12-07-2018 04:31 AM - edited 03-12-2019 07:09 AM
Firepower 6.2.3.7
I have a basic Snort rule that is functional, but when it fires the intrusion event comes in as an impact 3.
If I read the documentation correctly I should be able to customize the rule to force it to be reported as impact 1 using the metadata tag with the key/keyword: impact_flag red
Though the rule editor accepts the metadata info, the intrusion event remains an impact 3.
Has anybody had experience with this?
I talked to TAC but because it is a custom rule they are not able to help.
We only do email/alerting based upon impact 1 - thus the requirement.
As a workaround I built a correlation rule/event - but looks like a bug is causing old events to be alerted on every time the FMC pair performs a sync - so that's not so helpful
Thanks in advance for any assistance
12-07-2018 07:54 AM
12-07-2018 08:00 AM
Sorry Phil, I should have already done that:
alert tcp $HOME_NET any -> any 80 (sid:1000728; gid:1; pcre:"/index\.php\?token=[a-zA-Z0-9]+&dc=1/"; metadata:impact_flag red, service http; msg:"IPCO - Incident Related Outbound Malicious Indicator"; classtype:bad-unknown; rev:23; )
Pretty basic, as I mentioned I do get the intrusion event firing - just the impact level comes in at 3 vs 1 (desired)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide