LCE – SGBox Next Generation SIEM & SOAR https://www.sgbox.eu Next Generation SIEM & SOAR Fri, 18 Apr 2025 10:47:13 +0000 en-US hourly 1 https://wordpress.org/?v=6.8 https://www.sgbox.eu/wp-content/uploads/2025/02/cropped-SGBox-symbol-png-32x32.webp LCE – SGBox Next Generation SIEM & SOAR https://www.sgbox.eu 32 32 LCE Rules https://www.sgbox.eu/en/knowledge-base/lce_rules/ Tue, 15 Apr 2025 08:44:17 +0000 https://www.sgbox.eu/?post_type=epkb_post_type_1&p=30826 LCE β†’ Rules

πŸ“ Add and modify new rule

This page allows you to create and edit a rule.

A correlation rule is used to alert the admin when an event, or a series of events, occur in a specified time range.

βœ”οΈ Requirements:

  • A mail server must be configured. Check the Configure a Mail server section for setup instructions.
  • The pattern must belong to a specific class and be assigned to hosts.

Using the SGBox web interface: SGBox β†’ LCE β†’ Rules

  1. The plus icon opens the rule creation page.
  2. The play icon redirects the user to the edit page with a test view.
  3. The clone icon opens a modal that allows the user to fill in the name and description fields.
  4. The edit icon redirects the user to the edit page for modifications.
  5. The trash icon highlights the row in red and enables the delete button (6).

LCE Rules

πŸ› οΈ Rule Creation Interface

  1. Left Section: Users can select one or more patterns to include in the rule. To choose a category, click on the category navigation button.
  2. Right Section (Pattern/category Containers): Displays selected elements with their associated parameters. Categories show only common parameters among patterns.
  3. Header Section: Defines time intervals and shows available actions triggered by the Rule Engine.
  4. Bottom Section: Contains the test and save buttons.

LCE Rules

Clicking on the show actions button opens a sidebar displaying the available actions.

LCE Rules


πŸš€ Actions

βœ‰οΈ Send Mail

Parameter Description
recipient Enter a list of valid email addresses separated by commas.
email subject When triggered, an email with the specified subject will be sent to all recipients.

LCE Rules


πŸ—“οΈ Generate Event

Parameter Description
host The event will be registered using localhost or the host associated with the event.
class The selected class will be linked to the generated event. You can create a new class if needed.
subfamily The selected subfamily will be associated with the event. The rule inherits its score.
event Specify the name and description of the event.
Parameters Select up to 10 parameters to include in the event. Parameters from different patterns/categories cannot be duplicated.
Issue aggregation Refers to the IM Module.

LCE Rules


✍️ Generate Log

Parameter Description
log line test Creates a log entry in SGBox upon rule trigger. View logs via LM β†’ Analysis β†’ Historical Search.
Rule Pattern Displays a dropdown with pattern parameters, allowing values to be assigned.

LCE Rules


πŸ“‹ Add To List

Parameter Description
List The selected pattern will be added to the list if not already present.
Parameters The parameter to add to the selected list.

LCE Rules


</> Execute Script

Parameter Description
Log Line Text Creates a log entry in SGBox when the rule is triggered. View logs via LM β†’ Analysis β†’ Historical Search.
Host Specify the host (IP address or hostname) where the script is located.
User name Provide the username for access.
Password Provide the associated password.
Script Path Specify the script’s location.
Script Arguments Arguments passed to the script.
Rule patterns Displays a dropdown with pattern parameters, allowing values to be assigned.

LCE Rules


πŸ’» Execute Application

Parameter Description
Applications The selected application will execute upon rule trigger.
Action Defines the action the application will perform.
Application arguments Arguments passed to the application.
Rule patterns Displays a dropdown with pattern parameters, allowing values to be assigned.

LCE Rules


πŸ“² Call API

Parameter Description
API Url The URL of the API to call when the rule is triggered.
Data Fields The selected parameter will be sent via GET request by default.
Use POST If enabled, all parameters will be sent using a POST request in JSON format.

LCE Rules


πŸ“Œ Practical Example

This rule is designed to identify suspicious behavior where a failed login attempt to SGBox is immediately followed by a successful login and a user modification action. Such a sequence could indicate an unauthorized attempt to gain access and alter user credentials.

To make the detection more precise, the rule is configured to trigger only outside regular working hours by setting the time interval to Non-Working Hours. Additionally, it applies only if the access attempt is made by a specific user listed in a predefined group. The first pattern is restricted to localhost, meaning only login attempts on the local machine are considered relevant.

To ensure the integrity of the detection process, the rule verifies that all events originate from the same machine by enabling the Previous Host option. This prevents unrelated events from being linked together incorrectly. Furthermore, the Relative Column is used to maintain consistency in event parameters, ensuring that the entire sequence follows a logical flow before triggering an alert.

LCE Rules
LCE Rules

At this point, the rule must be saved. By clicking the Save button in the Bottom Section, a modal window will appear with the following fields:

Β 
Name The name of the rule, which can be up to 255 characters long. This field is required.
Description A description of the rule, which can be up to 255 characters long. This field is also required.
Score The value inherited from the subfamily when the Generate Event action is set. Otherwise, it will default to 0.
Enable Rule If set to true, the Rule Engine will analyze the event of this rule to determine when to trigger it.
Retention Defines after how many days the rule’s history will be deleted (this value is displayed on the main page).
Timeout This value specifies the number of seconds in which the event chain must occur.

After configuring these parameters, you can confirm the operation and save the rule.

LCE Rules

After saving the rule, the next step is to set an action and notify the administrators when the rule is triggered. To do so, you will need to configure the “send mail” action and save the entire rule.

LCE Rules

Once the action is set, it is important to enable the rule so that it can be considered by the Rule engine. Additionally, the retention value must be configured appropriately.

LCE Rules

Here is an example of the email that the administrator will receive once the rule is triggered. The email includes the count of the times the rule has been triggered, as well as all relevant patterns and their details, providing the necessary information to ensure proper understanding of the event that occurred.

LCE Rules

βž• Additional Actions:

  • Swap: Swaps the container with the next selected one.
  • Resize: Shrinks the container, displaying only the pattern name.
  • Delete: Removes the pattern from the rule.

LCE Rules

πŸ”Ž Test View

The Test View provides a way to preview events that match the previously defined rule flow. You can access this view by clicking the Test button. In essence, when one or more triggers occur, this view allows you to verify the corresponding events.

The page is divided into two main sections:

  • Upper Section: Displays an intuitive chart that visually represents the event flow.
  • Bottom Section: Lists the events along with their parameter values.

Users can adjust the time range to refine their analysis. However, it is important to note that rules are a powerful toolβ€”using an excessively wide time range may result in long processing times.

When filters are applied, they appear on the left side of the interface, as shown in the image below. Otherwise, the chart expands to occupy the full available space.

Clicking on an event in the chart automatically filters the table below to display relevant details.

  • N/A indicates that the pattern does not collect that specific parameter.
  • Please note: To ensure an accurate test, make sure that the latest changes have been saved before executing the test.

LCE Rules

πŸ”§ Operators

The various operators are explained below:

Operator Description
Equals Matches values that are exactly the same.
Differs Matches values that are different.
Greater than Matches values that are strictly greater than the specified value.
Lower than Matches values that are strictly lower than the specified value.
Greater or equal Matches values that are greater than or equal to the specified value.
Lower or equal Matches values that are lower than or equal to the specified value.
Contains a substring Matches values that include a specified substring.
Belongs to a set Matches values that exist in a predefined set.
Does not belongs to a set Matches values that do not exist in a predefined set.
Belongs to a network Matches IPs that are within a specified network range.
Does not belongs to a network Matches IPs that are outside a specified network range.
Belongs to a time range Matches values that fall within a specific time range.
Does not belong to a time range Matches values that fall outside a specific time range.
Belong to a set – regexp Matches values that conform to a regular expression within a predefined set.
Does not belong to a set – regexp Matches values that do not conform to a regular expression within a predefined set.
Belongs to a set – regexp (case insensitive) Matches values (case insensitive) that conform to a regular expression within a predefined set.
Does not belong to a set – regexp (case insensitive) Matches values (case insensitive) that do not conform to a regular expression within a predefined set.
Regular expression search Matches values using a specified regular expression.
Regular expression search (case insensitive) Matches values using a case-insensitive regular expression.
host:port corresponds to a vulnerable host:port Matches hosts and ports that are identified as vulnerable.
host:port is associated with a known vulnerability Matches hosts and ports linked to documented vulnerabilities.
This host has been tested with NVS module Matches hosts that have been analyzed using the NVS module.
Host: port is down Matches hosts or ports that are unreachable.
Host port is up Matches hosts or ports that are active and reachable.
A value in left set belongs to a value in right set Matches when at least one value from the left set is present in the right set.
This value has a reputation Matches values that have a known reputation score.
Belong to a list Matches values that exist in a predefined list.
Does not belong to a list Matches values that do not exist in a predefined list.
Is longer than Matches values that exceed a specified length.
is shorter than Matches values that are below a specified length.
Belongs to a list (exact match) Matches values that exactly match an entry in the list.
Matches with list Matches values that have at least one common element with a predefined list.
Match with text Matches values against a list of regular expressions.

]]>
Multiple events correlation rule https://www.sgbox.eu/en/knowledge-base/multiple-events-correlation-rule/ Thu, 08 Apr 2021 10:26:39 +0000 http://10.253.1.91/?post_type=epkb_post_type_1&p=6250

The multi-events correlation rules

A correlation rule is used to alert the admin when an event, or a series of events, occur in a specified time range.
In order to create a multi-events rule following requirements are needed:

Requirements:

  • A mail server must be configured. Look Configure a Mail server section to see how to configure a mail server.
  • Pattern must belong to specific class.

Using the SGBox web interface: SGBOX > LCE > Rules
Multiple events correlation rule

Clink on New Rule

Multiple events correlation rule

On the left section,tab Events, find the interested events and drag it in correct section on the right.

Multiple events correlation rule

Timeout is the maximum time between the fist and last event.
In this case rule has been verified if: at least three login fail happen within 300 seconds.

You can make the rule more specif by connect some parameters between the events:
Selecting the down arrow the events menu is shown, you can select the Previous Host option in order to tell SGBox that second event must be occur on the same host as previous.
Select in the Relative column to connect the parameter between events.
In this case the second event’s TargetUserName must be the same as first event’s TargetUserName.
Multiple events correlation rule

We tell SGBox also that:

  • the third event must be occur on the same host as second
  • third event’s TargetUserName must be the same as second event’s TargetUserName

Multiple events correlation rule

Click on Save to save the rule.
Give a name, description, and click on Active flag to enable it.

]]>