This article discusses how to create an allowlist rule for known benign traffic so that the Detection & Response engines do not generate a story for that traffic.
The Detection & Response correlation engines analyze traffic data to find matches for potential threats, and create stories for the threats which you can then review in the Stories Workbench. The Detection & Response Allow List lets you define traffic from a trusted resource is then excluded from the stories. Allowlisting traffic that you recognize as benign reduces the generation of false positive stories, and helps you focus your analysis on actual potential threats.
There are two ways to add Allow List rules:
-
Create a rule in the Detection & Response page
-
Create a rule from a story in the Stories Workbench. This method is helpful when you notice specific traffic in a story that you know is benign
The following table explains the items that you can use to define the settings for a Detection & Response Allow List rule. When you configure multiple objects in a setting, there is an OR relationship between them. For example, if there is a rule configured with sources including a Site and a User, the rule is applied when the traffic matches either the Site or the User.
Item |
Description |
---|---|
Indication ID |
The identifier for the indication used by the Detection & Response engines. Each Indication ID is associated with a Detection & Response engine query that identifies specific traffic parameters. If you define an Indication ID, the rule only excludes traffic from stories generated by the specific engine query associated with that Indication ID. If no Indication ID is defined, the traffic is excluded from all engine queries that match the rule settings. For more about Indications, see Using the Indications Catalog. |
Engine |
The Detection & Response engine or engines the rule applies to. For more about these engines and the types of stories they detect, see Using the Indications Catalog. |
Expiration Date |
Select the date when the rule expires and the traffic is no longer excluded, or select Unlimited for the rule to continue to apply without expiration. When an expiration date is set, the rule expires at the beginning of that date, in the time zone configured in the user profile settings in the Cato Management Application. Setting an expiration date is a recommended best practice for maintaining an effective security posture. |
Direction |
Define the direction of the traffic flow that the rule applies to. Directions include:
|
Source |
Source of the traffic for this rule. You can select one or more of the following Source types:
|
Device |
The type of device the rule applies to, defined by operating system. |
Destination |
Destination of the traffic for this rule. You can select one or more of the following Destination types:
|
In addition to the above settings, the following information is shown for each rule in the Allow List:
-
Author - The user name of the user who created the rule.
-
Created At - Date the rule was created.
To show the Detection & Response Allow List rulebase:
-
From the navigation menu, click Security > Detection & Response.
Add a new Allow List rule and configure the settings that define the traffic to be disregarded by the Detection & Response engines.
To create a Detection & Response Allow List rule:
-
From the navigation menu, click Security > Detection & Response.
-
Click New. The Add to Allow List panel opens.
-
Configure the settings for the rule as described above.
-
Click Save. The rule is added to the Allow List rulebase.
View the story drill-down in the Stories Workbench and use the Story Actions panel to create an Allow List rule.
To create an Allow List rule from a story:
-
From the navigation menu, click Monitoring> Stories Workbench.
-
Click the story to open the drill-down page for the story.
-
Click
to open the Story Actions panel.
-
Click Add to Allowlist. The Add to Allow List panel opens.
-
Configure the settings for the rule as described above.
-
Click Save. The rule is added to the Allow List rulebase.
-
To show the Detection & Response Allow List rulebase, from the navigation menu click Security > Detection & Response.
0 comments
Please sign in to leave a comment.