Skip to content

Commit

Permalink
Merge branch 'main' into fix/BitDefender
Browse files Browse the repository at this point in the history
  • Loading branch information
squioc authored Jan 2, 2025
2 parents 339e5b2 + 1922672 commit 2ac41b6
Show file tree
Hide file tree
Showing 10 changed files with 88 additions and 11 deletions.
1 change: 1 addition & 0 deletions Bitdefender/gravityzone/_meta/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,3 +9,4 @@ data_sources:
Authentication logs:
Network device logs:
File monitoring:
automation_module_uuid: 26277889-b91b-46d0-8bac-7f6b2f6fb9a3
2 changes: 1 addition & 1 deletion GateWatcher/aioniq_ecs/_meta/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,4 @@ description: >-
data_sources:
Network intrusion detection system: AIONIQ identify suspicious behaviors
Network protocol analysis: AIONIQ analyze traffic protocol

automation_module_uuid: 65d0b877-3e3c-4ce8-b184-1db084a1acd3
4 changes: 2 additions & 2 deletions Palo Alto Networks/paloalto-ngfw/_meta/fields.yml
Original file line number Diff line number Diff line change
Expand Up @@ -258,9 +258,9 @@ paloalto.authentication.method:
name: paloalto.authentication.method
type: keyword

paloalto.authetification.profile:
paloalto.authentication.profile:
description: The authentication profile
name: paloalto.authetification.profile
name: paloalto.authentication.profile
type: keyword

paloalto.connection.method:
Expand Down
7 changes: 4 additions & 3 deletions Palo Alto Networks/paloalto-ngfw/ingest/parser.yml
Original file line number Diff line number Diff line change
Expand Up @@ -599,7 +599,7 @@ pipeline:
properties:
raise_errors: false
input_field: "{{parsed_event.message.EventDescription}}"
pattern: "%{SYSTEM_AUTH_AUTHENTICATION_FOR}|%{CONNECTION}|%{CONTENT}|%{WILDFIRE}|%{NETWORK}|%{PANDB_GENERIC}|%{CLOUD_ELECTION}|%{AUTHENTICATION}|%{REASON1}|%{REASON2}|%{REASON3}|%{REASON4}|%{REASON5}"
pattern: "%{SYSTEM_AUTH_AUTHENTICATION_FOR}|%{CONNECTION}|%{CONTENT}|%{WILDFIRE}|%{NETWORK}|%{PANDB_GENERIC}|%{CLOUD_ELECTION}|%{AUTHENTICATION}|%{REASON}"
custom_patterns:
SYSTEM_AUTH_AUTHENTICATION_FOR: "authenticated for user '%{USERNAME:user}'. auth profile '%{DATA:auth_profile}', vsys '%{DATA:vsys}', server profile '%{DATA:server_profile}', server address '%{HOSTNAME:server_address}', From: %{IP:src}."
CONNECTION: "%{CONNECTION_SUCCESS}|%{CONNECTION_TO_SERVER}|%{CONNECTION_REGISTERED}"
Expand All @@ -624,10 +624,11 @@ pipeline:
AUTHENTICATION: "%{AUTHENTICATION_CONSOLE}|%{AUTHENTICATION_WEB}"
AUTHENTICATION_CONSOLE: "authenticated for user '%{USERNAME:user}'. From: %{IP:src}."
AUTHENTICATION_WEB: "User %{USERNAME:user} logged in via %{DATA} from %{IP:src} using %{DATA:proto}"
REASON: "%{REASON1}|%{REASON2}|%{REASON3}|%{REASON4}|%{REASON5}"
REASON1: 'User-ID server monitor %{HOSTNAME:hostname}\(%{WORD:vsys}\) %{GREEDYDATA:message}'
REASON2: "ldap cfg %{WORD:config_name} connected to server %{IP:destination_ip}:%{INT:port}, initiated by: %{IP:source_ip}"
REASON3: "When authenticating user '?%{WORD:user}'? from '?%{IP:source_ip}'?, a less secure authentication method %{WORD:auth_method} is used. Please migrate to %{WORD:recommended_methods1} or %{DATA:recommended_methods2}. Authentication Profile '?%{WORD:auth_profile}'?, vsys '?%{WORD:vsys}'?, Server Profile '?%{WORD:server_profile}'?, Server Address '?%{IP:destination_ip}'?"
REASON4: "failed authentication for user %{WORD:user}. Reason: %{GREEDYDATA:reason} auth profile %{WORD:auth_profile}, vsys %{WORD:vsys}, server profile %{WORD:server_profile}, server address %{IP:destination_ip}, auth protocol %{WORD:auth_protocol}, From: %{IP:source_ip}"
REASON4: "failed authentication for user %{USERNAME:user}. Reason: %{GREEDYDATA:reason} auth profile %{DATA:auth_profile}, vsys %{WORD:vsys}, server profile %{WORD:server_profile}, server address %{IP:destination_ip}, auth protocol %{WORD:auth_protocol}, From: %{IP:source_ip}."
REASON5: 'authenticated for user %{WORD:user}\. auth profile %{WORD:auth_profile}, vsys %{WORD:vsys}, server profile %{DATA:server_profile}, server address %{IP:destination_ip}, auth protocol %{WORD:auth_protocol}, admin role %{WORD:admin_role}, From: %{IP:source_ip}\.'
filter: '{{parsed_event.message.get("EventDescription") != None}}'

Expand Down Expand Up @@ -918,7 +919,7 @@ stages:
paloalto.threat.id: "{{parsed_event.message.ThreatID or parsed_event.message.PanOSThreatID or parsed_threat.message.threat_code}}"
paloalto.threat.name: "{{parsed_threat.message.threat_description}}"
paloalto.vsys: "{{parsed_description.message.vsys}}"
paloalto.authetification.profile: "{{parsed_description.message.auth_profile}}"
paloalto.authentication.profile: "{{parsed_description.message.auth_profile}}"
paloalto.server.profile: "{{parsed_description.message.server_profile}}"
paloalto.tls.chain_status: "{{parsed_event.message.ChainStatus}}"
paloalto.tls.root_status: "{{parsed_event.message.RootStatus}}"
Expand Down
2 changes: 1 addition & 1 deletion Palo Alto Networks/paloalto-ngfw/tests/system_csv.json
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@
"DGHierarchyLevel4": "0",
"EventID": "auth-success",
"Threat_ContentType": "auth",
"authetification": {
"authentication": {
"profile": "GP"
},
"server": {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@
"DGHierarchyLevel4": "0",
"EventID": "auth-success",
"Threat_ContentType": "auth",
"authetification": {
"authentication": {
"profile": "FFFF"
},
"server": {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@
"DGHierarchyLevel4": "0",
"EventID": "auth-success",
"Threat_ContentType": "auth",
"authetification": {
"authentication": {
"profile": "FFFF"
},
"server": {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@
"DGHierarchyLevel4": "0",
"EventID": "auth-success",
"Threat_ContentType": "auth",
"authetification": {
"authentication": {
"profile": "FWPA"
},
"server": {
Expand Down
74 changes: 74 additions & 0 deletions Palo Alto Networks/paloalto-ngfw/tests/test_system_event_14.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,74 @@
{
"input": {
"message": "1,2024/12/16 20:19:04,016301013072,SYSTEM,auth,2561,2024/12/16 20:19:04,,auth-fail,ESA-AUTH,0,0,general,medium,\"failed authentication for user john.doe. Reason: Authentication request is timed out. auth profile ESA-AUTH, vsys vsys1, server profile ESA, server address 1.2.3.4, auth protocol PAP, From: 5.6.7.8.\",7439393285273531690,0x0,0,0,0,0,,FWPADC1,0,0,2024-12-16T20:19:04.851+01:00",
"sekoiaio": {
"intake": {
"dialect": "Palo Alto NGFW",
"dialect_uuid": "903ec1b8-f206-4ba5-8563-db21da09cafd"
}
}
},
"expected": {
"message": "1,2024/12/16 20:19:04,016301013072,SYSTEM,auth,2561,2024/12/16 20:19:04,,auth-fail,ESA-AUTH,0,0,general,medium,\"failed authentication for user john.doe. Reason: Authentication request is timed out. auth profile ESA-AUTH, vsys vsys1, server profile ESA, server address 1.2.3.4, auth protocol PAP, From: 5.6.7.8.\",7439393285273531690,0x0,0,0,0,0,,FWPADC1,0,0,2024-12-16T20:19:04.851+01:00",
"event": {
"category": [
"authentication"
],
"dataset": "system",
"reason": "Authentication request is timed out.",
"type": [
"info"
]
},
"@timestamp": "2024-12-16T19:19:04.851000Z",
"action": {
"name": "auth-fail",
"type": "auth"
},
"destination": {
"address": "1.2.3.4",
"ip": "1.2.3.4"
},
"log": {
"hostname": "FWPADC1",
"level": "medium",
"logger": "system"
},
"observer": {
"name": "FWPADC1",
"product": "PAN-OS",
"serial_number": "016301013072"
},
"paloalto": {
"DGHierarchyLevel1": "0",
"DGHierarchyLevel2": "0",
"DGHierarchyLevel3": "0",
"DGHierarchyLevel4": "0",
"EventID": "auth-fail",
"Threat_ContentType": "auth",
"authentication": {
"profile": "ESA-AUTH"
},
"server": {
"profile": "ESA"
},
"vsys": "vsys1"
},
"related": {
"ip": [
"1.2.3.4",
"5.6.7.8"
],
"user": [
"john.doe"
]
},
"source": {
"address": "5.6.7.8",
"ip": "5.6.7.8"
},
"user": {
"name": "john.doe"
}
}
}
3 changes: 2 additions & 1 deletion Palo Alto Networks/paloalto-prisma-access/_meta/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
uuid: ea265b9d-fb48-4e92-9c26-dcfbf937b630
uuid: ea265b9d-fb48-4e92-9c26-dcfbf937b630
name: Palo Alto Prisma access
slug: paloalto-prisma-access
description: >-
Expand All @@ -10,3 +10,4 @@ data_sources:
Authentication logs: Prisma Access monitor authentications to resources
Web logs: Prisma Access monitor and logs HTTP requests
Web application firewall logs: Prisma Access monitor and logs network traffic
automation_module_uuid: 64a3b634-605d-4d69-a203-3a53c0474cae

0 comments on commit 2ac41b6

Please sign in to comment.