Skip to content

Commit df16262

Browse files
Samirboustradebot-elastic
authored andcommitted
[Tuning] Elastic Defend and Email Alerts Correlation (#5459)
* [Tuning] Elastic Defend and Email Alerts Correlation this rule uses the logs-* generic index, which causes failures on clusters without an email related integration with `destination.user.name` populated. for now limiting the rule to checkpoint email security and we can add more or users can customize it by adding more indexes. * add checkpoint_email manifest and schema * Update pyproject.toml * Update multiple_alerts_email_elastic_defend_correlation.toml (cherry picked from commit 6ac69db)
1 parent 45fc55d commit df16262

File tree

4 files changed

+5
-3
lines changed

4 files changed

+5
-3
lines changed
114 Bytes
Binary file not shown.
332 Bytes
Binary file not shown.

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[project]
22
name = "detection_rules"
3-
version = "1.5.22"
3+
version = "1.5.23"
44
description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine."
55
readme = "README.md"
66
requires-python = ">=3.12"

rules/cross-platform/multiple_alerts_email_elastic_defend_correlation.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
[metadata]
22
creation_date = "2025/11/19"
3+
integration = ["endpoint", "checkpoint_email"]
34
maturity = "production"
4-
updated_date = "2025/11/19"
5+
updated_date = "2025/12/15"
56

67
[rule]
78
author = ["Elastic"]
@@ -22,14 +23,15 @@ tags = [
2223
"Rule Type: Higher-Order Rule",
2324
"Resources: Investigation Guide",
2425
"Data Source: Elastic Defend",
26+
"Data Source: Check Point Harmony Email & Collaboration",
2527
"Domain: Email",
2628
"Domain: Endpoint"
2729
]
2830
timestamp_override = "event.ingested"
2931
type = "esql"
3032

3133
query = '''
32-
from logs-* metadata _id
34+
from logs-endpoint.alerts-*, logs-checkpoint_email.event-* metadata _id
3335
// Email or Elastic Defend alerts where user name is populated
3436
| where
3537
(event.category == "email" and event.kind == "alert" and destination.user.name is not null) or

0 commit comments

Comments
 (0)