Skip to content

Commit e84c835

Browse files
committed
[Tuning] Elastic Defend and Email Alerts Correlation
this rule uses the logs-* generic index, which causes failures on clusters without an email related integration with `destination.user.name` populated. for now limiting the rule to checkpoint email security and we can add more or users can customize it by adding more indexes.
1 parent 2cc1a34 commit e84c835

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

rules/cross-platform/multiple_alerts_email_elastic_defend_correlation.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
[metadata]
22
creation_date = "2025/11/19"
3+
integration = ["endpoint", "checkpoint_email"]
34
maturity = "production"
4-
updated_date = "2025/11/19"
5+
updated_date = "2025/12/15"
56

67
[rule]
78
author = ["Elastic"]
@@ -22,14 +23,15 @@ tags = [
2223
"Rule Type: Higher-Order Rule",
2324
"Resources: Investigation Guide",
2425
"Data Source: Elastic Defend",
26+
"Data Source: Check Point Harmony Email & Collaboration",
2527
"Domain: Email",
2628
"Domain: Endpoint"
2729
]
2830
timestamp_override = "event.ingested"
2931
type = "esql"
3032

3133
query = '''
32-
from logs-* metadata _id
34+
from logs-endpoint.alerts-*, logs-checkpoint_email.event-default-* metadata _id
3335
// Email or Elastic Defend alerts where user name is populated
3436
| where
3537
(event.category == "email" and event.kind == "alert" and destination.user.name is not null) or

0 commit comments

Comments
 (0)