Skip to content
This repository has been archived by the owner on Mar 17, 2022. It is now read-only.

Commit

Permalink
added missing legacy config
Browse files Browse the repository at this point in the history
  • Loading branch information
unixfreak0037 committed Jan 29, 2020
1 parent 42f9eea commit e962c55
Showing 1 changed file with 218 additions and 0 deletions.
218 changes: 218 additions & 0 deletions etc/saq.legacy.default.ini
Original file line number Diff line number Diff line change
@@ -0,0 +1,218 @@
[custom_alerts]
splunk - snort = analysis/custom/splunk_snort.html
splunk - av = analysis/custom/splunk_av.html
splunk - bit9 = analysis/custom/splunk_bit9.html
splunk - cb = analysis/custom/cb.html
splunk - av - mcafee = analysis/custom/splunk_av_mcafee.html

[analysis_module_carbon_black_netconn_source_analysis]
module = saq.modules.carbon_black
class = CarbonBlackNetconnSourceAnalyzer
enabled = yes
semaphore = splunk
relative_duration_before = 04:00:00
relative_duration_after = 04:00:00
observation_grouping_time_range = 45:00

; the maximum number of process guids to extract
process_guid_limit = 3

[analysis_module_dlp_process_hash_analysis_v1]
module = saq.modules.process
class = DLPProcessHashAnalyzer_v1
enabled = yes
semaphore = splunk
max_asset_count = 6
relative_duration_before = 24:00:00
relative_duration_after = 00:15:00

[analysis_module_bit9_file_hash_analysis_v1]
module = saq.modules.process
class = Bit9FileHashAnalyzer_v1
enabled = no
semaphore = splunk
max_asset_count = 6
relative_duration_before = 24:00:00
relative_duration_after = 00:15:00

[analysis_module_snort]
module = saq.modules.snort
class = SnortAlertsAnalyzer
enabled = yes
semaphore = splunk
exclude_proxy = observable_group:proxy
exclude_external = observable_group:external_gateway
exclude_smtp = observable_group:smtp
exclude_internal_dns = observable_group:internal_dns
exclude_external_dns = observable_group:external_dns
; tighter time around splunk searches
relative_duration_before = 04:00:00
relative_duration_after = 04:00:00

[analysis_module_pan_threats]
module = saq.modules.pan
class = PanThreatsAnalyzer
enabled = yes
semaphore = splunk
exclude_proxy = observable_group:proxy
exclude_external = observable_group:external_gateway
exclude_smtp = observable_group:smtp
exclude_internal_dns = observable_group:internal_dns
exclude_external_dns = observable_group:external_dns
; tighter time around splunk searches
relative_duration_before = 04:00:00
relative_duration_after = 04:00:00

[analysis_module_pan_snort_correlation]
module = saq.modules.pan
class = PanSnortCorrelationAnalyzer
enabled = yes
semaphore = splunk
relative_duration_before = 00:05:00
relative_duration_after = 00:05:00
observation_grouping_time_range = 45:00

[analysis_module_dns_request_analysis_v1]
module = saq.modules.dns
class = DNSRequestAnalyzer_v1
enabled = yes
semaphore = splunk
; the maximum number of proxy requests to obtain from splunk
max_request_count = 50
; if there are less than X users requesting the resource in the timeframe then we add the users as observables
max_source_count = 6
; tighter time around splunk searches
relative_duration_before = 00:01:00
relative_duration_after = 00:01:00
; 24 hour baseline period
baseline_relative_duration_before = 24:00:00
baseline_relative_duration_after = 02:00:00

[analysis_module_bluecoat_analysis_by_dst_v1]
module = saq.modules.bluecoat
class = BluecoatProxyAnalyzerByDestination_v1
enabled = yes
semaphore = splunk
exclude_proxy = observable_group:internal
; the maximum number of proxy requests to obtain from splunk
max_request_count = 50
; if there are less than X users requesting the resource in the timeframe then we add the users as observables
max_user_count = 6
; tighter time around splunk searches
relative_duration_before = 00:15:00
relative_duration_after = 00:15:00
; 24 hour baseline period
baseline_relative_duration_before = 24:00:00
baseline_relative_duration_after = 02:00:00
; a CSV file that maps bluecoat categories to tags
category_tag_csv_path = etc/bluecoat_category_tagging.csv

[analysis_module_bluecoat_analysis_by_src_v1]
module = saq.modules.bluecoat
class = BluecoatProxyAnalyzerBySource_v1
enabled = yes
semaphore = splunk
; the maximum number of proxy requests to obtain from splunk
max_request_count = 1000
; tighter time around splunk searches
relative_duration_before = 00:01:00
relative_duration_after = 00:01:00

[analysis_module_squid]
module = saq.modules.squid
class = SquidProxyAnalyzerByDestination
enabled = no
semaphore = splunk
; the maximum number of proxy requests to obtain from splunk
max_request_count = 10
; tighter time around splunk searches
relative_duration_before = 00:15:00
relative_duration_after = 00:15:00

[analysis_module_exploit_kit_proxy_analyzer]
module = saq.modules.bluecoat
class = ExploitKitProxyAnalyzer
enabled = yes
semaphore = splunk
exclude_internal = observable_group:internal
; the maximum number of proxy requests to obtain from splunk
max_request_count = 10
; tighter time around splunk searches
relative_duration_before = 00:01:00
relative_duration_after = 00:01:00

[analysis_module_symantec]
module = saq.modules.symantec
class = SymantecAnalyzer
enabled = yes
semaphore = splunk
; tighter time around splunk searches
relative_duration_before = 24:00:00
relative_duration_after = 00:15:00

[analysis_module_dlp_process]
module = saq.modules.dlp
class = DLPProcessAnalyzer
enabled = yes
semaphore = splunk
; we go a bit wider for DLP Process searches
relative_duration_before = 24:00:00
relative_duration_after = 02:00:00
; go pretty far back for the baseline
baseline_relative_duration_before = 720:00:00
baseline_relative_duration_after = 02:00:00
; this one takes a long time to run so don't go back too far (7 days should be good)
global_baseline_relative_duration_before = 168:00:00
global_baseline_relative_duration_after = 02:00:00

[analysis_module_email_history_analyzer_v2]
module = saq.modules.email
class = EmailHistoryAnalyzer_v2
enabled = yes
semaphore = splunk

; we go back a bit to try to catch phish sitting idle in the inbox
relative_duration_before = 72:00:00
relative_duration_after = 02:00:00

; the following is a list of comma-separated domains that are aliased together
; so if a user's email address domain matches on of these then the entire group is searched with "OR" clause
; for example, [email protected] would search for [email protected] OR [email protected]
; each of these configuration items must start with map_ at the beginning of the name
;map_company_1 = teamcompany.onmicrosoft.com,company.com

[analysis_module_vpn_analyzer]
module = saq.modules.vpn_analysis
class = VPNAnalyzer
enabled = yes
semaphore = splunk

; we need to look way back and after to see when they logged in and off
relative_duration_before = 24:00:00
relative_duration_after = 24:00:00

[analysis_module_email_history_analyzer_v1]
module = saq.modules.email
class = EmailHistoryAnalyzer_v1
enabled = no
semaphore = splunk
; we go back a bit to try to catch phish sitting idle in the inbox
relative_duration_before = 72:00:00
relative_duration_after = 02:00:00

[module_group_correlation]
analysis_module_bluecoat_analysis_by_dst_v1 = yes
analysis_module_bluecoat_analysis_by_src_v1 = yes
analysis_module_carbon_black_netconn_source_analysis = yes
analysis_module_dlp_process = yes
analysis_module_dlp_process_hash_analysis_v1 = yes
analysis_module_dns_request_analysis_v1 = yes
analysis_module_email_history_analyzer_v1 = no
analysis_module_email_history_analyzer_v2 = yes
analysis_module_exploit_kit_proxy_analyzer = yes
analysis_module_pan_snort_correlation = yes
analysis_module_pan_threats = yes
analysis_module_snort = yes
analysis_module_squid = no
analysis_module_symantec = yes
analysis_module_vpn_analyzer = yes

0 comments on commit e962c55

Please sign in to comment.