
Summary
The 'Exploit - Prevented - Elastic Endgame' rule actively monitors and responds to exploit attempts blocked by the Elastic Endgame security platform. By tapping into the Endgame module's logs, the rule tracks alert events where exploit attempts, such as unauthorized code execution or privilege escalation, are foiled with a focus on prevention indicators. The rule leverages the KQL query language to filter relevant events and ensures comprehensive alert generation. Key to its functionality, the rule features an adjustable 'Max alerts per run' setting, allowing it to exceed the default alert threshold to capture a broader spectrum of blocked exploit attempts. This facilitates a deeper analysis, ensuring analysts can swiftly respond to potential threats. By examining specific alert metadata and associated fields, the rule provides essential context, guiding incident response teams in investigating possible security breaches while minimizing false positives that might arise from benign activities such as software updates or administrative tasks. High-risk events trigger a response protocol for immediate system isolation and verification of integrity, aligning with best practices for threat remediation and incident management.
Categories
- Endpoint
- Windows
- Linux
- macOS
Data Sources
- Pod
- Container
- User Account
- Process
- Application Log
ATT&CK Techniques
- T1068
Created: 2020-02-18