Wazuh: Log Analysis Queries with Use Cases for Effective Network Security Monitoring | Part-2
Here are some more queries you can use with Wazuh SIEM to search and analyze logs:
Search for Successful Logins:
- Identify successful login events to monitor user activity.
sqlSELECT * FROM alerts WHERE rule.category = 'authentication_successful';
Search for Suspicious Processes:
- Look for alerts related to suspicious processes or executables.
sqlSELECT * FROM alerts WHERE rule.category = 'ossec' AND rule.description LIKE '%suspicious%';
Search for Network Traffic:
- Find alerts related to network activity or suspicious network connections.
sqlSELECT * FROM alerts WHERE rule.category = 'network_traffic';
Search for Brute Force Attacks:
- Identify brute force attacks by looking for multiple failed login attempts.
sqlSELECT * FROM alerts WHERE rule.description LIKE '%brute force%' AND severity >= 7;
Search for Malware Activity:
- Look for alerts related to malware detection or suspicious file activity.
sqlSELECT * FROM alerts WHERE rule.category = 'malware';
Search for File Integrity Changes:
- Identify changes to critical system files or directories.
sqlSELECT * FROM alerts WHERE rule.category = 'file_integrity';
Search for Anomalies:
- Look for anomalies or deviations from normal behavior using statistical analysis.
sqlSELECT * FROM alerts WHERE rule.category = 'anomaly_detection';
Search for Exploits or Vulnerabilities:
- Identify alerts related to known exploits or vulnerabilities.
sqlSELECT * FROM alerts WHERE rule.category = 'vulnerability';
Search for Rootkit Detection:
- Look for alerts related to rootkit detection or suspicious system modifications.
sqlSELECT * FROM alerts WHERE rule.category = 'rootkit_detection';
Search for Firewall Events:
- Identify alerts related to firewall activity or blocked connections.
sqlSELECT * FROM alerts WHERE rule.category = 'firewall';
These additional queries provide further options for analyzing various types of security events and threats within your environment. You can tailor these queries to your specific use cases and security monitoring requirements to effectively detect and respond to potential security incidents.
Wazuh: Log Analysis Queries with Use Cases for Effective Network Security Monitoring | Part-1
Wazuh: Log Analysis Queries with Use Cases for Effective Network Security Monitoring | Part-3
Post a Comment