Skip to content
Discussion options

You must be logged in to vote

Figure it out... this rule is for alerting upon malware detection.
The default Elastic Defend integration setting is off, so turning it on and dropping a malware on the host is creating the missing index and alert is being triggered:


So the next missing piece is how to make it appear as an alert in SOC dashboard:

Any ideas ?
Looks like a custom sigma rule in Detections is the only path forward:

Replies: 2 comments

Comment options

You must be logged in to vote
0 replies
Answer selected by presianbg
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
2.4
Labels
None yet
2 participants