HCHTech
Well-Known Member
- Reaction score
- 4,268
- Location
- Pittsburgh, PA - USA
We have an admittedly cobbled-together-but-working system for turning device & service alerts into job tickets. We have a 'notifications' user on our M365, and setup anything sending alerts to use that address. We have an SMTP2GO subscription as the mail server to do this. Then, we use Exchange transport rules to identify which client that alert belongs to (through a variety of ways, depending on that information is contained in the alert). Exchange then redirects that email to our ticketing system in such a way that it makes a ticket for the correct client. It's the next best thing to a real SIEM, without the expense. And before @Sky-Knight pops up to say that's a terrible way to protect our clients, I'll say it has served us just fine. (just kidding SK!) In fact, generally, it works way better than i thought it would when we first started to use this a couple of years ago. Before that we just didn't actively monitor those things - we depended on manual access to assess reported problems one-at-a-fricken-time. So it's a BIG step up from the old days.
We currently get alerts from iDRAC, Some HP switches, Unifi APs & switches, Synologies and EDR software. We have a couple of hundred Exchange transport rules to make this all go.
Whenever we add some new vendor's equipment or service to the system, it's a big job of filtering through the available alerts that equipment can generate, to find the alerts that are actionable. I don't want to know that the malware scanner finished a scan and didn't find anything, just as a quick example. There is no action implied by that alert, so I don't want it.
I'm in that process determination process now with firewalls. I want to add our estate of Sonicwalls to this process. Unfortunately, the job of picking worthy alerts is kind of big. With Unifi, for example, there are a total of about 20 alertable events. With Sonicwall, however, there are approximately 2,000 alertable events. Some are obvious (thermal hardware alarm is one example) but many, many of them are...less than obvious. I've read a couple of different 200 page manuals on events, but even so, many events remain unexplained, so it's difficult to know for sure whether I want to know about that particular thing.
I'm working with a test group of 10 firewalls (we have somewhere around 100 total in the field). So far, I've learned the hard way what alerts NOT to pick, haha. I used up my 40,000 monthly email allotment with SMTP2GO in one night when I had alerting enabled for Malformed IP Packets, and TCP connection aborts. After cleaning up THAT mess, I've been much more careful.
I'm focusing now on the various types of external "attacks" that the firewall can detect. Things like "SYN Flood", "DOS Detection", "FTP Port Bounce Attack", "DNS Tunnel Abuse", "Ping of Death", "Smurf Attack", "TCP Xmas Tree Attack", and my favorite "Spank Attack", haha. There are at least a couple of dozen others.
At first glance, knowing that all of these things are happening seems like an important thing. But honestly, as long as the firewall is protecting the network, I don't think ANY of them are actionable. What would be the expected action if I knew a client's firewall was fending off a Smurf Attack? I think the answer is "nothing", but wanted to run this by the brain trust here before I wholesale disabled probably 50 different alerts. It just seems wrong to ignore anything with the word "attack" in it...
We currently get alerts from iDRAC, Some HP switches, Unifi APs & switches, Synologies and EDR software. We have a couple of hundred Exchange transport rules to make this all go.
Whenever we add some new vendor's equipment or service to the system, it's a big job of filtering through the available alerts that equipment can generate, to find the alerts that are actionable. I don't want to know that the malware scanner finished a scan and didn't find anything, just as a quick example. There is no action implied by that alert, so I don't want it.
I'm in that process determination process now with firewalls. I want to add our estate of Sonicwalls to this process. Unfortunately, the job of picking worthy alerts is kind of big. With Unifi, for example, there are a total of about 20 alertable events. With Sonicwall, however, there are approximately 2,000 alertable events. Some are obvious (thermal hardware alarm is one example) but many, many of them are...less than obvious. I've read a couple of different 200 page manuals on events, but even so, many events remain unexplained, so it's difficult to know for sure whether I want to know about that particular thing.
I'm working with a test group of 10 firewalls (we have somewhere around 100 total in the field). So far, I've learned the hard way what alerts NOT to pick, haha. I used up my 40,000 monthly email allotment with SMTP2GO in one night when I had alerting enabled for Malformed IP Packets, and TCP connection aborts. After cleaning up THAT mess, I've been much more careful.
I'm focusing now on the various types of external "attacks" that the firewall can detect. Things like "SYN Flood", "DOS Detection", "FTP Port Bounce Attack", "DNS Tunnel Abuse", "Ping of Death", "Smurf Attack", "TCP Xmas Tree Attack", and my favorite "Spank Attack", haha. There are at least a couple of dozen others.
At first glance, knowing that all of these things are happening seems like an important thing. But honestly, as long as the firewall is protecting the network, I don't think ANY of them are actionable. What would be the expected action if I knew a client's firewall was fending off a Smurf Attack? I think the answer is "nothing", but wanted to run this by the brain trust here before I wholesale disabled probably 50 different alerts. It just seems wrong to ignore anything with the word "attack" in it...