Skip to main content
Version: 5.0

Creating an Incident Action

After creating a Job, the user can configure Action - the action that the system will perform if the search query in the Job is triggered. For more information, see here.

Example.

Creating an incident using Job Scheduler. For more information about parameters, see here.

Enter the Name and Description of new job.

  • Name - RULE-CS-Sysmon- SystemTimeDiscovery.
  • Description - An adversary may gather the system time and/or time zone from a local or remote system.

Enter the Search, Time interval, Frequency of execution, Suppression of execution, Global Params.

Search:

source sysmon_operational-*
| search event.code="1" AND rule_name_technique_id="T1124"
| rename rule_name_technique_id as mitre_technique_id
| table @timestamp, mitre_technique_id, event.action, host.name, host.ip, user, original_file_name, image, parent_image, command_line, parent_command_line, process_id, parent_process_id, process_guid, parent_process_guid

Time interval:

  • Time interval - Last 30 minut
  • Time interval - @timestamp
  • Duration of the lock (in seconds) - 60

Frequency of execution:

  • Schedule type - Cron Expression
  • Cron - 3-59/5 * * * *
  • Schedule delay - 0

Suppression of execution:

  • Duration - 60 minut
  • Fields for suppression - user

Global Params:

  • Key - guid
  • Value - guid()

To log incidents using a search task, you need to add the Create Incident action in the Active Actions tab. Details on how to configure it are provided on the following page Incident Action.

Description of the incident

Save this job and wait for it to work. To view the created incident, open Main Menu - Incident Manager - Incident Review.

The screenshot shows that SAF recorded the incident. The incident description contains information about the detected event.

Detected Incident