Hello Paul,
The described use case can be implemented using Wazuh rules and as an example the Windows rule
https://github.com/wazuh/wazuh/blob/master/ruleset/rules/0580-win-security_rules.xml#L1070 :
<rule id="60204" level="10" frequency="$MS_FREQ" timeframe="240">
<if_matched_group>authentication_failed</if_matched_group>
<same_field>win.eventdata.ipAddress</same_field>
<options>no_full_log</options>
<description>Multiple Windows logon failures.</description>
<mitre>
<id>T1110</id>
</mitre>
<group>authentication_failures,gdpr_IV_32.2,gdpr_IV_35.7.d,hipaa_164.312.b,nist_800_53_AC.7,nist_800_53_AU.14,nist_800_53_SI.4,pci_dss_10.2.4,pci_dss_10.2.5,pci_dss_11.4,tsc_CC6.1,tsc_CC6.8,tsc_CC7.2,tsc_CC7.3,</group>
</rule>It is using the attributes frequency and timeframe (
https://documentation.wazuh.com/current/user-manual/ruleset/ruleset-xml-syntax/rules.html#rule) to implement the correlation.
On the other hand, the Anomaly detection module (
https://opensearch.org/docs/latest/monitoring-plugins/ad/index/) works separately and does not trigger an alert into Wazuh indices but in its own dashboard as shown below:
.png?part=0.2&view=1)
I have defined a simple detector that would trigger an alert (in the anomaly detection dashboard) whenever the root user is detected twice in a frame time of 2 mins:
.png?part=0.1&view=1)
Hope this helps.
Regards,
Wali