
Summary
The 'Endpoint Security (Elastic Defend)' detection rule is designed to generate alerts whenever an Elastic Defend alert is received. This rule plays a critical role in endpoint security by enabling immediate investigation of alerts generated by Elastic Defend, ensuring timely responses to potential threats. It operates by querying the relevant indices for alerts and excludes those related to the 'endgame' module to focus specifically on relevant Elastic Defend alerts. The rule operates by evaluating events within the last ten minutes and leverages the KQL (Kibana Query Language) to efficiently filter and retrieve alerts. The risk score assigned is 47, indicating a medium level of risk associated with alerts generated by this rule. The design of the rule allows for a maximum of 10,000 alerts per execution, which is a significant increase over the default configuration, reflecting its priority in alerting due to the potential volume of endpoint alerts. The rule also recommends related more specific rules to avoid duplicates and encourages a structured approach to investigations, detailing steps to conduct investigations and manage false positives effectively.
Categories
- Endpoint
Data Sources
- User Account
- Process
- Container
Created: 2020-07-08