Getting to Know Chronicle SIEM: Building a Single Event Rule - String Match

In this post, we’re going to build a single event rule in Chronicle SIEM using string matching, which will serve as a foundation for future rule building concepts.

In previous videos, we have touched on the structure of the rule, operators, and variables, so this is an opportunity to put these pieces all together.

For a single event rule, we need a minimum of three sections; meta, events and condition. We need to identify the relevant fields in UDM to use in our rule logic and then we need to add values in the form of strings against those fields. Because we are using strings, these values will be enclosed in double quotes.

jstoner_0-1698964712459.png

Follow along in the video below to see in action how to build a single event rule.

 

Remember when you start building rules, that the meta, events, and condition sections are always included. UDM search is often a good place to view events and their fields and value as you explore your data, and when building your criteria, use double quotes for string values.

jstoner_2-1698964754514.png

Check out these additional resources with more information and learning opportunities:

Contributors
Version history
Last update:
‎11-06-2023 02:07 PM
Updated by: