You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are seeing inconsistent alert tagging behavior in UTMStack for certain tag rules (e.g. sophos_central_website_blocked). Some alerts are tagged correctly, while others that meet the same conditions are not tagged at all.
Steps Taken
Upgraded to UTMStack v10.9.1.
Increased CPU and RAM resources on the server.
Adjusted alert rule parameters (frequency and timelapse) from the default 60s to 300s for the rule sophos_central_website_blocked.yml.
Minimized the tagging rule conditions to only one essential condition (matching just the alert name).
Tested using both the "is" operator and the "contains" operator for the condition.
Despite these adjustments, the inconsistent tagging behavior persists.
An observation is when an alert that should be tagged is left untagged, we notice a corresponding application log error around the same timestamp. Error as attached
Appreciate any advise on how to resolve this inconsistent tagging behavior so the tag rule applies reliably.
Related info:
Tag rule ''sophos_central_website_blocked' attached
Under correlation rules, system folder, the file 'sophos_central_website_blocked.yml' as follows
name: "Blocked website detected in Sophos Central"
severity: "High"
description: "A malicious link is an apparently trustworthy link that, when clicked, redirects to a fake website that mimics being a legitimate official website.
Once the user believes they are browsing a trusted website, they could enter personal data such as their email, passwords and even bank details.
Malicious links are often received in email messages asking the user to click on a link.
With this method, on many occasions, instead of asking for personal data from the user, they get the victim to install some type of malware on their device."
solution: "Look at the sender of the message. If the source is unknown, you will need to activate the alarms.
In the event that the sender is known but there is something suspicious, contact that person or trusted entity through another means.
Notice the context of the message. There are signs that can make you suspicious. Check the link. If the URL starts with https://, that is a good sign.
Once the link is open, if it is green and there is a lock, it means that the website most likely belongs to who it claims to be.
If, on the other hand, it does not start with https:// or it does not have the padlock closed, you can access the information icon and see if the connection to that site is insecure.
It is a good idea to hover over the link to see what URL it is linked to before clicking on it. It is good practice to type the address of that entity in the browser instead of clicking directly.
This will ensure that you are accessing the official website. There are tools to check the reliability of a link. In case it is a business, it is possible to check its reputation.
Keep the operating system, applications and antivirus updated on all devices. Click on shortened links only if the source that sent it is completely trustworthy and there is no risk that it has been spoofed."
category: "Execution"
tactic: "Malicious Link"
dataTypes: ["sophos-central"]
reference:
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
We are seeing inconsistent alert tagging behavior in UTMStack for certain tag rules (e.g. sophos_central_website_blocked). Some alerts are tagged correctly, while others that meet the same conditions are not tagged at all.
Steps Taken
Despite these adjustments, the inconsistent tagging behavior persists.

An observation is when an alert that should be tagged is left untagged, we notice a corresponding application log error around the same timestamp. Error as attached
Appreciate any advise on how to resolve this inconsistent tagging behavior so the tag rule applies reliably.
Related info:
Based on https://support.sophos.com/support/s/article/KB-000038309?language=en_US
Rule version v1.0.0
severity: "High"
description: "A malicious link is an apparently trustworthy link that, when clicked, redirects to a fake website that mimics being a legitimate official website.
Once the user believes they are browsing a trusted website, they could enter personal data such as their email, passwords and even bank details.
Malicious links are often received in email messages asking the user to click on a link.
With this method, on many occasions, instead of asking for personal data from the user, they get the victim to install some type of malware on their device."
solution: "Look at the sender of the message. If the source is unknown, you will need to activate the alarms.
In the event that the sender is known but there is something suspicious, contact that person or trusted entity through another means.
Notice the context of the message. There are signs that can make you suspicious. Check the link. If the URL starts with https://, that is a good sign.
Once the link is open, if it is green and there is a lock, it means that the website most likely belongs to who it claims to be.
If, on the other hand, it does not start with https:// or it does not have the padlock closed, you can access the information icon and see if the connection to that site is insecure.
It is a good idea to hover over the link to see what URL it is linked to before clicking on it. It is good practice to type the address of that entity in the browser instead of clicking directly.
This will ensure that you are accessing the official website. There are tools to check the reliability of a link. In case it is a business, it is possible to check its reputation.
Keep the operating system, applications and antivirus updated on all devices. Click on shortened links only if the source that sent it is completely trustworthy and there is no risk that it has been spoofed."
category: "Execution"
tactic: "Malicious Link"
dataTypes: ["sophos-central"]
reference:
frequency: 300
cache:
operator: "regexp"
value: "Event::Endpoint::((Smc::)?WebFiltering::BLOCKED|WebControlViolation|WebFilteringBlocked)"
minCount: 1
timeLapse: 300
save:
alias: "SourceUser"
alias: "SourceIP"
Beta Was this translation helpful? Give feedback.
All reactions