heroui logo

Multiple Elastic Defend Alerts from a Single Process Tree

Elastic Detection Rules

View Source
Summary
The detection rule "Multiple Elastic Defend Alerts from a Single Process Tree" aims to identify coordinated malicious activities based on the analysis of multiple alerts originating from the same process ancestry within Elastic Defend's Endpoint Detection and Response (EDR) solution. This rule leverages EQL (Event Query Language) queries to analyze logs from Endpoint alerts, filtering for specific event codes associated with malicious behavior, such as memory signatures or shellcode threads. By counting unique process IDs and alert types, the rule prioritizes alerts that meet or exceed thresholds for unique process involvement and alert diversity, signaling potentially compromised hosts. Analysts are guided through a structured investigation process to validate alerts, correlate data, assess false positives, and determine appropriate incident response measures. The rule includes a well-defined note on the triage process, providing practical steps, possible false positive scenarios, and comprehensive response strategies to effectively handle detected threats, thus enhancing the organization’s cybersecurity posture against advanced persistent threats.
Categories
  • Endpoint
  • Network
  • Cloud
  • Linux
  • Windows
  • macOS
Data Sources
  • Process
  • User Account
  • Network Traffic
  • Application Log
  • File
Created: 2025-12-31