Skip to content

Commit 3868842

Browse files
Mikaayensontradebot-elastic
authored andcommitted
[Rule Tuning] AI4DSOC External Promotion Alerts (#4959)
(cherry picked from commit 80e44d0)
1 parent d643f50 commit 3868842

7 files changed

+131
-36
lines changed

rules/promotions/crowdstrike_external_alerts.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
promotion = true
66
min_stack_version = "8.18.0"
77
min_stack_comments = "Introduced support for CrowdStrike alert promotion"
8-
updated_date = "2025/07/31"
8+
updated_date = "2025/08/04"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -24,7 +24,7 @@ note = """## Triage and analysis
2424
2525
### Investigating CrowdStrike External Alerts
2626
27-
CrowdStrike Falcon is a cloud-native endpoint protection platform that delivers real-time threat detection and response capabilities. The 'Behavior - Detected - CrowdStrike Alerts' rule captures security alerts generated by Falcon and enables analysts to investigate threats rapidly based on behavioral indicators and threat intelligence.
27+
CrowdStrike Falcon is a cloud-native endpoint protection platform that delivers real-time threat detection and response capabilities. The rule captures security alerts generated by Falcon and enables analysts to investigate threats rapidly based on behavioral indicators and threat intelligence.
2828
2929
### Possible investigation steps
3030
@@ -53,7 +53,7 @@ CrowdStrike Falcon is a cloud-native endpoint protection platform that delivers
5353
references = ["https://docs.elastic.co/en/integrations/crowdstrike"]
5454
risk_score = 47
5555
rule_id = "aeebe561-c338-4118-9924-8cb4e478aa58"
56-
rule_name_override = "message"
56+
rule_name_override = "crowdstrike.alert.name"
5757
setup = """## Setup
5858
5959
### CrowdStrike Alert Integration

rules/promotions/elastic_security_external_alerts.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
promotion = true
66
min_stack_version = "8.18.0"
77
min_stack_comments = "Introduced support for Elastic Security alert promotion"
8-
updated_date = "2025/07/31"
8+
updated_date = "2025/08/04"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -25,7 +25,7 @@ note = """
2525
2626
### Investigating Elastic Security External Alerts
2727
28-
Elastic Security is a comprehensive security platform that provides real-time visibility into your environment, helping you detect and respond to threats effectively. The 'Behavior - Detected - Elastic Security Alerts' rule identifies such threats by monitoring specific alert events, enabling analysts to swiftly investigate and mitigate potential security incidents.
28+
The Elastic Security integration facilitates transferring security alert data from another Elasticsearch instance to your own, enabling threats to be investigated in a centralized manner.
2929
3030
### Possible investigation steps
3131

rules/promotions/google_secops_external_alerts.toml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
promotion = true
66
min_stack_version = "8.18.0"
77
min_stack_comments = "Introduced support for Google SecOps alert promotion"
8-
updated_date = "2025/07/31"
8+
updated_date = "2025/08/04"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -24,7 +24,7 @@ note = """Triage and analysis
2424
2525
### Investigating Google SecOps External Alerts
2626
27-
Google SecOps provides a robust framework for monitoring and managing security operations within cloud environments. The detection rule leverages specific event identifiers to flag suspicious alerts, enabling analysts to swiftly investigate potential threats and mitigate risks.
27+
Google SecOps provides a robust framework for monitoring and managing security operations within cloud environments. The rule leverages specific event identifiers to flag suspicious alerts, enabling analysts to swiftly investigate potential threats and mitigate risks.
2828
2929
### Possible investigation steps
3030
@@ -106,5 +106,3 @@ field = "event.severity"
106106
operator = "equals"
107107
severity = "critical"
108108
value = "99"
109-
110-

rules/promotions/microsoft_sentinel_external_alerts.toml

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
promotion = true
66
min_stack_version = "8.18.0"
77
min_stack_comments = "Introduced support for Microsoft Sentinel alert promotion"
8-
updated_date = "2025/07/31"
8+
updated_date = "2025/08/04"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -24,7 +24,7 @@ note = """ Triage and analysis
2424
2525
## Investigating Microsoft Sentinel External Alerts
2626
27-
Microsoft Sentinel is a cloud-native SIEM tool that aggregates security data for threat detection and response. The 'Behavior - Detected' rule identifies each alert logged in Sentinel, enabling analysts to swiftly investigate potential threats.
27+
Microsoft Sentinel is a cloud-native SIEM tool that aggregates security data for threat detection and response. The rule identifies each alert logged in Sentinel, enabling analysts to swiftly investigate potential threats.
2828
2929
### Possible investigation steps
3030
@@ -86,18 +86,22 @@ value = ""
8686
field = "event.severity"
8787
operator = "equals"
8888
severity = "low"
89-
value = "1"
89+
value = "21"
9090

9191
[[rule.severity_mapping]]
9292
field = "event.severity"
9393
operator = "equals"
9494
severity = "medium"
95-
value = "2"
95+
value = "47"
9696

9797
[[rule.severity_mapping]]
9898
field = "event.severity"
9999
operator = "equals"
100100
severity = "high"
101-
value = "3"
102-
101+
value = "73"
103102

103+
[[rule.severity_mapping]]
104+
field = "event.severity"
105+
operator = "equals"
106+
severity = "critical"
107+
value = "99"

rules/promotions/sentinelone_external_alerts.toml renamed to rules/promotions/sentinelone_alert_external_alerts.toml

Lines changed: 15 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
promotion = true
66
min_stack_version = "8.18.0"
77
min_stack_comments = "Introduced support for SentinelOne alert promotion"
8-
updated_date = "2025/07/31"
8+
updated_date = "2025/08/04"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -19,12 +19,12 @@ interval = "1m"
1919
language = "kuery"
2020
license = "Elastic License v2"
2121
max_signals = 1000
22-
name = "SentinelOne External Alerts"
22+
name = "SentinelOne Alert External Alerts"
2323
note = """## Triage and analysis
2424
25-
### Investigating SentinelOne External Alerts
25+
### Investigating SentinelOne Alert External Alerts
2626
27-
SentinelOne is a cybersecurity platform that provides endpoint protection by detecting and responding to threats in real-time. The 'Behavior - Detected - SentinelOne Alerts' rule identifies such threats by monitoring specific alert events, enabling analysts to swiftly investigate and mitigate potential security incidents.
27+
SentinelOne is a cybersecurity platform that provides endpoint protection by detecting and responding to threats in real-time. The rule identifies such threats by monitoring specific alert events, enabling analysts to swiftly investigate and mitigate potential security incidents.
2828
2929
### Possible investigation steps
3030
@@ -55,15 +55,15 @@ SentinelOne is a cybersecurity platform that provides endpoint protection by det
5555
references = ["https://docs.elastic.co/en/integrations/sentinel_one"]
5656
risk_score = 47
5757
rule_id = "9b35422b-9102-45a9-8610-2e0c22281c55"
58-
rule_name_override = "sentinel_one.alert.rule.name"
58+
rule_name_override = "rule.name"
5959
setup = """## Setup
6060
6161
### SentinelOne Alert Integration
6262
This rule is designed to capture alert events generated by the SentinelOne integration and promote them as Elastic detection alerts.
6363
6464
To capture SentinelOne alerts, install and configure the SentinelOne integration to ingest alert events into the `logs-sentinel_one.alert-*` index pattern.
6565
66-
If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same SentinelOne events. Consider adding a rule exception for the External Alert rule to exclude datastream.dataset: (sentinel_one.alert or sentinel_one.threat) to avoid receiving duplicate alerts.
66+
If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same SentinelOne events. Consider adding a rule exception for the External Alert rule to exclude datastream.dataset: sentinel_one.alert to avoid receiving duplicate alerts.
6767
6868
### Additional notes
6969
@@ -75,7 +75,7 @@ timestamp_override = "event.ingested"
7575
type = "query"
7676

7777
query = '''
78-
(event.kind: alert and data_stream.dataset: sentinel_one.threat) or (event.kind: event and data_stream.dataset: sentinel_one.alert)
78+
event.kind: event and data_stream.dataset: sentinel_one.alert
7979
'''
8080

8181

@@ -85,27 +85,25 @@ operator = "equals"
8585
value = ""
8686

8787
[[rule.severity_mapping]]
88-
field = "sentinel_one.alert.rule.severity"
88+
field = "event.severity"
8989
operator = "equals"
9090
severity = "low"
91-
value = "Low"
91+
value = "21"
9292

9393
[[rule.severity_mapping]]
94-
field = "sentinel_one.alert.rule.severity"
94+
field = "event.severity"
9595
operator = "equals"
9696
severity = "medium"
97-
value = "Medium"
97+
value = "47"
9898

9999
[[rule.severity_mapping]]
100-
field = "sentinel_one.alert.rule.severity"
100+
field = "event.severity"
101101
operator = "equals"
102102
severity = "high"
103-
value = "High"
103+
value = "73"
104104

105105
[[rule.severity_mapping]]
106-
field = "sentinel_one.alert.rule.severity"
106+
field = "event.severity"
107107
operator = "equals"
108108
severity = "critical"
109-
value = "Critical"
110-
111-
109+
value = "99"
Lines changed: 97 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,97 @@
1+
[metadata]
2+
creation_date = "2025/08/04"
3+
integration = ["sentinel_one"]
4+
maturity = "production"
5+
promotion = true
6+
min_stack_version = "8.18.0"
7+
min_stack_comments = "Introduced support for SentinelOne threat promotion"
8+
updated_date = "2025/08/04"
9+
10+
[rule]
11+
author = ["Elastic"]
12+
description = """
13+
Generates a detection alert for each SentinelOne threat written to the configured indices. Enabling this rule allows you
14+
to immediately begin investigating SentinelOne threat alerts in the app.
15+
"""
16+
from = "now-2m"
17+
index = ["logs-sentinel_one.threat-*"]
18+
interval = "1m"
19+
language = "kuery"
20+
license = "Elastic License v2"
21+
max_signals = 1000
22+
name = "SentinelOne Threat External Alerts"
23+
note = """## Triage and analysis
24+
25+
### Investigating SentinelOne Threat External Alerts
26+
27+
SentinelOne is a cybersecurity platform that provides endpoint protection by detecting and responding to threats in real-time. The rule identifies such threats by monitoring specific threat events, enabling analysts to swiftly investigate and mitigate potential security incidents.
28+
29+
### Possible investigation steps
30+
31+
- Correlate the threat alert with recent activity on the affected endpoint to identify any unusual or suspicious behavior patterns.
32+
- Check for any additional alerts or logs related to the same endpoint or user to determine if this is part of a broader attack or isolated incident.
33+
- Investigate the source and destination IP addresses involved in the threat to assess if they are known to be malicious or associated with previous threats.
34+
- Analyze any files or processes flagged in the threat alert to determine if they are legitimate or potentially malicious, using threat intelligence sources if necessary.
35+
- Consult the SentinelOne investigation guide and resources tagged in the alert for specific guidance on handling similar threats.
36+
37+
### False positive analysis
38+
39+
- Threats triggered by routine software updates or patches can be false positives. Review the context of the threat to determine if it aligns with scheduled maintenance activities.
40+
- Legitimate administrative tools or scripts may trigger threat alerts. Identify and whitelist these tools if they are verified as non-threatening.
41+
- Frequent threat alerts from known safe applications or processes can be excluded by creating exceptions for these specific behaviors in the SentinelOne configuration.
42+
- Network scanning or monitoring tools used by IT teams might be flagged. Ensure these tools are documented and excluded from triggering alerts if they are part of regular operations.
43+
- User behavior that is consistent with their role but triggers threat alerts should be reviewed. If deemed non-malicious, adjust the rule to exclude these specific user actions.
44+
45+
### Response and remediation
46+
47+
- Isolate the affected endpoint immediately to prevent lateral movement and further compromise within the network.
48+
- Analyze the specific threat alert details to identify the nature of the threat and any associated indicators of compromise (IOCs).
49+
- Remove or quarantine any malicious files or processes identified by the SentinelOne threat alert to neutralize the threat.
50+
- Apply relevant security patches or updates to address any exploited vulnerabilities on the affected endpoint.
51+
- Conduct a thorough scan of the network to identify any additional endpoints that may have been compromised or are exhibiting similar behavior.
52+
- Document the incident and escalate to the appropriate security team or management if the threat is part of a larger attack campaign or if additional resources are needed for remediation.
53+
- Review and update endpoint protection policies and configurations to enhance detection and prevention capabilities against similar threats in the future.
54+
"""
55+
references = ["https://docs.elastic.co/en/integrations/sentinel_one"]
56+
risk_score = 47
57+
rule_id = "e43b7578-f3cc-4682-a8cf-f9d8a5fb07f1"
58+
rule_name_override = "message"
59+
setup = """## Setup
60+
61+
### SentinelOne Threat Integration
62+
This rule is designed to capture threat events generated by the SentinelOne integration and promote them as Elastic detection alerts.
63+
64+
To capture SentinelOne threat alerts, install and configure the SentinelOne integration to ingest threat events into the `logs-sentinel_one.threat-*` index pattern.
65+
66+
If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same SentinelOne events. Consider adding a rule exception for the External Alert rule to exclude datastream.dataset: sentinel_one.threat to avoid receiving duplicate alerts.
67+
68+
### Additional notes
69+
70+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
71+
"""
72+
severity = "medium"
73+
tags = ["Data Source: SentinelOne", "Use Case: Threat Detection", "Resources: Investigation Guide", "Promotion: External Alerts"]
74+
timestamp_override = "event.ingested"
75+
type = "query"
76+
77+
query = '''
78+
event.kind: alert and data_stream.dataset: sentinel_one.threat
79+
'''
80+
81+
82+
[[rule.risk_score_mapping]]
83+
field = "event.risk_score"
84+
operator = "equals"
85+
value = ""
86+
87+
[[rule.severity_mapping]]
88+
field = "sentinel_one.threat.confidence_level"
89+
operator = "equals"
90+
severity = "medium"
91+
value = "suspicious"
92+
93+
[[rule.severity_mapping]]
94+
field = "sentinel_one.threat.confidence_level"
95+
operator = "equals"
96+
severity = "high"
97+
value = "malicious"

rules/promotions/splunk_external_alerts.toml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ maturity = "production"
55
promotion = true
66
min_stack_version = "8.18.0"
77
min_stack_comments = "Introduced support for Splunk alert integration and promotion"
8-
updated_date = "2025/07/31"
8+
updated_date = "2025/08/04"
99

1010
[rule]
1111
author = ["Elastic"]
@@ -24,7 +24,7 @@ note = """## Triage and analysis
2424
2525
### Investigating Splunk External Alerts
2626
27-
Splunk monitors and analyzes data, often used in security environments to track and respond to potential threats. The 'Behavior - Detected - Splunk Alerts' rule identifies such manipulations by flagging alerts enabling timely investigation and response.
27+
Splunk monitors and analyzes data, often used in security environments to track and respond to potential threats. The rule identifies such manipulations by flagging alerts enabling timely investigation and response.
2828
2929
### Possible investigation steps
3030
@@ -107,5 +107,3 @@ field = "event.severity"
107107
operator = "equals"
108108
severity = "critical"
109109
value = "99"
110-
111-

0 commit comments

Comments
 (0)