heroui logo

External Alerts

Elastic Detection Rules

View Source
Summary
The 'External Alerts' detection rule is designed to generate alerts specifically for external threats, ensuring proactive investigation of potentially malicious activities across various operating systems, including Windows, macOS, and Linux. This rule operates through a query that identifies event alerts while filtering out specific modules such as 'endgame', 'endpoint', or 'cloud_defend' to focus solely on alerts that may indicate broader threats. When configured, it allows for a higher limit of alerts generated in a single run compared to the standard limit, making it essential to adjust system settings to maximize alert capture. Given its importance, the rule maintains a moderate risk score of 47, indicating a noteworthy level of threat that requires attention. The detection process emphasizes thorough investigation, analysis of alert context, and responding to identified risks. A detailed triage guide is provided to facilitate effective analysis and response strategies, addressing potential false positives and establishing a robust response framework to mitigate any identified threats.
Categories
  • Network
  • Endpoint
  • Windows
  • macOS
  • Linux
Data Sources
  • File
  • Logon Session
  • Network Traffic
  • Container
  • Service
Created: 2020-07-08