
Summary
This detection rule uses alert data to identify instances where multiple security alerts trigger from various integrations that involve the same source IP address. The primary goal is to aid analysts in prioritizing their response and triage efforts, as alerts originating from a single source IP across different modules and event categories often indicate a higher likelihood of compromise. The rule employs an ESQL (Elasticsearch SQL) query to filter alerts based on multiple criteria: it excludes low severity alerts and signals generated by noise, looking specifically for alerts with high risk scores. It groups these alerts by source IP and collects distinct counts of event modules, rule names, and categories, enforcing further constraints to ensure alerts come from different integrations and show varied severities. The risk score assigned to the rule is relatively high at 73, indicating significant potential threat levels associated with triggers detected by this logic. Triage guidance includes steps for investigating alerts, examining timelines, correlating logs, analyzing vulnerabilities, and identifying indicators of compromise (IOCs). Additional insight is provided to assess and respond to false positives originating from benign administrative tasks or automated processes, ensuring that response protocols are adequately adjusted for context.
Categories
- Network
- Endpoint
- Cloud
- On-Premise
- Kubernetes
Data Sources
- Pod
- Container
- Network Traffic
- Application Log
- Process
Created: 2025-12-15