heroui logo

Adversary Behavior - Detected - Elastic Endgame

Elastic Detection Rules

View Source
Summary
The detection rule titled 'Adversary Behavior - Detected - Elastic Endgame' identifies suspicious activities indicative of malicious behavior within a network environment monitored by Elastic Endgame. This rule operates on events relating to behavior protection, filtering for alerts where the event.kind is 'alert' and the event.module corresponds to 'endgame'. The rule's setup is designed to generate up to 10,000 alerts per run, surpassing the default limit to ensure that extensive potential threats are identified. It is vital to verify that the Kibana configuration allows for this increase in alerts. The rule carries a medium severity risk score of 47, reflecting a notable threat level warranting attention from security analysts. The accompanying investigation guide suggests steps for analyzing detected alerts, addressing potential false positives, and conducting subsequent responses to incidents. In short, this rule enhances the detection and investigation capability against adversarial behaviors, providing crucial insights for maintaining security integrity.
Categories
  • Endpoint
  • Cloud
  • Infrastructure
Data Sources
  • Script
  • Application Log
  • Process
  • Network Traffic
  • Cloud Service
Created: 2020-02-18