heroui logo

Behavior - Prevented - Elastic Defend

Elastic Detection Rules

View Source
Summary
This detection rule, titled 'Behavior - Prevented - Elastic Defend', is designed to alert security teams each time an Elastic Defend alert for malicious behavior prevention is generated. When enabled, it specifically captures and identifies malicious behavior that was prevented, as opposed to simply detected behavior alerts. The rule operates on data collected from Elastic's endpoint monitoring, using a Kuery query language to search through the alerts indexed under 'logs-endpoint.alerts-*'. This rule triggers if the event kind is 'alert', code is 'behavior', type is 'denied' and the outcome is 'success'. It is crucial for immediate response capabilities, allowing analysts to investigate potential threats in their environments promptly. The investigation guide outlines steps such as assessing the alert significance, verifying process details, analyzing user activity related to the alert, and evaluating potential false positives. In terms of response, the rule emphasizes the importance of initiating incident response procedures for confirmed malicious activity, checking for additional compromises, and maintaining security best practices. The severity of alerts generated under this rule is marked low (risk score: 21), and while it captures many alerts, configurations must ensure it aligns with existing alert limits set in the system.
Categories
  • Endpoint
  • Cloud
  • Infrastructure
Data Sources
  • User Account
  • File
  • Process
  • Network Traffic
Created: 2024-03-24