Ok, I will explain all this to you more properly.
First, a bit of context:
I work on a Proxmox server where I installed a Firewall PfSense router with three interfaces (LAN, DMZ, WAN) with different "user" VMs and as well as servers (web and bdd).
So I installed Wazuh and Suricata to monitor my machines and my network. Not having much time for this project, I preferred to install Wazuh by the script provided, although in other projects I had the opportunity to install everything manually (with ELK). That's why I'm a little lost, I can't find the configuration files I used to. Indeed, in previous projects, I had used Logstash to code in Ruby various filters such as deleting fields, modifying them, filtering logs according to files (with REGEX), adding tags or information to certain specific alerts, etc.
For example, on Logstash, I had created a regex that filtered if the alerts came from Suricata or from Wazuh and thus returned the output to two different indexes.
In this project, I don't really have any fields to modify or other bugs to fix on Logstash for the moment, but I still wanted to know how to do it if necessary. As far as false positives go, that's a pretty complicated question for me. Indeed, currently, my false positives are alerts of the type "Suricata: Alert -GPL ICMP_INFO PING *NIX" corresponding to a known IP address. There are also alerts of the "Host-based abnormaly detection event" type which is redundant. Of course, I can't "remove" these false positives by filtering the rule (somehow) because I can't risk missing an alert that might turn out to be true. My idea is therefore to create a tag that would be added automatically to each selected alert, in order to identify potential false positives but while being able to view and analyze them, if necessary. Nothing goes by the wayside.
For example, add a "PFP" tag for "Potential False Positive" on alerts of the type "Suricata: Alert -GPL ICMP_INFO PING *NIX" for defined IPs. However, this recursive tag addition, cannot be done via Filebeat? I know very little about Filebeat unlike Logstash.
With Logstash, I would have made a condition on the corresponding field, to verify that it is equal to "Suricata: Alert -GPL ICMP_INFO PING *NIX" and a second condition that would look in a white list of IPs (defined in prior) if the source IP of the alert is registered or not.
Do you see the idea?
Thanks for reading.
Cyprien.