heroui logo

Alerts in Different ATT&CK Tactics by Host

Elastic Detection Rules

View Source
Summary
This detection rule, developed by Elastic, monitors alert data to identify hosts that trigger multiple alerts across various phases of an attack, signifying increased risk levels. The rule is aimed at assisting analysts in prioritizing their response efforts by flagging hosts with an accumulated risk score exceeding a specific threshold. Specifically, the rule operates over the last 8 hours with a data aggregation interval of 1 hour, utilizing the ESQL query language. It filters alerts to exclude lower-value threats while counting unique events per host, emphasizing those with diverse alerts across different attack tactics such as execution and persistence. The resulting data highlights hosts showing robust evidence of potential compromise, allowing for effective triage and response strategies. Analysts are guided through investigations with suggested steps, including reviewing timelines, correlating alerts with system telemetry, and assessing overall impacts of detected anomalies. Preventative and corrective actions are also outlined to address and mitigate the identified threats.
Categories
  • Network
  • Endpoint
  • Cloud
  • Containers
  • Infrastructure
Data Sources
  • Pod
  • Container
  • User Account
  • Process
  • Network Traffic
  • Application Log
Created: 2025-11-19