
Summary
The rule titled "Alerts From Multiple Integrations by User Name" is designed to identify patterns of alerts occurring from different modules related to the same user account. It functions by analyzing data from alerts generated over a 60-minute period, prioritizing those with higher risk scores, while excluding low-severity alerts and known benign user identifiers. This enables security analysts to effectively triage alerts by highlighting users that may be compromised due to multiple alerts from various integrations, which is increasingly indicative of malicious activity. The rule aggregates distinct counts of events by user and examines relationships between these alerts, focusing on those originating from different sources and showing significant variety in event classification and risk levels. The proposed investigation steps encourage thorough reviews of user activities linked to the alerts, alongside verification measures against known safe routines that could falsely trigger alerts. The response strategy emphasizes immediate network isolation of the affected host, forensic investigation, and the application of necessary patches to mitigate risks.
Categories
- Network
- Endpoint
- Cloud
- Windows
- Linux
Data Sources
- Pod
- Container
- User Account
- Process
- Network Traffic
- File
- Application Log
Created: 2025-12-15