
Summary
This detection rule is designed to identify potential compromises on hosts by correlating alerts from Elastic Defend, Palo Alto Networks (PANW), Fortinet Fortigate, and Suricata. The rule operates by inspecting logs from network security devices and matching them with endpoint alerts. The core logic examines if the source IP from network alerts overlaps with the host IP of Elastic Defend alerts over the last 60 minutes, triggering alerts if it finds a match. The weighted risk score of 73 and high severity classification indicate a significant threat potential, making it crucial for timely investigation. The rule employs ESQL for querying and is set to run every 10 minutes. Each detected correlation event is further analyzed, aggregating data points such as event types, messages, and user interactions to enrich the context. Investigators are advised to follow structured steps for triage and analysis, emphasizing a holistic review of associated logs, IOCs, and behavioral anomalies. The guidance includes necessary response actions to mitigate identified threats and ensure the affected system is secured.
Categories
- Network
- Endpoint
- Cloud
- Infrastructure
Data Sources
- User Account
- Network Traffic
- Application Log
- Process
- Cloud Service
Created: 2025-11-18