Sigma Rules
  • 03 Mar 2023
  • 1 Minute to read
  • Contributors
  • Dark
    Light
  This documentation version is deprecated, please click here for the latest version.

Sigma Rules

  • Dark
    Light

Article summary

Sigma is an open source project that aims at creating a generic query language for security and D&R rules. It looks up known anomalies and Common Vulnerabilities and Exposures (CVEs).

Many people use Sigma as the community tends to respond quickly, but also puts interesting anomalies often in there.

In LimaCharlie, you can subscribe to the hundreds of rules that are a part of Sigma, for free. Every 15 minutes we re-process those rules in your organization; there's no management required, it just happens.

Rules converted are available here.

You can also follow an RSS feed of changes to the rules rep here.

Converting Sigma rules

You can utilize our public REST API to convert Sigma rules. More information available here.

Enabling Sigma

To enable the Sigma rules, you want to navigate to the Add-ons section and search for Sigma in the search bar.

image.png

Under the Organization dropdown, select a tenant (organization) you want to subscribe to Sigma rules and click Subscribe:

image.png

Please note that add-ons are applied on the per-tenant basis. If you have multiple organizations you want to subscribe to Sigma, you will need to subscribe each organization to the add-on separately.

image.png

You can also manage add-ons from the Subscriptions menu under Billing.

image.png

Tenants that have been subscribed to the add-on, will be marked with a green check mark in the Organization dropdown.

Please note that some Sigma rules on Windows rely on Windows Event Logs that are not collected by LimaCharlie by default. In order to leverage these you will need to configure an automated collection of relevant Windows Event Logs through the Artifact Collection service.

Identifying Sigma Rule Hits

To identify the source of the detection, click on the detection details where you will be able to see the author field. It contains the identity (email or key name) of the entity that created the rule.

image.png

Detections that come in through a managed Sigma rule will have the author listed as _sigma.

Severity of Sigma Rules

Once you enable the Sigma add-on you may start seeing detections come through. These detections can include a level parameter with a value of:

  • Critical
  • High
  • Medium
  • Low

These level classifications are provided by the rule author.

image.png


Was this article helpful?