@@ -82,7 +82,7 @@ from logs-o365.audit-*, logs-azure.signinlogs-*, .alerts-security.*
8282| where @timestamp > now() - 8 hours
8383// filter for azure or m365 sign-in and external alerts with source.ip not null
8484| where to_ip(source.ip) is not null
85- and (event.dataset in ("o365.audit", "azure.signinlogs") or kibana.alert.rule.name == "External Alerts ")
85+ and (event.dataset in ("o365.audit", "azure.signinlogs") or kibana.alert.rule.rule_id == "eb079c62-4481-4d6e-9643-3ca499df7aaa ")
8686 and not cidr_match(
8787 to_ip(source.ip),
8888 "10.0.0.0/8", "127.0.0.0/8", "169.254.0.0/16", "172.16.0.0/12", "192.0.0.0/24", "192.0.0.0/29",
@@ -93,7 +93,7 @@ from logs-o365.audit-*, logs-azure.signinlogs-*, .alerts-security.*
9393 )
9494
9595// capture relevant raw fields
96- | keep source.ip, event.action, event.outcome, event.dataset, kibana.alert.rule.name , event.category
96+ | keep source.ip, event.action, event.outcome, event.dataset, kibana.alert.rule.rule_id , event.category
9797
9898// classify each source ip based on alert type
9999| eval
@@ -109,7 +109,7 @@ from logs-o365.audit-*, logs-azure.signinlogs-*, .alerts-security.*
109109 Esql.source_ip_network_alert_case_count_distinct = count_distinct(Esql.source_ip_network_alert_case),
110110 Esql.event_dataset_count_distinct = count_distinct(event.dataset),
111111 Esql.event_dataset_values = values(event.dataset),
112- Esql.kibana_alert_rule_name_values = values(kibana.alert.rule.name ),
112+ Esql.kibana_alert_rule_id_values = values(kibana.alert.rule.rule_id ),
113113 Esql.event_category_values = values(event.category)
114114 by Esql.source_ip = to_ip(source.ip)
115115
0 commit comments