<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic MARS Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/mars-question/m-p/545103#M90074</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm in the process of setting up a mars device and have a query about the way it interprets rules. Basically everything seems to be set up fine and incidents seem to also be working ok, for example I'm getting the usual "inactive reporting device" incidents.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However when I peform some example probes I don't get the response I'm expecting - when I try an IIS Unicode Directory Traversal Vulnerability it catches it fine - but a normal nmap port scan doesn't create an incident. (Although it's definitely there as I can drag it up with a query).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, how do I get mars to pay more attention to a port scan? I can see the rule, and the rule is active but there must be something I'm missing here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This device is crying out for a good book...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Andrew.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 09:58:23 GMT</pubDate>
    <dc:creator>andrew.burns</dc:creator>
    <dc:date>2019-03-10T09:58:23Z</dc:date>
    <item>
      <title>MARS Question</title>
      <link>https://community.cisco.com/t5/network-security/mars-question/m-p/545103#M90074</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm in the process of setting up a mars device and have a query about the way it interprets rules. Basically everything seems to be set up fine and incidents seem to also be working ok, for example I'm getting the usual "inactive reporting device" incidents.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However when I peform some example probes I don't get the response I'm expecting - when I try an IIS Unicode Directory Traversal Vulnerability it catches it fine - but a normal nmap port scan doesn't create an incident. (Although it's definitely there as I can drag it up with a query).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, how do I get mars to pay more attention to a port scan? I can see the rule, and the rule is active but there must be something I'm missing here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This device is crying out for a good book...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Andrew.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mars-question/m-p/545103#M90074</guid>
      <dc:creator>andrew.burns</dc:creator>
      <dc:date>2019-03-10T09:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: MARS Question</title>
      <link>https://community.cisco.com/t5/network-security/mars-question/m-p/545104#M90075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;are you using a system inspection, or a custom inspection rule ? Can you post the parameters of your rule ?&lt;/P&gt;&lt;P&gt;Also, make sure that you use the latest signature update ( Admin &amp;gt; System Maintenance &amp;gt; Upgrade page).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;GNT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Apr 2006 06:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mars-question/m-p/545104#M90075</guid>
      <dc:creator>globalnettech</dc:creator>
      <dc:date>2006-04-16T06:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: MARS Question</title>
      <link>https://community.cisco.com/t5/network-security/mars-question/m-p/545105#M90076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You'll find that the CSMARS rules are a good start, but not complete.  There are more than a few IDS/IPS events that don't bubble up to incidents (i.e. don't trigger a rule match).  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default system rules are based on "event type group". For an IPS alarm to trigger a rule, the IPS alarm has to:&lt;/P&gt;&lt;P&gt;1) be mapped properly as a CSMARS event type.  &lt;/P&gt;&lt;P&gt;2) the event type must be part of an "event type group" in an existing rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't believe it is possible to modify the default "event type"&amp;lt;=&amp;gt;"event type group" mappings in csmars.  I also don't think it's possible to modify the event column of the default system rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, if you want to trigger on this alarm...you have to create your own rule.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Apr 2006 15:27:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mars-question/m-p/545105#M90076</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2006-04-18T15:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: MARS Question</title>
      <link>https://community.cisco.com/t5/network-security/mars-question/m-p/545106#M90077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Andrew&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all, make sure you have enough interesting devices reporting to CS-MARS. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IDS, FW, Netflow events from the network should be a good subset to work with. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port scan can be detected and therefore reported by the IDS, FW. If the port scan traffic is traversing a Router enabled with Netflow and pointing to CS-MARS, you will get enough data from these devices to fire relavent Rules on CS-MARS. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Pradeep &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Apr 2006 01:00:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mars-question/m-p/545106#M90077</guid>
      <dc:creator>pradeeku</dc:creator>
      <dc:date>2006-04-20T01:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: MARS Question</title>
      <link>https://community.cisco.com/t5/network-security/mars-question/m-p/545107#M90078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are there any ref books available on tuning procedures other than the documentation that came with the appliance?  Also, are most users creating their own rules and not using the default system rules?  Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Apr 2006 12:17:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mars-question/m-p/545107#M90078</guid>
      <dc:creator>shanehenning</dc:creator>
      <dc:date>2006-04-27T12:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: MARS Question</title>
      <link>https://community.cisco.com/t5/network-security/mars-question/m-p/545108#M90079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks mhellman - I think I follow that &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are 3 system rules in the category of System: Reconnaissance (Scans: SCADA Modbus, Scans: Stealth and Scans: Targeted) and I mistakenly assumed that my nmap scans should have been picked up by the "Scans: Stealth" rule. However, looking more closely in the reports I found that my scans were being classified as "non-stealth" and hence didn't match any rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created a new rule (called Scans: Non-Stealth) which collects any scans and this rule now gives me the behaviour I wanted (i.e. nmap scans creating incidents).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Andrew.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 May 2006 11:22:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mars-question/m-p/545108#M90079</guid>
      <dc:creator>andrew.burns</dc:creator>
      <dc:date>2006-05-15T11:22:01Z</dc:date>
    </item>
  </channel>
</rss>

