-
I am creating a Customizable Correlation rule to generate alerts whenever I receive logs from my Sentinel One integration for "Threat status changed" I can view the logs and when I filter by these fields the logs appear, but no alerts are generated Here is my example Correlation Rule,
Below is an example Alert @timestamp: "2024-12-17T16:21:17.286454752Z" |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 7 replies
-
Hi, @Dunkaknee the alert has some issues, please read our documentation in -> https://docs.utmstack.com/Correlation%20Rules/README.html
Best regards |
Beta Was this translation helpful? Give feedback.
-
Hi, @Dunkaknee, restart the instance and send logs, if not fixed try this, remove the rule from utmstack web app, then got to settings from lateral menu, then index management section, once there, remove all alert indexes, after that, create de rule again using the app. Let us know. |
Beta Was this translation helpful? Give feedback.
Hi, @Dunkaknee, restart the instance and send logs, if not fixed try this, remove the rule from utmstack web app, then got to settings from lateral menu, then index management section, once there, remove all alert indexes, after that, create de rule again using the app.
Let us know.
Best regards