heroui logo

Alerts From Multiple Integrations by Destination Address

Elastic Detection Rules

View Source
Summary
This detection rule aims to identify potential compromises by analyzing alert data from various integrations that trigger multiple alerts involving the same destination IP address. To enhance incident response, it leverages alerts that exceed a certain risk score and are not part of low-severity types, providing analysts with prioritized information when similar IPs are flagged by different event categories. The rule aggregates and distinguishes alerts based on numerous parameters from the data captured in the alerts, such as distinct event modules, rule names, and categories, by filtering for scenarios where unique alerts about the same destination IP are reported from different integrations. It includes guidance on investigating alerts, addressing false positives, as well as recommended responses to potential compromises, thus making it a comprehensive tool for threat detection and analysis.
Categories
  • Network
  • Endpoint
  • Cloud
Data Sources
  • Pod
  • Container
  • User Account
  • Application Log
  • Network Traffic
Created: 2025-12-15