Hi all, I found on openai a possible solution to create an alert about multiple connection for the same login or anomaly detection using IP data information and a time range to reduce false positive about users traveling:
To create a rule in Wazuh that detects multiple source IP addresses for the same login within a given time range, you can use Wazuh's threat detection module and define a custom rule based on authentication logs. You can take advantage of Wazuh's time correlation features to set the time range. Here's how you can do it:
1. **Log in to your Wazuh server**: Log in to your Wazuh server via SSH or a local session.
2. **Navigate to the custom rules directory**: Usually, custom Wazuh rules are created in the `/var/ossec/etc/rules/local` directory on the Wazuh server.
3. **Create a new rule file**: Use a text editor, such as `nano` or `vi`, to create a new rule file within the local directory. For example:
```
sudo nano /var/ossec/etc/rules/local/your_custom_rules.xml
```
Replace `your_custom_rules` with a descriptive name for your rule.
4. **Define Rule**: Enter the definition of your rule in the XML file. Here is an example of a rule to locate multiple source IP addresses for the same login within a given time interval (e.g., 10 minutes):
```xml
<group name="authentication">
<rule id="100001" level="5">
<decoded_as>json</decoded_as>.
<description>Detects multiple source IPs for the same login in the time range</description>.
<options>timefr Translated with
www.DeepL.com/Translator (free version)