Working with triggers¶
What are triggers¶
Triggers are tools that are used to set up custom notifications and reactions to events. Using triggers, you can:
-
Receive alerts on major events via the tools you use for your day-to-day workflow, for example via corporate messengers or incident management systems.
-
Block IP addresses from which a certain number of requests or attack vectors were sent.
-
Identify brute‑force and forced browsing attacks by the number of requests sent to the application addresses.
-
Optimize the event list by grouping hits originating from the same IP address into one attack
You can configure all the trigger components:
-
Condition: system event to be notified about. For example: getting a certain amount of attacks, denylisted IP address, and new user added to the account.
-
Filters: condition details. For example: attack types.
-
Reaction: action that should be performed if the specified condition and filters are met. For example: sending the notification to Slack or another system configured as the integration, blocking IP address, or marking requests as the brute‑force attack.
Triggers are configured in the Triggers section of Wallarm Console. The section is available only for users with the Administrator role.
Default trigger
The trigger Block IPs with high count of attack vectors is created for all clients by default.
More details about default trigger and other trigger examples →
Creating triggers¶
Step 1: Choosing a condition¶
A condition is a system event to be notified about. The following conditions are available for notification:
-
Number of attack vectors (malicious payloads) (experimental payloads based on custom regular expressions are not counted)
-
Number of attacks (experimental attacks based on custom regular expressions are not counted)
-
Number of hits except for:
- Experimental hits detected based on the custom regular expression. Non-experimental hits are counted.
- Hits not saved in the sample.
-
Number of incidents
-
Denylisted IP
-
Hits from the same IP, except for the ones of the Brute force, Forced browsing, Resource overlimit, Data bomb and Virtual patch attack types
-
User added
Choose a condition in the Wallarm Console interface and set the lower threshold for the reaction, if the setting is available.
Step 2: Adding filters¶
Filters are used for condition detailing. For example, you can set up reactions to attacks of certain types, such as brute-force attacks, SQL injections and others.
The following filters are available:
-
URI (only for the conditions Brute force and Forced browsing): full URI to which the request was sent. URI can be configured via the URI constructor or advanced edit form.
-
Type is a type of attack detected in the request or a type of vulnerability the request is directed to.
-
Application is the application that receives the request or in which an incident is detected.
-
IP is the IP address from which the request is sent.
-
Domain is the domain that receives the request or in which an incident is detected.
-
Response status is the response code returned to the request.
-
Target is an application architecture part that the attack is directed at or in which the incident is detected. It can take the following values:
Server
,Client
,Database
. -
User's role is the role of the added user. It can take the following values:
Deploy
,Analyst
,Admin
.
Choose one or more filters in the Wallarm Console interface and set values for them.
Step 3: Adding reactions¶
A reaction is an action that should be performed if the specified condition and filters are met. The set of available reactions depends on the selected condition. Reactions can be of the following types:
-
Mark the requests as brute‑force or forced browsing attack. Requests will be marked as attacks in the events list but will not be blocked. To block requests, you can add an additional reaction: denylist IP address.
-
Add IP to the denylist.
-
Send a notification to the SIEM system or Webhook URL configured in the integrations.
-
Send a notification to the messenger configured in the integrations.
Notifying about denylisted IPs via the messengers
Triggers allow sending notifications on denylisted IPs only to the SIEM systems or Webhook URL. Messengers are not available for the Denylisted IP trigger condition.
-
Group next hits into one attack if the trigger condition is Hits from the same IP.
The Mark as false positive button and the active verification option will be unavailable for these attacks.
Choose one or more reactions in the Wallarm Console interface. Reactions available for the condition are located at Number of attacks:
Step 4: Saving the trigger¶
-
Click the Create button in the trigger creation modal dialog.
-
Specify the trigger's name and description (if required) and click the Done button.
If the trigger name and description are not specified, then the trigger is created with the name New trigger by <username>, <creation_date>
and an empty description.
Disabling and deleting triggers¶
-
To temporarily stop sending notifications and reactions to events, you can disable the trigger. A disabled trigger will be displayed in the lists with All and Disabled triggers. To re‑enable sending notifications and reactions to events, the Enable option is used.
-
To permanently stop sending notifications and reactions to events, you can delete the trigger. Deleting a trigger cannot be undone. The trigger will be permanently removed from the trigger list.
To disable or delete the trigger, please select an appropriate option from the trigger menu and confirm the action if required.