
Summary
The rule titled "Multiple Alerts in Different ATT&CK Tactics on a Single Host" aims to identify and prioritize incidents involving alerts triggered across various phases of attack on the same host. By leveraging alert data, it helps analysts focus on hosts that are likely compromised by distinguishing alerts related to different MITRE ATT&CK tactics, such as execution, persistence, and exfiltration. The rule utilizes a threshold detection methodology, monitoring alerts from the past 24 hours and requiring at least one host to trigger alerts across three unique ATT&CK tactics. This comprehensive approach allows for a thorough analysis of the host's alerts, enabling rapid response and remediation actions while minimizing false positives caused by routine administrative tasks, trusted security tool activities, or benign scripts. A strategic investigation process is outlined to correlate various log data for identifying patterns of suspicious activity, threats, and vulnerabilities, thus ensuring a robust defense against potential security breaches.
Categories
- Endpoint
- Cloud
- Infrastructure
Data Sources
- Logon Session
- Process
- Network Traffic
- Application Log
- Sensor Health
Created: 2022-11-16