-
|
Hello, Event 1: Windows Security Event 4688 The detection logic I want is: My problem is that Event 1 and Event 3 come from the same log source (Windows Security), so I can write a Sigma rule combining those two. But Event 2 is from a different log source (Sysmon), and Sigma only supports one log source per rule. This means I cannot combine Event 2 and Event 3 in one rule. How can I implement the above logic in Sigma? Thank you!Below is an example of how I wanted to implement it. action: global logsource:
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
|
You simply use correlations https://blog.sigmahq.io/introducing-sigma-correlations-52fe377f2527 Also i suggest you read the specs of sigma in order to have an overview of its capabilities. As correlations were introduced over a year ago. |
Beta Was this translation helpful? Give feedback.
You simply use correlations https://blog.sigmahq.io/introducing-sigma-correlations-52fe377f2527
https://sigmahq.io/docs/meta/correlations.html
Also i suggest you read the specs of sigma in order to have an overview of its capabilities. As correlations were introduced over a year ago.