines a service whose event logs the application searches for anomalies. For example:
|
||||||||||||||||||||||||||||
|
No |
Description of the specifics of the source of event logs that application searches for anomalies. |
||||||||||||||||||||||||||||
|
Yes |
This section contains one or more criteria for searching for anomalies in event logs and a rule triggering condition. Lists, dictionaries, or a combination of them can be used as search criteria. Kaspersky Industrial CyberSecurity for Nodes does not support the |
||||||||||||||||||||||||||||
list |
No |
A list of the values of any parameter from the event log, combined by a logical OR. For example:
In accordance with the condition, the following matches will be searched: |
||||||||||||||||||||||||||||
dictionary |
No |
event log parameter - value pairs. They are connected by a logical AND. For example:
In accordance with the condition, the following matches will be searched: EventLog='Security' AND Event ID=517. |
||||||||||||||||||||||||||||
combination of list and dictionary |
No |
A list consisting of event log settings values and dictionaries. For example:
In accordance with the condition, the following matches will be searched: EventLog='Security' AND (Event ID=517 OR Event ID=1102) |
||||||||||||||||||||||||||||
|
Yes |
Rule triggering condition. For example:
|
||||||||||||||||||||||||||||
|
No |
Lines from the event log that may be of interest to an analyst for subsequent analysis of the event. |
||||||||||||||||||||||||||||
|
No |
List of known scenarios that may incorrectly trigger the rule. For example:
|
||||||||||||||||||||||||||||
|
No |
An indicator of the severity of anomalies that can be found using the rule. Possible values: |