
Summary
The rule titled 'Threat Intel IP Address Indicator Match' is designed to trigger alerts based on matches of IP address indicators from threat intelligence sources against network events logged by various Elastic integrations, specifically relevant to security indicators captured in the last 30 days. The rule employs Kibana's KQL query language and examines data from multiple indices such as auditbeat, endgame, filebeat, logs, packetbeat, and winlogbeat. When a network event is associated with an IP address flagged in threat intelligence, the rule flags the event for security teams to investigate further. This may involve checking the reputation of the IP address, examining the executing process, identifying associated activities or anomalous behaviors, and determining if any hosts may be compromised. It recommends a series of analysis steps to gather context for the event and emphasizes validating the threat indicators against known data. The rule aims to enhance monitoring and incident response capabilities by integrating threat intelligence with behavioral events on the network.
Categories
- Network
- Endpoint
- Cloud
- On-Premise
Data Sources
- Network Traffic
- Process
- Application Log
- User Account
- Firewall
Created: 2023-05-22