Cisco Cisco Firepower Management Center 2000 Guia Do Programador

Página de 180
 
4-9
FireSIGHT System Database Access Guide
 
Chapter 4      Schema: Intrusion Tables
  rule_documentation
rule_message Sample Query
The following query returns the intrusion rule message for the intrusion rule that has a GID of 
1
 and a 
SID of 
1200
.
SELECT generator_id, signature_id, revision, message 
FROM rule_message 
WHERE generator_id="1" 
AND signature_id="1200";
rule_documentation
The 
rule_documentation
 table contains information about rules used to generate alerts.
For more information, see the following sections:
  •
  •
  •
rule_documentation Fields
The following table describes the database fields you can access in the 
rule_documentation
 table.
Table 4-6
rule_documentation Fields 
Field
Description
additional_references
Additional information and references.
affected_systems
Systems affected by the vulnerability.
attack_scenarios
Examples of possible attacks.
contributors
Contact information for the author of the rule and other relevant documentation.
corrective_action
Information regarding patches, upgrades, or other means to remove or mitigate the 
vulnerability.
detailed_information
Information regarding the underlying vulnerability, what the rule actually looks for, and 
what systems are affected.
ease_of_attack
Whether the attack is considered simple, medium, hard, or difficult, and whether or not 
is can be performed using a script.
false_negatives
Examples that may result in a false negative. The default value is 
None Known
.
false_positives
Examples that may result in a false positive. The default value is 
None Known
.
impact
How a compromise that uses this vulnerability may impact various systems.
rule_revision
Rule revision number.
rule_signature_id
Rule identification number that corresponds with the event.
summary
Explanation of the threat or vulnerability.
updated
The UNIX timestamp of the date and time the rule was last updated.