Alert Configuration

Detection rules, thresholds, and suppression policies

Total Rules

20

Active Rules

18

Disabled Rules

2

High FP Rate (>30%)

4

Rule IDNameTypeSeverityConditionLog SourceLast TriggeredTriggers (7d)FP RateMITRESuppressionEnabledActions
RULE-001

SSH Brute Force Detection

ThresholdCritical

>50 failed SSH auths in 60s from same src IP

syslog/auth07:18:29474.2%T11105 min
Edit rule
Delete rule — cannot be undone
RULE-002

SQL Injection Pattern Match

SignatureHigh

HTTP request body matches SQLI regex patterns

waf/access07:17:4431212.8%T11901 min
Edit rule
Delete rule — cannot be undone
RULE-003

C2 Beacon Periodic Traffic

BehavioralCritical

Outbound connection to threat intel IOC with <30s jitter

netflow/egress07:04:1281.1%T10710
Edit rule
Delete rule — cannot be undone
RULE-004

DNS Tunneling Entropy

AnomalyCritical

DNS query entropy >4.5 bits/char over 100 queries

dns/queries05:54:3332.3%T104810 min
Edit rule
Delete rule — cannot be undone
RULE-005

Lateral Movement — SMB

BehavioralCritical

SMB connections to >5 internal hosts in 120s

netflow/internal06:31:09128.4%T10212 min
Edit rule
Delete rule — cannot be undone
RULE-006

RDP Brute Force

ThresholdHigh

>20 failed RDP auths in 30s

windows/security04:12:08286.7%T11335 min
Edit rule
Delete rule — cannot be undone
RULE-007

Port Scan Detection

ThresholdMedium

Single src IP contacts >30 dst ports in 60s

netflow/all07:18:1418922.1%T104615 min
Edit rule
Delete rule — cannot be undone
RULE-008

XSS Payload in HTTP

SignatureMedium

HTTP param contains <script> or JS event handlers

waf/access07:17:3142131.4%T10591 min
Edit rule
Delete rule — cannot be undone
RULE-009

Privilege Escalation — Linux

SignatureHigh

sudo/su followed by setuid binary execution

auditd/syscall2026-03-15 18:11715.2%T10680
Edit rule
Delete rule — cannot be undone
RULE-010

Large Data Transfer Outbound

AnomalyHigh

Outbound transfer >500MB to non-whitelisted IP in 1h

netflow/egress2026-03-15 14:50425.0%T104830 min
Edit rule
Delete rule — cannot be undone
RULE-011

Failed Auth Spike — Any Service

ThresholdMedium

>100 auth failures across any service in 5 min

syslog/auth2026-03-14 09:22038.9%T111010 min
Edit rule
Delete rule — cannot be undone
RULE-012

New Admin Account Created

SignatureMedium

useradd/net user with admin group membership

auditd/syscall2026-03-15 11:33250.0%T11360
Edit rule
Delete rule — cannot be undone
RULE-013

DoS Traffic Volume

ThresholdMedium

Inbound PPS >100k/s from single source

netflow/ingress2026-03-15 14:2210.0%T14995 min
Edit rule
Delete rule — cannot be undone
RULE-014

Tor Exit Node Traffic

SignatureHigh

Src IP matches Tor exit node blocklist

netflow/ingress07:18:292343.8%T10900
Edit rule
Delete rule — cannot be undone
RULE-015

Anomalous Login Hours

AnomalyLow

Successful login between 00:00–05:00 local for user

syslog/auth2026-03-13 02:14061.2%T10780
Edit rule
Delete rule — cannot be undone
RULE-016

SMTP Relay Abuse

ThresholdMedium

>500 outbound SMTP messages in 1h from single host

smtp/logs2026-03-15 16:44310.5%T156630 min
Edit rule
Delete rule — cannot be undone
RULE-017

Crypto Miner Process

SignatureHigh

Process name or cmdline matches known miner signatures

auditd/process2026-03-14 22:1715.0%T14960
Edit rule
Delete rule — cannot be undone
RULE-018

Beaconing Interval Analysis

BehavioralHigh

Periodic outbound connections with <15% jitter over 1h

netflow/egress2026-03-15 23:48618.3%T10710
Edit rule
Delete rule — cannot be undone
RULE-019

Log Source Silence Alert

ThresholdCritical

No events from critical log source for >5 min

system/health2026-03-15 08:1220.0%T15620
Edit rule
Delete rule — cannot be undone
RULE-020

Reverse Shell Pattern

SignatureCritical

Network connection from shell process (bash/sh/cmd) outbound

auditd/network2026-03-15 19:3347.5%T10590
Edit rule
Delete rule — cannot be undone
20 rules shown