- Newest
- Most votes
- Most comments
It sounds like you're experiencing some challenges with setting up Security Analytics Detection Rules in your OpenSearch domain. There are a few things to consider when troubleshooting this issue:
-
Detector Configuration: Make sure you have properly configured a detector for the Windows log type. Detectors are responsible for identifying threats across data indexes using both custom and pre-packaged Sigma rules.
-
Rule Implementation: Ensure that your custom rule is correctly implemented and follows the proper syntax for Security Analytics rules. The rule you've provided looks like it's in YAML format, which is correct for Sigma rules.
-
Index Mapping: Verify that the field names in your rule (e.g., "event.code") match the actual field names in your ingested data. Sometimes, discrepancies in field naming can prevent rules from triggering.
-
Data Ingestion: Confirm that the Windows log data is being correctly ingested into the "logs-windows" data stream and that the events with code 4625 are present and properly formatted.
-
Time Range: Check if you're looking for alerts/findings within the correct time range. Sometimes, alerts might not appear immediately and could take some time to generate.
-
Permissions: Ensure that the necessary permissions are set up correctly. If you're using fine-grained access control, make sure the appropriate roles and users are mapped to allow for rule execution and alert generation.
-
Resource Allocation: While you mentioned allocating more resources has helped with resource spikes, it's worth double-checking that your cluster has sufficient resources to handle the Security Analytics workload.
If you're still not seeing any alerts or findings after checking these points, you might want to review the audit logs for any error messages or unexpected behavior related to the Security Analytics feature.
Additionally, if you're new to using Security Analytics, be aware that when you first open the Security Analytics dashboard without any detectors, you might see a notification about a missing index. This is normal and will disappear once you create a detector.
If the issue persists, you may need to reach out to AWS support for further assistance in troubleshooting the Security Analytics configuration on your OpenSearch domain.
Sources
Security Analytics for Amazon OpenSearch Service - Amazon OpenSearch Service
How to customize audit logs in OpenSearch to see which queries were run by users? | AWS re:Post
Open-Source Search Engine – Amazon OpenSearch Service Security – Amazon Web Services
Relevant content
- asked 4 months ago
- asked a month ago