Block enrichment from specific flows
This document explains how enrichment blocks give you granular control over the data enrichment process. The default enrichment process uses contextual data from different sources, analyzes the data, and overwrites Unified Data Model (UDM) field data according to internal logic. The default process usually works as expected. However, in certain cases, overwriting the UDM field data causes unexpected behavior, such as improperly triggering detection-engine rules.
Configure and view enrichment blocks
Only Google SecOps users with Chronicle Admin and Editor privileges can configure enrichment blocks; all Google SecOps users can view the Enrichment Blocks interface.
The basic configuration of an enrichment block requires three sequential parameters: Enrichment Type, Target Log Type, and Source. The options available for Target Log Type depend on the selected Enrichment Type, and the available options for Source depend on the selected Target Log Type.
You can't delete an enrichment block.
Enrichment blocks can be enabled, disabled, and re-enabled.
The Enrichment Blocks dialog includes the Enabled Blocks tab and Disabled Blocks tabs. The tables in both tabs display the basic configuration parameters of the enrichment block, the UTC date on which the block was last enabled, and the (optional) user-specified reason for the block. The table in the Disabled Blocks tab includes the UTC date on which the block was disabled.
Revised enrichment block time logic
A change in the status of an enrichment block takes effect within 5-10 minutes.
The key effect of enabling or disabling a block is its synchronized start time:
Enabling a block (de-enrichment): Google SecOps de-enriches all associated fields starting from 00:00:00 UTC of the current date and continues going forward.
Disabling a block (re-enrichment): Google SecOps re-enriches all associated fields starting from 00:00:00 UTC of the current date and continues enriching going forward.
Example: On Tuesday, September 16, at 23:59:59 UTC, you enable an enrichment block. Google SecOps de-enriches all the associated enriched fields from 0:00:00 Tuesday, September 16 UTC—and continues implementing the enrichment block going forward. On Wednesday, September 17, at 09:00:00 UTC, you disable the enrichment block. Google SecOps re-enriches all the associated fields from 0:00:00 Wednesday, September 17 UTC—and continues enriching all the relevant data going forward.
Create and enable an enrichment block
To create and enable an enrichment block, do the following:
- Go to Settings > Enrichment Blocks.
Configure the following:
From the Enrichment Type list, select one of the following options:
- All Types
- Asset. When it's not in the enrichment block, this option does the following:
- Extracts fields, such as
hostname,asset_id,mac,ip(ifasset_idis empty). - Enriches fields that include anything under
Asset(for example,hostname,asset_id,mac, orip) fromNoun. - Uses enrichment sources, such as
DHCPandAsset Context(for example,Tanium AssetorCrowdStrike).
- Extracts fields, such as
- GeoIP. When it's not in the enrichment block, this option does the following:
- Extracts fields, such as
ipif it's public or routable. - Enriches fields that include
artifact.ip,artifact.location,artifact.network,location. - Uses enrichment sources from the Google GeoIP Service.
- Extracts fields, such as
- Google Threat Intel. When it's not in the enrichment block, this option does the following:
- Extracts relevant fields.
- Enriches the
Fileorprocess.filefields. - Uses enrichment sources from VirusTotal file metadata.
- Process. When it's not in the enrichment block, this option does the following:
- Extracts fields, such as
process.product_specific_process_id. - Enriches fields, which include anything under
Process. - Uses enrichment sources, such as EDR logs (for example, from CrowdStrike or SentinelOne).
- Extracts fields, such as
- User. When it's not in the enrichment block, this option does the following:
- Extracts fields, such as
user.email_addresses,user.userid,user.windows_sid,user.employee_id,user.product_object_id. - Enriches fields that include anything under
User. - Uses enrichment sources, such as user-context logs (for example, from Workday or Windows AD).
- Extracts fields, such as
From the Target Log Type list, select the required option, which depends on the selected Enrichment Type. Example options include All Types, Windows_Sysmon, CB_EDR, and BRO_JSON.
From the Source list, select the required option. The available options depend on the selected Target Log Type. Example options include All Types, INFOBLOX_DHCP, WINDOWS_AD, and VIRUSTOTAL_FILE_METADATA.
Click Enable Block to open the Enable Block dialog and display the configuration from the previous steps.
Optional: In the Reason for blocking field, enter the reason for the enrichment block.
After you review the information, click Enable Block. The Enabled Blocks table displays a row for the enabled enrichment block.
After approximately 5-10 minutes, Google SecOps implements the enrichment block (that is, de-enriches all associated enriched fields) from 0:00:00 of the current date UTC and going forward. After this time, we recommend that you verify the results are as you expect.
Disable an enrichment block
To disable an enrichment block, do the following:
- Go to Settings > Enrichment Blocks.
- On the Enabled Blocks tab, find the enrichment block, click More in that row, and select Disable Block. A confirmation dialog opens.
Review the information and click Disable Block. The Disabled Blocks table displays a row for the disabled enrichment block, and the corresponding row is removed from the Enabled Blocks table.
After approximately 5-10 minutes, Google SecOps re-enriches all the associated fields from 0:00:00 of the current date UTC and going forward. After this time, we recommend that you verify the results are as you expect.
Re-enable an enrichment block
To re-enable an enrichment block, do the following:
- Go to Settings > Enrichment Blocks.
- On the Disabled Blocks tab, find the enrichment block, click More in that row, and select Enable Block. A confirmation dialog opens.
Review the information and click Enable Block. The Enabled Blocks table displays a row for the re-enabled enrichment block, and the corresponding row is removed from the Disabled Blocks table.
After approximately 5-10 minutes, Google SecOps implements the enrichment block (that is, de-enriches all associated enriched fields) from 0:00:00 of the current date UTC and going forward. After this time, we recommend that you verify the results are as you expect.
Example workflow for an enrichment block
This workflow demonstrates how to use an enrichment block to resolve a rule improperly triggered by unwanted data overwrites:
- Validate the rule: You receive an alert and determine it was triggered improperly. You confirm the rule logic is correct—it's not a candidate for a rule exclusion.
- Identify the log source: You review the alert and realize the trigger conditions were met by a CrowdStrike log.
Investigate the enrichment source: Use the Event Viewer to identify which external source modified the critical field. The following steps show one way to open the Event Viewer (but there are alternative steps):
- On the Google SecOps console, go to Detections > Alerts & IOCs.
- Select the improperly triggered detection and drill down to the event.
- Click the event timestamp to open the Event Viewer. The Event Fields tab is displayed by default. Each enriched field is identified with an E, and expanding the node shows the enrichment sources.
- On the Event Fields tab, expand the node of the problematic enriched field to identify the source. You learn that the field that triggered the alert had been enriched by Okta.
Create and enable an enrichment block: Create and turn on an enrichment block that disables
Userdata from Okta as a source of enrichment in your CrowdStrike logs.Verify resolution: After waiting 5-10 minutes for the enrichment block to take effect, verify that the alert is no longer triggered improperly.
Need more help? Get answers from Community members and Google SecOps professionals.