Skip to content

Commit 2599c6b

Browse files
Merge branch 'main' into esql-field-validation
2 parents 252aafa + a6dfd2c commit 2599c6b

File tree

23 files changed

+67
-50
lines changed

23 files changed

+67
-50
lines changed

rules/integrations/aws/privilege_escalation_iam_customer_managed_policy_attached_to_role.toml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,7 @@
22
creation_date = "2024/11/04"
33
integration = ["aws"]
44
maturity = "production"
5-
min_stack_comments = "New fields added: actor.entity.id and target.entity.id"
6-
min_stack_version = "8.16.5"
7-
updated_date = "2025/07/10"
5+
updated_date = "2025/10/10"
86

97
[rule]
108
author = ["Elastic"]
@@ -17,7 +15,7 @@ false_positives = [
1715
""",
1816
]
1917
from = "now-6m"
20-
index = ["filebeat-*", "logs-aws.cloudtrail-*"]
18+
index = ["logs-aws.cloudtrail-*"]
2119
language = "kuery"
2220
license = "Elastic License v2"
2321
name = "AWS IAM Customer-Managed Policy Attached to Role by Rare User"

rules/integrations/aws/privilege_escalation_iam_update_assume_role_policy.toml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,7 @@
22
creation_date = "2020/07/06"
33
integration = ["aws"]
44
maturity = "production"
5-
min_stack_comments = "New fields added: actor.entity.id and target.entity.id"
6-
min_stack_version = "8.16.5"
7-
updated_date = "2025/07/10"
5+
updated_date = "2025/10/10"
86

97
[rule]
108
author = ["Elastic"]

rules/integrations/azure/collection_graph_email_access_by_unusual_public_client_via_graph.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/05/06"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/05/06"
5+
updated_date = "2025/09/08"
66

77
[rule]
88
author = ["Elastic"]
@@ -15,7 +15,7 @@ object ID. This is a New Terms rule that only signals if the application ID and
1515
seen doing this activity in the last 14 days.
1616
"""
1717
from = "now-9m"
18-
index = ["filebeat-*", "logs-azure.graphactivitylogs-*"]
18+
index = ["logs-azure.graphactivitylogs-*"]
1919
language = "kuery"
2020
license = "Elastic License v2"
2121
name = "Suspicious Email Access by First-Party Application via Microsoft Graph"

rules/integrations/azure/credential_access_entra_id_brute_force_activity.toml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,7 @@
22
creation_date = "2024/09/06"
33
integration = ["azure"]
44
maturity = "production"
5-
min_stack_comments = "Elastic ESQL values aggregation is more performant in 8.16.5 and above."
6-
min_stack_version = "8.17.0"
7-
updated_date = "2025/07/16"
5+
updated_date = "2025/10/10"
86

97
[rule]
108
author = ["Elastic"]

rules/integrations/azure/initial_access_entra_id_protection_sign_in_risk_detected.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2025/04/29"
33
integration = ["azure"]
44
maturity = "production"
55
promotion = true
6-
updated_date = "2025/05/02"
6+
updated_date = "2025/09/08"
77

88
[rule]
99
author = ["Elastic"]
@@ -28,7 +28,7 @@ false_positives = [
2828
""",
2929
]
3030
from = "now-9m"
31-
index = ["filebeat-*", "logs-azure.identity_protection-*"]
31+
index = ["logs-azure.identity_protection-*"]
3232
language = "kuery"
3333
license = "Elastic License v2"
3434
max_signals = 1000

rules/integrations/azure/initial_access_entra_id_protection_user_risk_detected.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2025/06/02"
33
integration = ["azure"]
44
maturity = "production"
55
promotion = true
6-
updated_date = "2025/06/02"
6+
updated_date = "2025/09/08"
77

88
[rule]
99
author = ["Elastic"]
@@ -28,7 +28,7 @@ false_positives = [
2828
""",
2929
]
3030
from = "now-9m"
31-
index = ["filebeat-*", "logs-azure.identity_protection-*"]
31+
index = ["logs-azure.identity_protection-*"]
3232
language = "kuery"
3333
license = "Elastic License v2"
3434
max_signals = 1000

rules/integrations/azure/initial_access_entra_id_user_reported_risk.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
creation_date = "2025/05/21"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/05/21"
5+
updated_date = "2025/09/08"
66

77
[rule]
88
author = ["Elastic", "Willem D'Haese"]
99
description = """
1010
Identifies suspicious activity reported by users in Microsoft Entra ID where users have reported suspicious activity related to their accounts, which may indicate potential compromise or unauthorized access attempts. Reported suspicious activity typically occurs during the authentication process and may involve various authentication methods, such as password resets, account recovery, or multi-factor authentication challenges. Adversaries may attempt to exploit user accounts by leveraging social engineering techniques or other methods to gain unauthorized access to sensitive information or resources.
1111
"""
1212
from = "now-9m"
13-
index = ["filebeat-*", "logs-azure.auditlogs-*"]
13+
index = ["logs-azure.auditlogs-*"]
1414
language = "kuery"
1515
license = "Elastic License v2"
1616
name = "Microsoft Entra ID User Reported Suspicious Activity"

rules/integrations/azure/initial_access_entra_illicit_consent_grant_via_registered_application.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/09/01"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/03/24"
5+
updated_date = "2025/09/08"
66

77
[rule]
88
author = ["Elastic"]
@@ -13,7 +13,7 @@ accomplished by tricking a user into granting consent to the application, typica
1313
establishes an OAuth grant that allows the malicious client applocation to access resources on-behalf-of the user.
1414
"""
1515
from = "now-9m"
16-
index = ["filebeat-*", "logs-azure*"]
16+
index = ["logs-azure*"]
1717
language = "kuery"
1818
license = "Elastic License v2"
1919
name = "Microsoft Entra ID Illicit Consent Grant via Registered Application"

rules/integrations/azure/initial_access_entra_protection_multi_azure_identity_protection_alerts.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/04/30"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/04/30"
5+
updated_date = "2025/09/08"
66

77
[rule]
88
author = ["Elastic"]
@@ -13,7 +13,7 @@ sign-ins, or other risk detections. Multiple alerts in a short time frame may in
1313
account.
1414
"""
1515
from = "now-9m"
16-
index = ["filebeat-*", "logs-azure.identity_protection-*"]
16+
index = ["logs-azure.identity_protection-*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Multiple Microsoft Entra ID Protection Alerts by User Principal"

rules/integrations/azure/initial_access_graph_first_occurrence_of_client_request.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/04/23"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/05/19"
5+
updated_date = "2025/09/08"
66

77
[rule]
88
author = ["Elastic"]
@@ -29,7 +29,7 @@ false_positives = [
2929
""",
3030
]
3131
from = "now-9m"
32-
index = ["filebeat-*", "logs-azure.graphactivitylogs-*"]
32+
index = ["logs-azure.graphactivitylogs-*"]
3333
language = "kuery"
3434
license = "Elastic License v2"
3535
name = "Microsoft Graph First Occurrence of Client Request"

0 commit comments

Comments
 (0)