Skip to content

Commit 2b3095a

Browse files
Update Max signals value to supported limits (#4556)
1 parent 63c1f47 commit 2b3095a

28 files changed

+151
-256
lines changed

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[project]
22
name = "detection_rules"
3-
version = "1.0.2"
3+
version = "1.0.3"
44
description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine."
55
readme = "README.md"
66
requires-python = ">=3.12"

rules/integrations/endpoint/defense_evasion_elastic_memory_threat_detected.toml

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
min_stack_comments = "Defend alerting adjustments patch to distinguish prevention and detection."
66
min_stack_version = "8.16.0"
77
promotion = true
8-
updated_date = "2025/02/06"
8+
updated_date = "2025/03/21"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -20,7 +20,7 @@ index = ["logs-endpoint.alerts-*"]
2020
interval = "1m"
2121
language = "kuery"
2222
license = "Elastic License v2"
23-
max_signals = 10000
23+
max_signals = 1000
2424
name = "Memory Threat - Detected - Elastic Defend"
2525
note = """## Triage and analysis
2626
@@ -102,13 +102,8 @@ Ransomware - Prevented - Elastic Defend (UUID: 10f3d520-ea35-11ee-a417-f661ea17f
102102
To avoid generating duplicate alerts, you should enable either all feature-specific protection rules or the Endpoint Security (Elastic Defend) rule (UUID: 9a1a2dae-0b5f-4c3d-8305-a268d404c306).
103103
104104
### Additional notes
105-
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
106105
107-
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
108-
109-
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
110-
111-
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects.
106+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
112107
"""
113108
severity = "high"
114109
tags = ["Data Source: Elastic Defend", "Tactic: Defense Evasion", "Resources: Investigation Guide"]

rules/integrations/endpoint/defense_evasion_elastic_memory_threat_prevented.toml

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
min_stack_comments = "Defend alerting adjustments patch to distinguish prevention and detection."
66
min_stack_version = "8.16.0"
77
promotion = true
8-
updated_date = "2025/02/06"
8+
updated_date = "2025/03/21"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -20,7 +20,7 @@ index = ["logs-endpoint.alerts-*"]
2020
interval = "1m"
2121
language = "kuery"
2222
license = "Elastic License v2"
23-
max_signals = 10000
23+
max_signals = 1000
2424
name = "Memory Threat - Prevented- Elastic Defend"
2525
note = """## Triage and analysis
2626
@@ -101,13 +101,8 @@ Ransomware - Prevented - Elastic Defend (UUID: 10f3d520-ea35-11ee-a417-f661ea17f
101101
To avoid generating duplicate alerts, you should enable either all feature-specific protection rules or the Endpoint Security (Elastic Defend) rule (UUID: 9a1a2dae-0b5f-4c3d-8305-a268d404c306).
102102
103103
### Additional notes
104-
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
105104
106-
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
107-
108-
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
109-
110-
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects.
105+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
111106
"""
112107
severity = "high"
113108
tags = ["Data Source: Elastic Defend", "Tactic: Defense Evasion", "Resources: Investigation Guide"]

rules/integrations/endpoint/elastic_endpoint_security.toml

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/07/08"
33
integration = ["endpoint"]
44
maturity = "production"
55
promotion = true
6-
updated_date = "2025/03/20"
6+
updated_date = "2025/03/21"
77

88
[rule]
99
author = ["Elastic"]
@@ -17,7 +17,7 @@ index = ["logs-endpoint.alerts-*"]
1717
interval = "1m"
1818
language = "kuery"
1919
license = "Elastic License v2"
20-
max_signals = 10000
20+
max_signals = 1000
2121
name = "Endpoint Security (Elastic Defend)"
2222
note = """## Triage and analysis
2323
@@ -75,13 +75,8 @@ Related rules:
7575
- Ransomware - Prevented - Elastic Defend (UUID: 10f3d520-ea35-11ee-a417-f661ea17fbce)
7676
7777
### Additional notes
78-
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
7978
80-
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
81-
82-
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
83-
84-
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects.
79+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
8580
"""
8681
severity = "medium"
8782
tags = ["Data Source: Elastic Defend", "Resources: Investigation Guide"]

rules/integrations/endpoint/elastic_endpoint_security_behavior_detected.toml

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
min_stack_comments = "Defend alerting adjustments patch to distinguish prevention and detection."
66
min_stack_version = "8.16.0"
77
promotion = true
8-
updated_date = "2025/02/06"
8+
updated_date = "2025/03/21"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -20,7 +20,7 @@ index = ["logs-endpoint.alerts-*"]
2020
interval = "1m"
2121
language = "kuery"
2222
license = "Elastic License v2"
23-
max_signals = 10000
23+
max_signals = 1000
2424
name = "Behavior - Detected - Elastic Defend"
2525
note = """## Triage and analysis
2626
@@ -85,13 +85,8 @@ Ransomware - Prevented - Elastic Defend (UUID: 10f3d520-ea35-11ee-a417-f661ea17f
8585
To avoid generating duplicate alerts, you should enable either all feature-specific protection rules or the Endpoint Security (Elastic Defend) rule (UUID: 9a1a2dae-0b5f-4c3d-8305-a268d404c306).
8686
8787
### Additional notes
88-
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
8988
90-
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
91-
92-
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
93-
94-
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects.
89+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
9590
"""
9691
severity = "medium"
9792
tags = ["Data Source: Elastic Defend", "Resources: Investigation Guide"]

rules/integrations/endpoint/elastic_endpoint_security_behavior_prevented.toml

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
min_stack_comments = "Defend alerting adjustments patch to distinguish prevention and detection."
66
min_stack_version = "8.16.0"
77
promotion = true
8-
updated_date = "2025/02/06"
8+
updated_date = "2025/03/21"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -20,7 +20,7 @@ index = ["logs-endpoint.alerts-*"]
2020
interval = "1m"
2121
language = "kuery"
2222
license = "Elastic License v2"
23-
max_signals = 10000
23+
max_signals = 1000
2424
name = "Behavior - Prevented - Elastic Defend"
2525
note = """## Triage and analysis
2626
@@ -86,13 +86,8 @@ Ransomware - Prevented - Elastic Defend (UUID: 10f3d520-ea35-11ee-a417-f661ea17f
8686
To avoid generating duplicate alerts, you should enable either all feature-specific protection rules or the Endpoint Security (Elastic Defend) rule (UUID: 9a1a2dae-0b5f-4c3d-8305-a268d404c306).
8787
8888
### Additional notes
89-
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
9089
91-
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
92-
93-
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
94-
95-
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects.
90+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
9691
"""
9792
severity = "low"
9893
tags = ["Data Source: Elastic Defend", "Resources: Investigation Guide"]

rules/integrations/endpoint/execution_elastic_malicious_file_detected.toml

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
min_stack_comments = "Defend alerting adjustments patch to distinguish prevention and detection."
66
min_stack_version = "8.16.0"
77
promotion = true
8-
updated_date = "2025/02/06"
8+
updated_date = "2025/03/21"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -20,7 +20,7 @@ index = ["logs-endpoint.alerts-*"]
2020
interval = "1m"
2121
language = "kuery"
2222
license = "Elastic License v2"
23-
max_signals = 10000
23+
max_signals = 1000
2424
name = "Malicious File - Detected - Elastic Defend"
2525
note = """## Triage and analysis
2626
@@ -93,13 +93,8 @@ Ransomware - Prevented - Elastic Defend (UUID: 10f3d520-ea35-11ee-a417-f661ea17f
9393
To avoid generating duplicate alerts, you should enable either all feature-specific protection rules or the Endpoint Security (Elastic Defend) rule (UUID: 9a1a2dae-0b5f-4c3d-8305-a268d404c306).
9494
9595
### Additional notes
96-
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
9796
98-
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
99-
100-
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
101-
102-
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects.
97+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
10398
"""
10499
severity = "medium"
105100
tags = ["Data Source: Elastic Defend", "Tactic: Execution", "Resources: Investigation Guide"]

rules/integrations/endpoint/execution_elastic_malicious_file_prevented.toml

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
min_stack_comments = "Defend alerting adjustments patch to distinguish prevention and detection."
66
min_stack_version = "8.16.0"
77
promotion = true
8-
updated_date = "2025/02/06"
8+
updated_date = "2025/03/21"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -20,7 +20,7 @@ index = ["logs-endpoint.alerts-*"]
2020
interval = "1m"
2121
language = "kuery"
2222
license = "Elastic License v2"
23-
max_signals = 10000
23+
max_signals = 1000
2424
name = "Malicious File - Prevented - Elastic Defend"
2525
note = """## Triage and analysis
2626
@@ -93,13 +93,8 @@ Ransomware - Prevented - Elastic Defend (UUID: 10f3d520-ea35-11ee-a417-f661ea17f
9393
To avoid generating duplicate alerts, you should enable either all feature-specific protection rules or the Endpoint Security (Elastic Defend) rule (UUID: 9a1a2dae-0b5f-4c3d-8305-a268d404c306).
9494
9595
### Additional notes
96-
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
9796
98-
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
99-
100-
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
101-
102-
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects.
97+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
10398
"""
10499
severity = "low"
105100
tags = ["Data Source: Elastic Defend", "Tactic: Execution", "Resources: Investigation Guide"]

rules/integrations/endpoint/impact_elastic_ransomware_detected.toml

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
min_stack_comments = "Defend alerting adjustments patch to distinguish prevention and detection."
66
min_stack_version = "8.16.0"
77
promotion = true
8-
updated_date = "2025/02/06"
8+
updated_date = "2025/03/21"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -20,7 +20,7 @@ index = ["logs-endpoint.alerts-*"]
2020
interval = "1m"
2121
language = "kuery"
2222
license = "Elastic License v2"
23-
max_signals = 10000
23+
max_signals = 1000
2424
name = "Ransomware - Detected - Elastic Defend"
2525
note = """## Triage and analysis
2626
@@ -84,13 +84,8 @@ Ransomware - Prevented - Elastic Defend (UUID: 10f3d520-ea35-11ee-a417-f661ea17f
8484
To avoid generating duplicate alerts, you should enable either all feature-specific protection rules or the Endpoint Security (Elastic Defend) rule (UUID: 9a1a2dae-0b5f-4c3d-8305-a268d404c306).
8585
8686
### Additional notes
87-
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
8887
89-
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
90-
91-
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
92-
93-
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects.
88+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
9489
"""
9590
severity = "high"
9691
tags = ["Data Source: Elastic Defend", "Tactic: Impact", "Resources: Investigation Guide"]

rules/integrations/endpoint/impact_elastic_ransomware_prevented.toml

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
min_stack_comments = "Defend alerting adjustments patch to distinguish prevention and detection."
66
min_stack_version = "8.16.0"
77
promotion = true
8-
updated_date = "2025/02/06"
8+
updated_date = "2025/03/21"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -20,7 +20,7 @@ index = ["logs-endpoint.alerts-*"]
2020
interval = "1m"
2121
language = "kuery"
2222
license = "Elastic License v2"
23-
max_signals = 10000
23+
max_signals = 1000
2424
name = "Ransomware - Prevented - Elastic Defend"
2525
note = """## Triage and analysis
2626
@@ -85,13 +85,8 @@ Ransomware - Prevented - Elastic Defend (UUID: 10f3d520-ea35-11ee-a417-f661ea17f
8585
To avoid generating duplicate alerts, you should enable either all feature-specific protection rules or the Endpoint Security (Elastic Defend) rule (UUID: 9a1a2dae-0b5f-4c3d-8305-a268d404c306).
8686
8787
### Additional notes
88-
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
8988
90-
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
91-
92-
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
93-
94-
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects.
89+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
9590
"""
9691
severity = "high"
9792
tags = ["Data Source: Elastic Defend", "Tactic: Impact", "Resources: Investigation Guide"]

0 commit comments

Comments
 (0)