heroui logo

Threat Intel Email Indicator Match

Elastic Detection Rules

View Source
Summary
The Threat Intel Email Indicator Match rule is designed to detect matches between email indicators from threat intelligence sources and email-related events from various logging systems, particularly those related to email security gateways or service providers. The rule utilizes a querying language (KQL) to search for any logs containing email-related metadata, specifically targeted at identifying potential phishing, spam, and other email-based attacks. By analyzing the threat indicator, the rule provides detailed insights into the nature of the threat, allowing analysts to investigate the context thoroughly. Investigation steps include checking the reputation of email addresses and domains, analyzing the email headers for signs of spoofing, and reviewing the logs for suspicious activity. Additionally, the rule includes guidelines for responding to threats, such as isolating affected hosts, blocking indicators of compromise, and enhancing detection capabilities based on past incidents. Before enforcement actions, it emphasizes validating the context of matches to minimize false positive occurrences.
Categories
  • Network
  • Endpoint
  • Web
  • Cloud
Data Sources
  • File
  • Logon Session
  • Application Log
  • Network Traffic
Created: 2025-04-11