Hello dear community,
I tried for some time to make a specific rule works that would lower down the level of alert to 0. The thing is, I have a network scanner in my environment and I want to exclude specific IP from generating alerts.
Original rule looks like this
<rule id="60122" level="5">
<if_sid>60105</if_sid>
<field name="win.system.eventID">^529$|^4625$</field>
<description>Logon Failure - Unknown user or bad password</description>
<options>no_full_log</options>
<group>authentication_failed,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_35.7.d,gdpr_IV_32.2,hipaa_164.312.b,nist_800_53_AU.14,nist_800_53_AC53_AC.7,tsc_CC6.1,tsc_CC6.8,tsc_CC7.2,tsc_CC7.3,</group>
<mitre>
<id>T1531</id>
</mitre>
</rule>
<rule id="60204" level="10" frequency="$MS_FREQ" timeframe="240">
<if_matched_group>authentication_failed</if_matched_group>
<same_field>win.eventdata.ipAddress</same_field>
<description>Multiple Windows Logon Failures</description>
<options>no_full_log</options>
<group>authentication_failures,pci_dss_10.2.4,pci_dss_10.2.5,pci_dss_11.4,gdpr_IV_35.7.d,gdpr_IV_32.2,hipaa_164.312.b,nist_800_53_AU.14,nist_800_5_800_53_AC.7,nist_800_53_SI.4,tsc_CC6.1,tsc_CC6.8,tsc_CC7.2,tsc_CC7.3,</group>
<mitre>
<id>T1110</id>
</mitre>
</rule>
This rule is part of 0580-win-security_rules.xml (default rule)
I have written my own rules to customize the default ones
<rule id="160117" level="0">
<if_sid>60105</if_sid>
<field name="win.system.eventID">^529$|^4625$</field>
<field name="win.eventdata.ipAddress">x:x:x:0010::f173</field>
<match>This event is generated when a logon request fails</match>
<description>Logon Failure - Unknown user or bad password</description>
<options>no_full_log</options>
</rule>
<rule id="160118" level="0" frequency="$MS_FREQ" timeframe="240">
<if_matched_group>authentication_failed</if_matched_group>
<same_field>win.eventdata.ipAddress</same_field>
<field name="win.eventdata.ipAddress">x:x:x:0010::f173</field>
<match>This event is generated when a logon request fails</match>
<description>Multiple Windows Logon Failures</description>
<options>no_full_log</options>
</rule>
This rule is part of 0581-win-security_rules_xxx.xml
One thing I need to point out, I am using
<match> and I guess and based on documentation, I am matching something from the
full_log field (maybe I am totally wrong) and I have
This event is generated when a logon request fails in the log (picture below). So I am really not sure what is wrong here.

Tnx in advance for help