You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Investigating Elastic Defend and NG-Firewall Alerts Correlation
60
-
This rule correlate any Elastic Defend alert with suspicious events from Next-Gen Firewall like Palo Alto Networks (PANW) and Fortinet Fortigate by host.ip.
59
+
### Investigating Elastic Defend and Email Alerts Correlation
60
+
61
+
This rule correlate any Elastic Defend alert with an email security related alert by target user name.
62
+
61
63
### Possible investigation steps
62
64
- Review the alert details to identify the specific host and users involved.
63
-
- Investiguate the network alerts by destination.ip and message.
64
-
- Examine the timeline of the alerts to understand the sequence of events and determine if there is a pattern or progression in the tactics used.
65
+
- Investiguate the individual alerts for the target user name and see if they are related.
66
+
- Review all emails received from Esql.source_user_name and if there are other impacted users.
65
67
- Correlate the alert data with other logs and telemetry from the host, such as process creation, network connections, and file modifications, to gather additional context.
66
-
- Check for any indicators of compromise (IOCs) associated with the alerts, such as suspicious IP addresses, domains, or file hashes, and search for these across the network.
67
68
- Assess the impact and scope of the potential compromise by determining if other hosts or systems have similar alerts or related activity.
69
+
68
70
### False positive analysis
69
-
- Alerts from routine administrative tasks may trigger multiple alerts. Review and exclude known benign activities such as scheduled software updates or system maintenance.
70
-
- Security tools running on the host might generate alerts across different tactics. Identify and exclude alerts from trusted security applications to reduce noise.
71
-
- Automated scripts or batch processes can mimic adversarial behavior. Analyze and whitelist these processes if they are verified as non-threatening.
72
-
- Frequent alerts from development or testing environments can be misleading. Consider excluding these environments from the rule or applying a different risk score.
73
-
- User behavior anomalies, such as accessing multiple systems or applications, might trigger alerts. Implement user behavior baselines to differentiate between normal and suspicious activities.
71
+
- Legitimate email marked as suspicious.
72
+
- Legitimate file or behavior marked as suspicious by Elastic Defend.
73
+
- Unrelated alerts where the target user name is too generic.
74
+
74
75
### Response and remediation
75
76
- Isolate the affected host from the network immediately to prevent further lateral movement by the adversary.
76
-
- Conduct a thorough forensic analysis of the host to identify the specific vulnerabilities exploited and gather evidence of the attack phases involved.
77
+
- Conduct a thorough forensic analysis of the host.
77
78
- Remove any identified malicious software or unauthorized access tools from the host, ensuring all persistence mechanisms are eradicated.
78
-
- Apply security patches and updates to the host to address any exploited vulnerabilities and prevent similar attacks.
79
79
- Restore the host from a known good backup if necessary, ensuring that the backup is free from compromise.
80
80
- Monitor the host and network for any signs of re-infection or further suspicious activity, using enhanced logging and alerting based on the identified attack patterns.
81
81
- Escalate the incident to the appropriate internal or external cybersecurity teams for further investigation and potential legal action if the attack is part of a larger campaign."""
0 commit comments