Mobile alerting with tracking & escalation for LogRhythm
Log Rhythm is a SIEM platform that helps detect and stop cyber threats. The monitoring dashboard gives a great overview of your setup but where SIGNL4 comes in is at the alerting level. Currently Log Rhythm will send an email to specified parties when an alarm is raised. SIGNL4 allows for those emails to be directed to the right people at the right time. With on-call duty scheduling and a tiered escalation to a manager, SIGNL4 ensures that the email will not be lost in a sea of emails.
How it Works
SIGNL4 team email address establishes connection with Log Rhythm to enable mobile notification and alerting capabilities for operational and network teams.
Forwards Log Rhythm alarm information to SIGNL4 for mobile alerting
Uses SMTP email to connect to your SIGNL4 team
Staff can acknowledge and take ownership for critical events that occur
Communicate within an alert to address a problem
Alerts are escalated in case of no response
On-call scheduling to alert the right people at the right time
Application performance monitoring
How To Integrate
Integrating SIGNL4 with LogRhythm
In our example we are going to forward Log Rhythm alarm via email to the SIGNL4 email address. This will alert all team members on duty via Push, SMS and Voice notifications.
SIGNL4 is a mobile alert notification app for powerful alerting, alert management and mobile assignment of work items. Get the app at https://www.signl4.com
First, we need to crate a user to target alerts to. Follow these steps taken from the Log Rhythm documentation to create a new user.
On the main toolbar, click Deployment Manager.
Click the People tab.
On the File menu, click New.
The Is Person an Individual? dialog box appears.
If you are adding an individual, click Yes.
If you are adding a role, click No.
The Person Properties dialog box appears.
Choose from the following:
If you choose to create a Person Record, enter the person’s first, middle, and last name according to your organization’s standards, and then skip to step 6. The display name is automatically generated by the software in the following format: Last Name, First Name, and Middle Name.
If you choose to create a Role, go on to step 5.
In the Display Name field, enter the name of the role being created (for example, Restricted Analyst or Restricted Administrator).
If not already selected, click the Contact Methods
In the Contact Methods tab, select the methods the alarming engine uses to contact this user or role when an alarm associated with them has been triggered.
Select a Contact Method Type from the drop-down list.
Enter relevant data, such as an email address, into the Contact Information field. This is where the SIGNL4 team email address is entered.
To assign an Alarm Notification Policy to the user, click Alarm Notification Policyand select an Alarm Notification Policy. The Alarm Notification Policy is used to specify the information that will be included in the notification, as well as throttle the number of notifications in an allotted time.
Note: The Notification Policy Manager automatically filters out Alarm Notification Policies that do not match the type selected in Contact Method Type.
Click Save. The selected contact method appears in the Contact Methods field.
Repeat the process as necessary to include all contact methods you want.
Click the Additional Information tab and type a Brief Description or Additional Details, as needed.
Click the Permissions tab.
Select the appropriate permissions for this user or role from the Permissions list.
Alarms targeted to this user will now raise alerts within SIGNL4. Here is an example of an email that is typically received from Log Rhythm. This email is parsed to trigger specific categories and alert SIGNL4 team members via Push, Text and Voice calls.
SIGNL4 can further increase the visibility of alerts through its Signals and Services section. Augmenting the color and icon of alerts will provide more relevant information at a glance without having to open the alert.
Change Alert Color and Override Title + Text
Override text, colors and titles are triggered by keywords set within the mobile app.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.