heroui logo

Multiple Elastic Defend Alerts by Agent

Elastic Detection Rules

View Source
Summary
The rule 'Multiple Elastic Defend Alerts by Agent' aims to enhance threat detection by leveraging alert data from Elastic Defend. This rule identifies instances when multiple alerts related to potentially malicious activities originate from the same host within a specified time window (the last 60 minutes). It employs a structured approach to analyze the number of distinct alerts and the diversity of event codes triggered. By detecting such patterns, the rule aids analysts in prioritizing their triage processes since hosts generating multiple alerts may be compromised. The ESQL query is crafted to filter relevant logs, count distinct occurrences of alert types, and aggregate essential details about the alerts, such as event codes and process names. This information significantly assists in identifying coordinated attacks across multiple hosts where adversaries deploy malware causing overlapping alerts.
Categories
  • Endpoint
  • Cloud
  • Windows
  • Linux
  • macOS
Data Sources
  • Container
  • Process
  • Application Log
  • Network Traffic
  • File
Created: 2025-11-19