Patronus provides security teams the ability to easily monitor, detect, and react to security concerns based on a scoring system that highlights notables and filters out the noise. Spend less time searching and more time logically drilling down to determine how events correlate to form a story.
Too often we see customers struggling with these challenges:
The Patronus SIEM provides security teams the ability to easily monitor, detect and react to security concerns based on a scoring system that highlights notables and filters out the noise. Spend less time searching and more time logically drilling down to determine how events correlate to form a story.
A basic scoring system was put in place which applies a certain level of risk to ALL detections. Those detections become compelling as they grow in score and then generate an incident after a prescribed threshold is exceeded.
We believe that many events generate an incident and a timeline vs every incident representing a single event. This greatly reduces the time spent in lifecycle management and chasing false positives.
Quite simply, time is the asset that is most important to a security team.
Executive View
Score based incident generation
Incident Management
Threat Hunting Scoreboard
Threat Management
Application | Version |
---|---|
ES Content Updates | 3.0.4 |
Splunk Security Essentials | 3.1.2 |
Event Timeline Viz | 1.5.0 |
Lookup Editor | 3.4.6 |
JSON Tools | 0.2.0 |
Missile Map | 1.2.3 |
Splunk Common Information Model | 4.19.0 |
Number Display Viz | 1.6.8 |
Assets refer to the system in which Patronus is responsible for protecting. The source(s) of asset data may come from many sourcing including Active Directory, Qualys, Tenable, JAMF, etc. These sources are then merged into a single working copy with evaluation of each data element giving priority to data values from the more severe to less.
This form allows for the definition of where to find the asset data that was created and stored in a lookup table. Recommendation would be to create a Saved Search that incrementally creates the lookup table using the fields as defined below. Please make sure that the lookup table has permissions set to Global.
Fields used to create the asset list are defined below.
Field | Description |
---|---|
key | syst em used multivalue field specifying all values that may be used for identification of an asset. This does nit get created in the user defined lookup |
ip | ip address |
dns | domain name of a system as would be defined in dns. This field may also be used for defining fqdn |
mac | unique mac address of a system |
owner | user which owns the system |
priority | low, medium, high, critical |
category | a logical category for representing the purpose or use of a system |
File names MUST be in the format of patronus_asset_SYSTEM.csv
Identities refer to the users in which Patronus is responsible for protecting. The source(s) of identity data may come from many sourcing such as Active Directory or Okta. These sources are then merged into a single working copy with evaluation of each data element giving priority to data values from the more severe to less.
This form allows for the definition of where to find the asset data that was created and stored in a lookup table. Recommendation would be to create a Saved Search that incrementally creates the lookup table using the fields as defined below. Please make sure that the lookup table has permissions set to Global.
Fields used to create the asset list are defined below. | Field | Description |
---|---|---|
key | system used multivalue field specifying all values that may be used for identification of a user. This does not get created in the user defined lookup | |
user | user name | |
email address of the user | ||
first_name | first name of the user | |
last_name | last name of the user | |
phone | phone number of the user | |
manager | direct manager of the user | |
start_date | employment start date | |
end_date | employment end date | |
priority | low, medium, high, critical | |
category | a logical category for representing the purpose or use of a system |
File names MUST be in the format of patronus_identity_SYSTEM.csv
There are three different types of threat feeds supported by Patronus: ip, domain, file | Type | Description |
---|---|---|
ip threat feed | IP addresses found to be compromised or suspect. Supported fields include: ip | |
domain threat feed | Unsafe or compromised domain names accessed via web or network. Supported fields include: domain | |
file threat feed | Unsafe or compromised files identified by name or hash via endpoint or equivalent data feeds. Supported fields include: file_name, file_hash |
When adding a new threat feed it is important to understand the data you are inserting: | Field | Description |
---|---|---|
name | Logical name representing the threat feed | |
type | ip, domain, file | |
url | URL in which the threat feed can be downloaded | |
file_name | file name to save the downloaded feed as. Use the .csv extension | |
regex | Regular expression to parse the data and to define the fields necessary for the typ of feed. Depending on feed use $1 and $2 to correspond with the headers defined | |
headers | define the headers/values represented in the threat feed |
Corporate Subnet configuration refers to the location of IP CIDR ranges in your organization to allow Patronus to better understand threats.
Field | Description |
---|---|
label | textual representation of the CIDR range |
ip/cidr | CIDR range |
latitude | he angular distance of a place north or south of the earth's equator, or of a celestial object north or south of the celestial equator, usually expressed in degrees and minutes |
longitude | the angular distance of a place east or west of the meridian at Greenwich, England, or west of the standard meridian of a celestial object, usually expressed in degrees and minutes. |
Patronus is built on the concept of using scores to assess the risk in an enviornment. Correlation searches are used to identify issues and assign scores to objects that are considered risky. Each search has a base score and reliability associated with it. Reliability helps reduce the score for searches that are noisy or unreliable. For each hit the search gets, a score based on the base score of the search and its reliability gets added to the risk object that triggered it.
As scores accumulate and exceed 100 (default) an incident is generated. An incident is a cross-layer view if risk generations against an object. Instead of seeing each individual score generated and then having to review it, they are bubbled up to a sumamrized view and then presented to the analyst as a picture of activitues for a risk object. This allows a story to be told instead of a single page.
A key part to any SIEM is the ability to eliminate noise from generating. Patronus approaches filter management logically where risk generations will still occur on content that is filtered but will not be included in incidents being generated. Filtering is also centralized rather than "hard-filtering" at the rule or correlation search level. The advantage to centralization is the ability to manage all filters in one place. Hard-filtering is still available at the rule level but is only recommended in situations where noise is overwhelming and not relevant from a security standpoint.
Filter management can be accessed in two separate ways:
Upon saving, you will see text stating the filter has been added in green. Point forward the item(s) filtered will not included in scoring to determing incident generation. At the top of the risk scoreboard, you may select "Include Filtered Data" to make the data visible in the scoreboard.