Skip to content

Commit 699902b

Browse files
shashank-elastictradebot-elastic
authored andcommitted
Fix pipe characters in rule descriptions (#4893)
(cherry picked from commit b707920)
1 parent 5ad3a9a commit 699902b

File tree

22 files changed

+46
-46
lines changed

22 files changed

+46
-46
lines changed

rules/integrations/aws/impact_s3_object_encryption_with_external_key.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/07/02"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/07/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -28,7 +28,7 @@ note = """
2828
### Investigating AWS S3 Object Encryption Using External KMS Key
2929
3030
This rule detects the use of an external AWS KMS key to encrypt objects within an S3 bucket. Adversaries with access to a misconfigured S3 bucket may use an external key to copy objects within a bucket and deny victims the ability to access their own data.
31-
This rule uses [ES|QL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule) to look for use of the `CopyObject` operation where the target bucket's `cloud.account.id` is different from the `key.account.id` dissected from the AWS KMS key used for encryption.
31+
This rule uses [ESQL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule) to look for use of the `CopyObject` operation where the target bucket's `cloud.account.id` is different from the `key.account.id` dissected from the AWS KMS key used for encryption.
3232
3333
#### Possible Investigation Steps:
3434

rules/integrations/aws/persistence_iam_user_created_access_keys_for_another_user.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/06/13"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/07/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -27,7 +27,7 @@ note = """## Triage and analysis
2727
2828
AWS access keys created for IAM users or root user are long-term credentials that provide programmatic access to AWS.
2929
With access to the `iam:CreateAccessKey` permission, a set of compromised credentials could be used to create a new
30-
set of credentials for another user for privilege escalation or as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
30+
set of credentials for another user for privilege escalation or as a means of persistence. This rule uses [ESQL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
3131
to look for use of the `CreateAccessKey` operation where the user.name is different from the user.target.name.
3232
3333

rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_group.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/31"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/07/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -29,7 +29,7 @@ note = """## Triage and analysis
2929
3030
The AWS IAM `AdministratorAccess` managed policy provides full access to all AWS services and resources.
3131
With access to the `iam:AttachGroupPolicy` permission, a set of compromised credentials could be used to attach
32-
this policy to the current user's groups for privilege escalation or as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
32+
this policy to the current user's groups for privilege escalation or as a means of persistence. This rule uses [ESQL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
3333
to look for use of the `AttachGroupPolicy` operation along with request_parameters where the policyName is `AdministratorAccess`.
3434
3535

rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_role.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/31"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/07/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -28,7 +28,7 @@ note = """## Triage and analysis
2828
2929
The AWS IAM `AdministratorAccess` managed policy provides full access to all AWS services and resources.
3030
With access to the `iam:AttachRolePolicy` permission, a set of compromised credentials could be used to attach
31-
this policy to a compromised role for privilege escalation or as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
31+
this policy to a compromised role for privilege escalation or as a means of persistence. This rule uses [ESQL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
3232
to look for use of the `AttachRolePolicy` operation along with request_parameters where the policyName is `AdministratorAccess`.
3333
3434

rules/integrations/aws/privilege_escalation_iam_administratoraccess_policy_attached_to_user.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2024/05/30"
33
integration = ["aws"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/07/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -28,7 +28,7 @@ note = """## Triage and analysis
2828
2929
The AWS IAM `AdministratorAccess` managed policy provides full access to all AWS services and resources.
3030
With access to the `iam:AttachUserPolicy` permission, a set of compromised credentials could be used to attach
31-
this policy to the current user for privilege escalation or another user as a means of persistence. This rule uses [ES|QL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
31+
this policy to the current user for privilege escalation or another user as a means of persistence. This rule uses [ESQL](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-esql-rule)
3232
to look for use of the `AttachUserPolicy` operation along with request_parameters where the policyName is `AdministratorAccess`.
3333
3434

rules/integrations/azure/credential_access_entra_id_brute_force_activity.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
creation_date = "2024/09/06"
33
integration = ["azure"]
44
maturity = "production"
5-
min_stack_comments = "Elastic ES|QL values aggregation is more performant in 8.16.5 and above."
5+
min_stack_comments = "Elastic ESQL values aggregation is more performant in 8.16.5 and above."
66
min_stack_version = "8.17.0"
7-
updated_date = "2025/07/02"
7+
updated_date = "2025/07/10"
88

99
[rule]
1010
author = ["Elastic"]

rules/integrations/azure/initial_access_entra_graph_single_session_from_multiple_addresses.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/05/08"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/07/02"
5+
updated_date = "2025/07/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -32,7 +32,7 @@ This rule identifies when Microsoft Graph is accessed from a different IP than t
3232
but using the same session ID within 5 minutes. This may suggest an adversary has stolen a session cookie or refresh/access
3333
token and is impersonating the user from an alternate host or location.
3434
35-
This rule uses ES|QL aggregations and thus has dynamically generated fields. Correlation of the values in the alert document may need to be
35+
This rule uses ESQL aggregations and thus has dynamically generated fields. Correlation of the values in the alert document may need to be
3636
performed to the original sign-in and Graph events for further context.
3737
3838
### Investigation Steps

rules/integrations/o365/collection_onedrive_excessive_file_downloads.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/02/19"
33
integration = ["o365"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/07/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -27,7 +27,7 @@ note = """## Triage and Analysis
2727
2828
This rule detects an excessive number of files downloaded from OneDrive using OAuth authentication. Threat actors may use OAuth phishing attacks, such as **Device Code Authentication phishing**, to obtain valid access tokens and perform unauthorized data exfiltration. This method allows adversaries to bypass traditional authentication mechanisms, making it a stealthy and effective technique.
2929
30-
This rule leverages ES|QL aggregations which limit the field values available in the alert document. To investigate further, it is recommended to identify the original documents ingested.
30+
This rule leverages ESQL aggregations which limit the field values available in the alert document. To investigate further, it is recommended to identify the original documents ingested.
3131
3232
#### Possible Investigation Steps
3333

rules/integrations/o365/credential_access_microsoft_365_excessive_account_lockouts.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/05/10"
33
integration = ["o365"]
44
maturity = "production"
5-
updated_date = "2025/07/02"
5+
updated_date = "2025/07/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -20,7 +20,7 @@ note = """## Triage and Analysis
2020
2121
Detects a burst of Microsoft 365 user account lockouts within a short 5-minute window. A high number of IdsLocked login errors across multiple user accounts may indicate brute-force attempts for the same users resulting in lockouts.
2222
23-
This rule uses ES|QL aggregations and thus has dynamically generated fields. Correlation of the values in the alert document may need to be performed to the original sign-in and Graph events for further context.
23+
This rule uses ESQL aggregations and thus has dynamically generated fields. Correlation of the values in the alert document may need to be performed to the original sign-in and Graph events for further context.
2424
2525
### Investigation Steps
2626

rules/integrations/okta/credential_access_multiple_device_token_hashes_for_single_okta_session.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/11/08"
33
integration = ["okta"]
44
maturity = "production"
5-
updated_date = "2025/07/02"
5+
updated_date = "2025/07/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -22,7 +22,7 @@ note = """## Triage and analysis
2222
This rule detects when a specific Okta actor has multiple device token hashes for a single Okta session. This may indicate an authenticated session has been hijacked or is being used by multiple devices. Adversaries may hijack a session to gain unauthorized access to Okta admin console, applications, tenants, or other resources.
2323
2424
#### Possible investigation steps:
25-
- Since this is an ES|QL rule, the `okta.actor.alternate_id` and `okta.authentication_context.external_session_id` values can be used to pivot into the raw authentication events related to this alert.
25+
- Since this is an ESQL rule, the `okta.actor.alternate_id` and `okta.authentication_context.external_session_id` values can be used to pivot into the raw authentication events related to this alert.
2626
- Identify the users involved in this action by examining the `okta.actor.id`, `okta.actor.type`, `okta.actor.alternate_id`, and `okta.actor.display_name` fields.
2727
- Determine the device client used for these actions by analyzing `okta.client.ip`, `okta.client.user_agent.raw_user_agent`, `okta.client.zone`, `okta.client.device`, and `okta.client.id` fields.
2828
- With Okta end users identified, review the `okta.debug_context.debug_data.dt_hash` field.

0 commit comments

Comments
 (0)