heroui logo

Elastic Security External Alerts

Elastic Detection Rules

View Source
Summary
The Elastic Security External Alerts detection rule generates alerts for all Elastic Security alerts processed and stored in the specified index (`logs-elastic_security.alert-*`). This rule helps security analysts to investigate real-time security incidents stemming from Elastic Security monitoring. It is designed to work with events classified as alerts, filtering them through a specific query and configuration that ensures a structured approach to threat detection. The rule has a pruning mechanism in place to maximize the signal-to-noise ratio by limiting the number of generated alerts to a maximum of 1000 signals within a 1-minute cycle. The document accompanying the rule offers a triage process with actionable steps for investigating threats, analyzing false positives, responding to incidents, and performing remediation, encouraging a proactive stance against potential security risk events.
Categories
  • Endpoint
  • Cloud
  • Infrastructure
  • Application
Data Sources
  • Pod
  • Container
  • User Account
  • Network Traffic
  • Logon Session
  • File
  • Process
Created: 2025-07-31