heroui logo

Behavior - Detected - Elastic Defend

Elastic Detection Rules

View Source
Summary
This rule generates a detection alert whenever an Elastic Defend alert for malicious behavior is received. It is specifically designed to detect behavior alerts from Elastic Defend, meaning it focuses on the alerts indicating malicious behaviors rather than prevention alerts. By enabling this rule, users can promptly investigate endpoint behavior anomalies. The detection leverages a continuous feed of system events, including process, file, registry, network, and other activities, and compares them against current rules established by Elastic threat experts. The rule is configured to handle a high volume of alerts by allowing up to 10,000 signals at once, improving the chances of capturing significant malicious activity. The triage process includes analyzing the activity of the triggering process, associated user actions, and identifying patterns of potential compromise, followed by prescribed steps for response and remediation based on the analysis of the alerts.
Categories
  • Endpoint
Data Sources
  • Process
  • File
  • Network Traffic
  • Windows Registry
  • Active Directory
Created: 2024-03-24