Monitor network segmentation with custom detections
Segmenting your network into discrete subnetworks can help improve security by only allowing certain clients to access servers that contain sensitive data. By creating a custom detection, you can identify when a machine outside of a privileged subnetwork communicates with a device inside of the subnetwork, so you can ensure that your security conventions are being enforced.
In this walkthrough, we'll create a device group for our privileged subnetwork and write a trigger that creates a detection every time an outside machine contacts the group.
Create a device group for the privileged subnetwork
First, we'll create a device group that contains all IP addresses in the following CIDR blocks:
- 192.168.1.0/24
- 192.168.2.0/24
Note: | You can modify these CIDR blocks to match a specific subnetwork in your environment. |
- Log in to the ExtraHop system through https://<extrahop-hostname-or-IP-address>.
- Click Assets.
- Click Device Groups.
- Click Create Device Group.
- In the Group Name text box, type Privileged Network.
- Click Dynamic.
- Click Match All and then select Match Any from the drop-down menu.
- Click Name, and then select IP Address from the drop-down menu.
- In the text box, type 192.168.1.0/24.
- Click Add Filter to add an additional filter.
- Click Name, and then select IP Address from the drop-down menu.
- In the text box, type 192.168.2.0/24.
Create a trigger to generate custom detections
Next, we will create the trigger that generates custom detections. Triggers generate custom detections by calling the commitDetection function in the trigger script.
Note: | For more information about the commitDetection function, see the Trigger API Reference. |
Create a custom detection type
Next, we will create a custom detection type, which enables you to add display names and MITRE categories to custom detections.
- Click the System Settings icon and then click Detection Catalog.
- Click Create.
- In the Display Name field, type Network Segmentation Breach.
- In the Detection Type ID field, type network_segmentation_breach.
- Click Save.
View custom detections
After you save the trigger, you can view detections the trigger generates on the Detections page.
Next steps
- Generate alerts for the detection by configuring detection alert settings. For example, you can configure your ExtraHop system to email you when a detection occurs.
Thank you for your feedback. Can we contact you to ask follow up questions?