Hi
I have some basic alerts configured to alert when log sources stop sending. One example is monitoring logs from a number of firewalls; I simply want an alert if one fails to generate logs.
I have created the following - the logic is simple. Look for all logs with the event.module : [vendor]_firewall. Then group by observer.name. The problem is that the first part, as shown matches logs with an observer.name of WindowsDefenderAv which, as the name suggests is Windows Defender logs.
If I search in Discover, any events with the observer.name : WindowsDefenderAv have an event.module of microsoft_defender_endpoint. This makes sense and does not match the query in the rule. Why is this matching and generating alerts? It this a bug where the query at the top is being ignored? Or am I missing something...
Thanks