Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Better way to investigate alerts

    Scheduled Pinned Locked Moved IDS/IPS
    1 Posts 1 Posters 231 Views 1 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M Offline
      michmoor LAYER 8 Rebel Alliance
      last edited by michmoor

      hello everyone,
      Looking to get some feedback on the best way of addressing a Suricata alert.

      Background. I have Suricata enabled on a Server VLAN. Typically another vlan called PublicApps , makes calls to the server vlan.
      The PublicApps is where my servers that are public internet facing sit and are reachable via a reverse proxy sitting in another vlan called DMZ

      For those curious
      My reverse proxy sits in dmz 192.168.2.x
      Public Apps sits in 192.168.15.x
      Server vlan sits in 192.168.3.x

      Tight rules govern cross traffic between dmz and public and between public and server vlan.

      Anyways, back to my question. I received the following email alert today

      30c2339f-95d9-4645-870b-f586ec2d1510-image.png

      Im not worried as I know the servers involved and there is port 445 open to allow this but Suricata was triggered.
      What are some of the things I should do to better troubleshoot? The things I do is check my wazuh dashboard during the alert times, zabbix for anything unusual on the system.

      Anything I should do for better viability?

      I welcome all the feedback to address this alert better.

      Side note: I do have Wazuh running and nothing was triggered there so I feel relatively comfortable that the alert is benign.

      edit:
      For those curious the Wazuh alert below occurred during the suricata triggers

      57c34287-6f69-43d3-96e0-070ef87ca9eb-image.png

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.