There’s no doubt that open-source projects are immense contributors to the software ecosystem. With an extensive and active community of independent programmers worldwide, including cybersecurity professionals. They can exchange knowledge that helps develop new ways of detecting and mitigating new threats but it also speeds up solutions to other cybersecurity issues. Now, Logpoint customers can expand their detection ability with the latest security alerts thanks to Sigma.
Sigma is an open standard designed to streamline the process of writing detection rules for log files in a flexible, platform-agnostic format. As an open-source project, it thrives on collaboration from security professionals, particularly detection engineers, who contribute high-quality rules aimed at identifying malicious activity and emerging threats. Today, over 3,000 detection rules are available, each written in YAML format and following a standardized structure.
Enterprises collect vast volumes of log data and store it in centralized systems such as Logpoint. While these systems generate alerts from the data, they often rely on vendor-provided detection components, which can cause delays in threat response and create dependency. That’s where Sigma changes the game. Sigma's rules are open-source and accessible for everyone, so even customers can bring them straight into their SIEM, allowing for faster, more efficient threat detection—without the need for vendor content.
However, one of the main issues is compatibility. pySigma translates Sigma rules into platform-specific queries to make them compatible with specific security platforms. To add to this complexity, each SIEM has its unique query language. Hence, each manufacturer requires a modular, independent backend that reads Sigma's detection logic and converts it to the appropriate SIEM query syntax.
In an effort to bring our customers closer to the open-source community, we’ve recently added Logpoint pySigma Backend support in the pySigma. Now, it’s possible to convert Sigma rules into queries that Logpoint SIEM can execute to detect security events. With this backend in place, Logpoint users can seamlessly implement Sigma rules for threat detection, effortlessly expanding their capabilities and enhancing their security posture.
The Logpoint backend only supports the following log sources/rule types:
We will be adding support for other log sources in the upcoming days.
With the release of this backend, here are the immediate benefits you can get as a Logpoint customer.
Here are two alternative ways to convert Sigma rules into a Logpoint query and use them for alerts:
Choose the Pipeline:
Once you’ve selected the pipeline, the transformed Logpoint query will instantly appear on the right side of the page.
To convert a specific Sigma rule, visit the Sigma GitHub repository and select your preferred Sigma rule. Replace the default Sigma rule on the SigConverter website with the one you’ve chosen. For example, if you want to convert the Suspicious Process Masquerading As SvcHost.EXE rule, copy it from GitHub and paste it into the Sigma rule box on SigConverter.
After pasting your desired Sigma rule, SigConverter will automatically generate the corresponding Logpoint query on the right side, ready to use in Logpoint Alert.
Requirements
Install sigma-cli, a command line tool for sigma rule conversion
After installing Sigma CLI, you need to add the Logpoint backend plugin. Choose one of the following methods:
OR
Converting Sigma Rules
Once the packages are successfully installed, you can convert Sigma rules into Logpoint queries using the command below. For example, to convert the Suspicious Process Masquerading As SvcHost.EXE
Output
After converting the Sigma rule:
Configure the criteria
After configuring data in parameter section, proceed to configure conditions and risk level in criteria section. Set the condition to "greater than or equal to 1" to ensure that the alert triggers based on the specified threshold. Map the risk_level with the level fields from Sigma.
Configure the Metadata
Further, the alert's metadata can also be mapped with fields from the Sigma rule. The ATT&CK techniques field is mapped with tags field of the Sigma rule. Log Sources can be mapped with the product of logsource object of the Sigma rule. Additional metadata fields like authors and references can also be added.
Now that everything has been configured, the alert is ready for creation and deployment.
Once active, the alert will monitor for the specified events, and as soon as a related event is detected, it will trigger an incident.
Following these steps, you can seamlessly convert Sigma rules into Logpoint queries and configure alerts to enhance your threat detection capabilities. With proper mapping of fields, conditions, and metadata, your alert will be fully equipped to trigger incidents as soon as relevant events are detected, improving the overall security posture and responsiveness of your environment.
If you experience any problems, you can always open a new issue in the GitHub project Logpoint backend for pySigma.