You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What is the bug?
The threat intel module is not creating proper alerts after matching the IoCs.
When using the the {{#ctx.alerts}} it returns empty - Different from using standard detectors in the Security Analytics, which I believe the cause is because the alert is not being generated.
How can one reproduce the bug?
Steps to reproduce the behavior:
Go to 'Security Analytics'
Click on 'Threat Intelligence'
Scroll down to 'Configure the SCAN, and send the alert following for example'
{{#ctx.alerts}}
Document values
{{#sample_documents}}
Source IP {{_source.source.ip}}
Destination IP: {{_source.destination.ip}}
{{/sample_documents}}
Matching queries
{{#associated_queries}}
Query ID: {{id}}
RULE NAME: {{name}}
{{/associated_queries}}
{{/ctx.alerts}}
See the webhook or the destination
Create an ingestion that matches one of your Threat Intel sources.
What is the expected behavior?
My understanding is that the Threat Intelligence trigger an alert based on the findings if it matches the criteria for the scan.
What is your host/environment?
OS: Windows
Version 2.17.0
Do you have any additional context?
Threat Intel findings are being created correctly without any problems, but not the alert which also makes it difficult to send the matches with useful information.
Findings:
Alerts:
Scan alert configuration:
Thank you,
The text was updated successfully, but these errors were encountered:
What is the bug?
The threat intel module is not creating proper alerts after matching the IoCs.
When using the the {{#ctx.alerts}} it returns empty - Different from using standard detectors in the Security Analytics, which I believe the cause is because the alert is not being generated.
How can one reproduce the bug?
Steps to reproduce the behavior:
{{#ctx.alerts}}
Document values
{{#sample_documents}}
Source IP {{_source.source.ip}}
Destination IP: {{_source.destination.ip}}
{{/sample_documents}}
Matching queries
{{#associated_queries}}
Query ID: {{id}}
RULE NAME: {{name}}
{{/associated_queries}}
{{/ctx.alerts}}
What is the expected behavior?
My understanding is that the Threat Intelligence trigger an alert based on the findings if it matches the criteria for the scan.
What is your host/environment?
Do you have any additional context?
Threat Intel findings are being created correctly without any problems, but not the alert which also makes it difficult to send the matches with useful information.
Findings:
Alerts:
Scan alert configuration:
Thank you,
The text was updated successfully, but these errors were encountered: