I am trying to create a rule to monitor all the HTTPS request with the destination port 443 which includes all the HTTP methods & all the possible information that could be obtained from the request.
None of the rules i have created have been able to generate detections.
Requesting your assistance to get the rule sorted.
Thanks
Please tell us more details, at least start with the rules and how you did configure your setup.
Keep in mind, that HTTPS is encrypted, so you won’t see too much unless you decrypt it prior to the forwarding.
If you just consume directly from the switch, you are not decrypting. In this case you can’t really look into the contents (and look for things like your content pattern here (in which the leading | is missing BTW) – all you get is a tls event that gives you TLS parameters, certificate metadata, and maybe a SNI (8.16. SSL/TLS Keywords — Suricata 8.0.0-dev documentation). You won’t be able to use the http.* keywords because of the encryption as you can’t even tell whether it’s HTTPS or some other TLS secured protocol.