
Summary
The Elastic Security External Alerts detection rule generates alerts for all Elastic Security alerts processed and stored in the specified index (`logs-elastic_security.alert-*`). This rule helps security analysts to investigate real-time security incidents stemming from Elastic Security monitoring. It is designed to work with events classified as alerts, filtering them through a specific query and configuration that ensures a structured approach to threat detection. The rule has a pruning mechanism in place to maximize the signal-to-noise ratio by limiting the number of generated alerts to a maximum of 1000 signals within a 1-minute cycle. The document accompanying the rule offers a triage process with actionable steps for investigating threats, analyzing false positives, responding to incidents, and performing remediation, encouraging a proactive stance against potential security risk events.
Categories
- Endpoint
- Cloud
- Infrastructure
- Application
Data Sources
- Pod
- Container
- User Account
- Network Traffic
- Logon Session
- File
- Process
Created: 2025-07-31