You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Packetbeat Index needs to be added to network SIEM rules.
Filebeat was originally used to take advantage of the Zeek and Suricata network data modules. While Packetbeat is not a full-fledged protocol analyzer like Zeek, or even Suricata, it can act as a data source for these rules.
Example Data
Existing Index designation: index = ["filebeat-*"]
Suggested Index designation: index = ["filebeat-*", "packetbeat-*"]
The text was updated successfully, but these errors were encountered:
You probably also want to add the auditbeat-* index as well. We dont run packetbeat on every host, but we do run auditbeat, which is actually where we get more hits (thanks so its socket module)
Description
The Packetbeat Index needs to be added to network SIEM rules.
Filebeat was originally used to take advantage of the Zeek and Suricata network data modules. While Packetbeat is not a full-fledged protocol analyzer like Zeek, or even Suricata, it can act as a data source for these rules.
Example Data
Existing Index designation:
index = ["filebeat-*"]
Suggested Index designation:
index = ["filebeat-*", "packetbeat-*"]
The text was updated successfully, but these errors were encountered: