heroui logo

Elastic Defend and Email Alerts Correlation

Elastic Detection Rules

View Source
Summary
This rule is designed to correlate alerts generated by Elastic Defend with those related to email security, particularly focusing on alerts associated with the same target user. The correlation may suggest a potential phishing attack has occurred if both types of alerts are triggered for a single user. The rule operates by querying logs over the past hour, specifically looking for email alerts and endpoint alerts where the username is specified. It aggregates data based on the target user and groups results to identify instances where alerts from both sources (email and endpoint) are observed. Alerts are triggered if the distinct count of event modules reaches two, indicating that further investigation is warranted due to overlapping security alerts pertaining to the same user.
Categories
  • Endpoint
  • Network
  • Cloud
  • Identity Management
  • Other
Data Sources
  • User Account
  • Application Log
  • Network Traffic
  • Container
  • Pod
Created: 2025-11-19