Sure thing.

Take "Windows DC Logon Failure"

it has a bunch of ID's associated, one of them is 4769

that id is "A kerberos ticket was requested", but has a bunch of result
codes, most of which we dont care about.

http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4769


So the rule is classsifying anything that is 4769 as Windows DC logon
Failure.  Even that is too generic.  Was is bad password?  Bad username?
 something else?  Ideally I'd like to lump all the bad password codes/sub
codes together.

what we are having problems with right now is writing a sub decode that
pulls the Result Code from the 4769 event so we can have a rule that say
generates an event of "Password has expired" for 0x17 instead of just
lumping everything into the one area.

ID 675 (
http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=675)
is the same, shows up as "windows DC logon failure" but gives no indication
of what the failure code is.  Again, we'd like to put in a sub decoder to
pull failure code so we could use it in rules to more accurately label the
type of failure.

so ideally we would go and pickout error codes that should go together,
that generally mean the same things (bad password, bad username, etc etc)
and put them all together in a rule.  Report them as the same kind of
alert.  It's al ittle frustrating to be trying to rewrite some of this
stuff as not all of it is documented.  For example. the sub decoders, very
little is written on how it all actually works and we are unsure if we can
add a new field? such as error_code or if we have to use extra_data? or
something else?  How do we add these sub decoders and still have the main
decoder process things?

Am I missing something?  this is how I am understanding it looking at what
I have in front of me.

Zate


On Wed, May 16, 2012 at 8:59 PM, Michael Starks <
ossec-l...@michaelstarks.com> wrote:

> On 05/14/2012 11:26 AM, Zate wrote:
>
>> How did you deal with the windows event ID issue in the rules? Some of
>> the ways the events are grouped do not make sense.  It's not using the
>> sub event ID as far as I can tell so it is lumping alerts of differing
>> kinds together.  This was something we found when putting the alerts
>> into splunk, things like wrong password were spread
>> across multiple different event ID's and handled differently by
>> different rules.  made it hard to get like events all grouped together.
>>
>
> I'm not sure I entirely understand your issue, but I would like to. What
> do you mean about "sub event ID?" As to the lumping alerts together, that
> is by design unless you change the option to not group alerts.
>

Reply via email to