Skip to content

Commit f787d3d

Browse files
committed
Update multiple_alerts_email_elastic_defend_correlation.toml
1 parent 876d816 commit f787d3d

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

rules/cross-platform/multiple_alerts_email_elastic_defend_correlation.toml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -56,26 +56,26 @@ from logs-* metadata _id
5656
| keep Esql.alerts_count, Esql.event_module_values, Esql.host_id_values, Esql.source_user_name, Esql.target_user_name, Esql.message_values, Esql.rule_name_values, Esql.event_action_values
5757
'''
5858
note = """## Triage and analysis
59-
### Investigating Elastic Defend and NG-Firewall Alerts Correlation
60-
This rule correlate any Elastic Defend alert with suspicious events from Next-Gen Firewall like Palo Alto Networks (PANW) and Fortinet Fortigate by host.ip.
59+
### Investigating Elastic Defend and Email Alerts Correlation
60+
61+
This rule correlate any Elastic Defend alert with an email security related alert by target user name.
62+
6163
### Possible investigation steps
6264
- Review the alert details to identify the specific host and users involved.
63-
- Investiguate the network alerts by destination.ip and message.
64-
- Examine the timeline of the alerts to understand the sequence of events and determine if there is a pattern or progression in the tactics used.
65+
- Investiguate the individual alerts for the target user name and see if they are related.
66+
- Review all emails received from Esql.source_user_name and if there are other impacted users.
6567
- Correlate the alert data with other logs and telemetry from the host, such as process creation, network connections, and file modifications, to gather additional context.
66-
- Check for any indicators of compromise (IOCs) associated with the alerts, such as suspicious IP addresses, domains, or file hashes, and search for these across the network.
6768
- Assess the impact and scope of the potential compromise by determining if other hosts or systems have similar alerts or related activity.
69+
6870
### False positive analysis
69-
- Alerts from routine administrative tasks may trigger multiple alerts. Review and exclude known benign activities such as scheduled software updates or system maintenance.
70-
- Security tools running on the host might generate alerts across different tactics. Identify and exclude alerts from trusted security applications to reduce noise.
71-
- Automated scripts or batch processes can mimic adversarial behavior. Analyze and whitelist these processes if they are verified as non-threatening.
72-
- Frequent alerts from development or testing environments can be misleading. Consider excluding these environments from the rule or applying a different risk score.
73-
- User behavior anomalies, such as accessing multiple systems or applications, might trigger alerts. Implement user behavior baselines to differentiate between normal and suspicious activities.
71+
- Legitimate email marked as suspicious.
72+
- Legitimate file or behavior marked as suspicious by Elastic Defend.
73+
- Unrelated alerts where the target user name is too generic.
74+
7475
### Response and remediation
7576
- Isolate the affected host from the network immediately to prevent further lateral movement by the adversary.
76-
- Conduct a thorough forensic analysis of the host to identify the specific vulnerabilities exploited and gather evidence of the attack phases involved.
77+
- Conduct a thorough forensic analysis of the host.
7778
- Remove any identified malicious software or unauthorized access tools from the host, ensuring all persistence mechanisms are eradicated.
78-
- Apply security patches and updates to the host to address any exploited vulnerabilities and prevent similar attacks.
7979
- Restore the host from a known good backup if necessary, ensuring that the backup is free from compromise.
8080
- Monitor the host and network for any signs of re-infection or further suspicious activity, using enhanced logging and alerting based on the identified attack patterns.
8181
- Escalate the incident to the appropriate internal or external cybersecurity teams for further investigation and potential legal action if the attack is part of a larger campaign."""

0 commit comments

Comments
 (0)