I'd like to filter out some noisy recurring windows events that get often fired by windows clients. Not sure what will be the best approach to do this.
For instance I have this json event and want to select the following matching criteria.
If processName and subjectUserName and privilegeList are matching do not send this to wazuh manager. Where do I set this? Groups=>files=>agents.conf ?
Thanks for any help.
"_index": "wazuh-alerts-4.x-2022.08.23",
"_type": "_doc",
"_id": "RZc-y4IBMk0islnOdCL0",
"_version": 1,
"_score": null,
"_source": {
"input": {
"type": "log"
},
"agent": {
"ip": "XXXXXXXXXXX",
"name": "XXXXXXXX",
"id": "022"
},
"manager": {
"name": "XXXXXXXXXX"
},
"data": {
"win": {
"eventdata": {
"subjectLogonId": "0x11be23",
"subjectUserSid": "xxxxxxxxxxxxxxxxxxxxxxx",
"processId": "0x4888",
"processName": "C:\\\\Program Files (x86)\\\\National Instruments\\\\NI Device Monitor\\\\DeviceMonitor.exe",
"subjectDomainName": "XXXXXX",
"objectServer": "Security",
"privilegeList": "SeTcbPrivilege",
"subjectUserName": "XXXXX"
},
"system": {
"eventID": "4673",
"keywords": "0x8010000000000000",
"providerGuid": "{54849625-5478-4994-a5ba-3e3b0328c30d}",
"level": "0",
"channel": "Security",
"opcode": "0",
"message": "\"Ein privilegierter Dienst wurde aufgerufen.\r\n\r\nAntragsteller:\r\n\tSicherheits-ID:\t\tS-1-5-21-1571561004-1390823723-312552118-2424\r\n\tKontoname:\t\tXXX\r\n\tKontodomäne:\t\tXXXX\r\n\tAnmelde-ID:\t\t0x11BE23\r\n\r\nDienst:\r\n\tServer:\tSecurity\r\n\tDienstname:\t-\r\n\r\nProzess:\r\n\tProzess-ID:\t0x4888\r\n\tProzessname:\tC:\\Program Files (x86)\\National Instruments\\NI Device Monitor\\DeviceMonitor.exe\r\n\r\nDienstanforderungsinformationen:\r\n\tBerechtigungen:\t\tSeTcbPrivilege\"",
"version": "0",
"systemTime": "2022-08-23T15:07:22.0744198Z",
"eventRecordID": "9154671",
"threadID": "20560",
"computer": "XXXXXX",
"task": "13056",
"processID": "4",
"severityValue": "AUDIT_FAILURE",
"providerName": "Microsoft-Windows-Security-Auditing"
}
}
}
Many thanks.
Regards
Marco