Hi all, I'm working on tuning that yaral rules gcp_cloudaudit/gcp_dns_modification.yaral from the github repo. When I look at detection vs rules languages, the udm fields target.user.email_addresses isn't present in our procedural filtering. the udm fields that lookalike the most has an email address, is target.user.userid .
Thanks for your help,
Did you already try running an equivalent search for examples in Raw Search?
When I can't use grouped fields, and even then, I often have to hunt for the best fieldname by search in Raw and seeing what fields get parsed in UDM and which one is best for my purpose.
Hi Chris, thank for answering my message. thank you for providing me a solution of looking through raw log. Right now, our goal is to reduce the noise because there a some DNS change by SA. Also, in the yaral, the rule use the udm field target.user.email_addresses to exclude Service account. however, this fields is not found parse.
My 2 main concern, if this field, target.user.email_addresses, is still valid? I could probably the principal.user.email_addresses to make the exclusion. Last thing, do we parse the log correctly. I look at prebuilt parser, and It look gibberish to me. Field still has rules to be parse, but it not face condition.
Best regards,
PH