Up
Previous Next

Sheriff CSM™

Create Policy Consequences

Policy Consequences are the final component to creating a policy, after Create a New Policy and Create Policy Conditions. Policy Conditions are assigned at the bottom of the Policy's page.

External event consequences can be consist of any of the following. You may assign more than one consequence to a policy.

  • Actions — Use an Action as a Consequence to a Policy
  • SIEM — Adjust SIEM Consequences to Process Events
  • Forwarding — Create a Consequence to Forward Events

Note: For a directive event, the Logger cannot be configured as a consequence.

Use an Action as a Consequence to a Policy

This task assumes that you or someone else has already created an action that you can reference. For instructions on how to create an action, see Create an Action.

To add an Action to a consequence
  1. Go to Configuration > Threat Intelligence > Policy and, in the policy you are creating or modifying, click Actions under Consequences.

  2. Select the action from the Available Actions, at right, and add it by clicking the plus (+) sign, or by dragging it to the Active Actions section

    Policy Consequences section with send_email highlighted for Actions.

Adjust SIEM Consequences to Process Events

You can choose to make a SIEM consequence for a deeper control over risk assessment, event priority, and correlations. For more details on SIEM as a policy consequence, see SIEM in Policy Consequences.

To create a SIEM consequence to a policy condition
  1. Go to Configuration > Threat Intelligence > Policy and, in the policy you are creating or modifying, click SIEM under Consequences.

    A SIEM window opens under Policy Consequences at the bottom of the page.

  2. Fill out the form as appropriate.

    1. SIEM — Select Yes for SIEM as a consequence.
    2. Set Event Priority — From the Event Priority list, select the priority you want Sheriff CSM to assign to such events. Event priority is from 1 to 5, with 1 being minor and 5 being major, or an attack in progress.
    3. Risk Assessment — Indicate whether or not you want Sheriff CSM to perform risk assessment as a consequence of this policy by selecting Yes or No.

      Risk assessment looks at asset value, event priority, and event reliability. It then assigns a risk based on the value of the asset and type of event.

    4. Logical Correlation — Indicate whether or not you want to use logical correlation by selecting Yes or No.

      You use this to create new events from multiple events found by detectors and monitors. These are configured using correlation directives (logical trees combining individual events). Each new event has assigned priority and reliability values define by one directive.

    5. Cross-Correlation — Indicate whether or not you want to enable cross-correlation by selecting Yes or No.
    6. SQL Storage — Indicate whether or not you want to enable SQL storage by selecting Yes or No.

      Events detected or generated by Sheriff CSM are stored in the SQL database by default. Enabling SQL storage means that events matching a policy setting should be stored in the SQL database as well.

      Note: It is not required nor desirable for all events to be stored in the database.

Now the SIEM parameters you selected appear in the SIEM area of Consequences at the top of the page.

Important: Your changes in the policy will override the default configurations under Configuration > Deployment > Components > Servers.

Create a Consequence to Forward Events

By enabling the Forwarding consequence, you instruct Sheriff CSM to forward all or a subset of events, for example, from a remote Sheriff CSM Server, to a headquarters Sheriff CSM Server.

To enable event forwarding
  1. Go to Configuration > Threat Intelligence > Policy and, in the policy you are creating or modifying, click the colored Forwarding section under Consequences.

    A Forwarding window opens under Policy Consequences at the bottom of the page.

  2. Select Yes to enable forwarding or No to disable forwarding.

    If you select Yes, then select the server you want to forward to.

This topic: Sheriff > UserGuides > SheriffCSMDocumentation > UserGuide > PolicyManagement > CreateANewPolicy > CreatePolicyConsequences
Topic revision: 06 Jun 2022, SheriffCyberSecurity
Copyright 2020 Sheriff Cyber Security, LLC. All rights reserved.