
Summary
This detection rule is designed to generate alerts from Elastic Defend whenever malicious files are reported. It operates by querying the Elastic Endpoint logs to identify malicious file alerts based on specific criteria tied to file behavior and user interactions. The rule captures alerts in real-time from instances where files are detected as malicious, providing essential metadata for investigation, such as the type of threat identified (malware, ransomware, etc.) and the associated risk score. It employs conditions that filter events related to malicious file detection, which can be leveraged to inform security teams about potentially compromised files. Notably, it does not include prevention alerts and emphasizes the need for extensive investigation following an alert, where analysts are advised to scrutinize file history, associated processes, and user behavior. The rule utilizes an advanced alerting framework, allowing configuration for a maximum number of alerts per run, ensuring a comprehensive capture of incidents while adhering to the configured limits for alert generation. This enables a proactive approach to endpoint security by enabling teams to act swiftly on immediate threats while incorporating a structured approach to incident response and analysis.
Categories
- Endpoint
Data Sources
- Logon Session
- Application Log
- File
ATT&CK Techniques
- T1204
- T1204.002
Created: 2024-03-24