Skip to content

Commit 45fb497

Browse files
Update latest docs (#7016)
1 parent 5e2fa59 commit 45fb497

File tree

30 files changed

+2814
-12
lines changed

30 files changed

+2814
-12
lines changed
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
[[prebuilt-rule-8-19-3-crowdstrike-external-alerts]]
2+
=== CrowdStrike External Alerts
3+
4+
Generates a detection alert for each CrowdStrike alert written to the configured indices. Enabling this rule allows you to immediately begin investigating CrowdStrike alerts in the app.
5+
6+
*Rule type*: query
7+
8+
*Rule indices*:
9+
10+
* logs-crowdstrike.alert-*
11+
12+
*Severity*: medium
13+
14+
*Risk score*: 47
15+
16+
*Runs every*: 1m
17+
18+
*Searches indices from*: now-2m ({ref}/common-options.html#date-math[Date Math format], see also <<rule-schedule, `Additional look-back time`>>)
19+
20+
*Maximum alerts per execution*: 1000
21+
22+
*References*:
23+
24+
* https://docs.elastic.co/en/integrations/crowdstrike
25+
26+
*Tags*:
27+
28+
* Data Source: CrowdStrike
29+
* Use Case: Threat Detection
30+
* Resources: Investigation Guide
31+
* Promotion: External Alerts
32+
33+
*Version*: 1
34+
35+
*Rule authors*:
36+
37+
* Elastic
38+
39+
*Rule license*: Elastic License v2
40+
41+
42+
==== Investigation guide
43+
44+
45+
46+
*Triage and analysis*
47+
48+
49+
50+
*Investigating CrowdStrike External Alerts*
51+
52+
53+
CrowdStrike Falcon is a cloud-native endpoint protection platform that delivers real-time threat detection and response capabilities. The rule captures security alerts generated by Falcon and enables analysts to investigate threats rapidly based on behavioral indicators and threat intelligence.
54+
55+
56+
*Possible investigation steps*
57+
58+
59+
- Review the associated process, file path, and command line to determine whether the activity is legitimate or suspicious.
60+
- Investigate the user account and host involved in the alert to validate whether the activity was authorized.
61+
- Cross-reference the alert with CrowdStrike Falcon console for additional context, including process tree, behavioral tags, and threat intelligence matches.
62+
- Check for any related alerts from the same host, user, or file hash to identify whether this is part of a larger attack chain.
63+
- Consult the Crowdstrike investigation guide and resources tagged in the alert for specific guidance on handling similar threats.
64+
65+
66+
*False positive analysis*
67+
68+
69+
- Alerts involving known and trusted software tools (e.g., remote administration tools) may be false positives. Confirm intent before excluding.
70+
- Security assessments or penetration testing activities might mimic real threats. Validate the activity with responsible teams.
71+
- Scheduled jobs, IT scripts, or automation tools may trigger alerts if they behave similarly to malicious code.
72+
- Review alerts based on detection confidence levels and behavioral scoring to filter out low-confidence or known-benign triggers.
73+
74+
75+
*Response and remediation*
76+
77+
78+
- Isolate affected endpoints to prevent lateral movement if malicious behavior is confirmed.
79+
- Quarantine any identified malicious files and block related hashes or domains.
80+
- Investigate how the threat entered the environment and close any exploited vulnerabilities.
81+
- Reset credentials for compromised user accounts or escalate to incident response.
82+
- Review CrowdStrike Falcon policies and detections to fine-tune future alerting and response coverage.
83+
- Document the findings and update detection logic or exceptions accordingly.
84+
85+
86+
==== Setup
87+
88+
89+
90+
*Setup*
91+
92+
93+
94+
*CrowdStrike Alert Integration*
95+
96+
This rule is designed to capture alert events generated by the CrowdStrike integration and promote them as Elastic detection alerts.
97+
98+
To capture CrowdStrike alerts, install and configure the CrowdStrike integration to ingest alert events into the `logs-crowdstrike.alert-*` index pattern.
99+
100+
If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same CrowdStrike events. Consider adding a rule exception for the External Alert rule to exclude data_stream.dataset:crowdstrike.alert to avoid receiving duplicate alerts.
101+
102+
103+
*Additional notes*
104+
105+
106+
For information on troubleshooting the maximum alerts warning please refer to this https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts[guide].
107+
108+
109+
==== Rule query
110+
111+
112+
[source, js]
113+
----------------------------------
114+
event.kind: alert and data_stream.dataset: crowdstrike.alert
115+
116+
----------------------------------
Lines changed: 118 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,118 @@
1+
[[prebuilt-rule-8-19-3-elastic-security-external-alerts]]
2+
=== Elastic Security External Alerts
3+
4+
Generates a detection alert for each Elastic Security alert written to the configured indices. Enabling this rule allows you to immediately begin investigating Elastic Security alerts in the app.
5+
6+
*Rule type*: query
7+
8+
*Rule indices*:
9+
10+
* logs-elastic_security.alert-*
11+
12+
*Severity*: medium
13+
14+
*Risk score*: 47
15+
16+
*Runs every*: 1m
17+
18+
*Searches indices from*: now-2m ({ref}/common-options.html#date-math[Date Math format], see also <<rule-schedule, `Additional look-back time`>>)
19+
20+
*Maximum alerts per execution*: 1000
21+
22+
*References*:
23+
24+
* https://docs.elastic.co/en/integrations/elastic_security
25+
26+
*Tags*:
27+
28+
* Data Source: Elastic Security
29+
* Use Case: Threat Detection
30+
* Resources: Investigation Guide
31+
* Promotion: External Alerts
32+
33+
*Version*: 1
34+
35+
*Rule authors*:
36+
37+
* Elastic
38+
39+
*Rule license*: Elastic License v2
40+
41+
42+
==== Investigation guide
43+
44+
45+
46+
*Triage and analysis*
47+
48+
49+
50+
*Investigating Elastic Security External Alerts*
51+
52+
53+
The Elastic Security integration facilitates transferring security alert data from another Elasticsearch instance to your own, enabling threats to be investigated in a centralized manner.
54+
55+
56+
*Possible investigation steps*
57+
58+
59+
- Correlate the alert with recent activity on the affected endpoint to identify any unusual or suspicious behavior patterns.
60+
- Check for any additional alerts or logs related to the same endpoint or user to determine if this is part of a broader attack or isolated incident.
61+
- Investigate the source and destination IP addresses involved in the alert to assess if they are known to be malicious or associated with previous threats.
62+
- Analyze any files or processes flagged in the alert to determine if they are legitimate or potentially malicious, using threat intelligence sources if necessary.
63+
- Consult the Elastic Security investigation guide and resources tagged in the alert for specific guidance on handling similar threats.
64+
65+
66+
*False positive analysis*
67+
68+
69+
- Alerts triggered by routine software updates or patches can be false positives. Review the context of the alert to determine if it aligns with scheduled maintenance activities.
70+
- Legitimate administrative tools or scripts may trigger alerts. Identify and whitelist these tools if they are verified as non-threatening.
71+
- Frequent alerts from known safe applications or processes can be excluded by creating exceptions for these specific behaviors in the Elastic Security configuration.
72+
- Network scanning or monitoring tools used by IT teams might be flagged. Ensure these tools are documented and excluded from triggering alerts if they are part of regular operations.
73+
- User behavior that is consistent with their role but triggers alerts should be reviewed. If deemed non-malicious, adjust the rule to exclude these specific user actions.
74+
75+
76+
*Response and remediation*
77+
78+
79+
- Isolate the affected endpoint immediately to prevent lateral movement and further compromise within the network.
80+
- Analyze the specific alert details to identify the nature of the threat and any associated indicators of compromise (IOCs).
81+
- Remove or quarantine any malicious files or processes identified by the Elastic Security alert to neutralize the threat.
82+
- Apply relevant security patches or updates to address any exploited vulnerabilities on the affected endpoint.
83+
- Conduct a thorough scan of the network to identify any additional endpoints that may have been compromised or are exhibiting similar behavior.
84+
- Document the incident and escalate to the appropriate security team or management if the threat is part of a larger attack campaign or if additional resources are needed for remediation.
85+
- Review and update endpoint protection policies and configurations to enhance detection and prevention capabilities against similar threats in the future.
86+
87+
88+
==== Setup
89+
90+
91+
92+
*Setup*
93+
94+
95+
96+
*Elastic Security Alert Integration*
97+
98+
This rule is designed to capture alert events generated by the Elastic Security integration and promote them as Elastic detection alerts.
99+
100+
To capture Elastic Security alerts, install and configure the Elastic Security integration to ingest alert events into the `logs-elastic_security.alert-*` index pattern.
101+
102+
If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same Elastic Security events. Consider adding a rule exception for the External Alert rule to exclude data_stream.dataset:elastic_security.alert to avoid receiving duplicate alerts.
103+
104+
105+
*Additional notes*
106+
107+
108+
For information on troubleshooting the maximum alerts warning please refer to this https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts[guide].
109+
110+
111+
==== Rule query
112+
113+
114+
[source, js]
115+
----------------------------------
116+
event.kind: alert and data_stream.dataset: elastic_security.alert
117+
118+
----------------------------------
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
[[prebuilt-rule-8-19-3-google-secops-external-alerts]]
2+
=== Google SecOps External Alerts
3+
4+
Generates a detection alert for each Google SecOps alert written to the configured indices. Enabling this rule allows you to immediately begin investigating Google SecOps alerts in the app.
5+
6+
*Rule type*: query
7+
8+
*Rule indices*:
9+
10+
* logs-google_secops.alert-*
11+
12+
*Severity*: medium
13+
14+
*Risk score*: 47
15+
16+
*Runs every*: 1m
17+
18+
*Searches indices from*: now-2m ({ref}/common-options.html#date-math[Date Math format], see also <<rule-schedule, `Additional look-back time`>>)
19+
20+
*Maximum alerts per execution*: 1000
21+
22+
*References*:
23+
24+
* https://docs.elastic.co/en/integrations/google_secops
25+
26+
*Tags*:
27+
28+
* Data Source: Google SecOps
29+
* Use Case: Threat Detection
30+
* Resources: Investigation Guide
31+
* Promotion: External Alerts
32+
33+
*Version*: 1
34+
35+
*Rule authors*:
36+
37+
* Elastic
38+
39+
*Rule license*: Elastic License v2
40+
41+
42+
==== Investigation guide
43+
44+
45+
Triage and analysis
46+
47+
48+
*Investigating Google SecOps External Alerts*
49+
50+
51+
Google SecOps provides a robust framework for monitoring and managing security operations within cloud environments. The rule leverages specific event identifiers to flag suspicious alerts, enabling analysts to swiftly investigate potential threats and mitigate risks.
52+
53+
54+
*Possible investigation steps*
55+
56+
57+
- Examine the timeline of events leading up to and following the alert to identify any unusual patterns or activities that may indicate malicious behavior.
58+
- Cross-reference the alert with other security logs and alerts to determine if it is part of a broader attack pattern or isolated incident.
59+
- Investigate the source and destination IP addresses involved in the alert to assess their legitimacy and check for any known malicious activity associated with them.
60+
- Analyze user activity associated with the alert to identify any unauthorized access or privilege escalation attempts.
61+
- Consult the Google SecOps investigation guide and resources tagged in the alert for specific guidance on handling similar threats.
62+
63+
64+
*False positive analysis*
65+
66+
67+
- Alerts triggered by routine administrative actions can be false positives. Review the context of the alert to determine if it aligns with known maintenance activities.
68+
- Automated scripts or tools that interact with Google SecOps may generate alerts. Identify these scripts and consider creating exceptions for their expected behavior.
69+
- Frequent alerts from specific IP addresses or user accounts that are known to be secure can be excluded by adding them to an allowlist.
70+
- Alerts resulting from testing or development environments should be reviewed and, if deemed non-threatening, excluded from triggering further alerts.
71+
- Regularly update and review exception lists to ensure they reflect current non-threatening behaviors and do not inadvertently exclude genuine threats.
72+
73+
74+
*Response and remediation*
75+
76+
77+
- Immediately isolate affected systems or accounts identified in the Google SecOps alert to prevent further unauthorized access or data exfiltration.
78+
- Conduct a thorough review of the alert details to identify any compromised credentials or access tokens and reset them promptly.
79+
- Implement network segmentation or access control measures to limit the spread of potential threats within the environment.
80+
- Review and update firewall rules and security group settings to block any suspicious IP addresses or domains associated with the alert.
81+
- Escalate the incident to the security operations center (SOC) or incident response team for further analysis and to determine if additional resources are needed.
82+
- Document the incident, including all actions taken, and update incident response plans to incorporate lessons learned from this event.
83+
- Enhance monitoring and detection capabilities by tuning existing alerts and deploying additional rules to detect similar activities in the future.
84+
85+
86+
==== Setup
87+
88+
89+
90+
*Setup*
91+
92+
93+
94+
*Google SecOps Alert Integration*
95+
96+
This rule is designed to capture alert events generated by the Google SecOps integration and promote them as Elastic detection alerts.
97+
98+
To capture Google SecOps alerts, install and configure the Google SecOps integration to ingest alert events into the `logs-google_secops.alert-*` index pattern.
99+
100+
If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same SecOps events. Consider adding a rule exception for the External Alert rule to exclude data_stream.dataset:google_secops.alert to avoid receiving duplicate alerts.
101+
102+
103+
*Additional notes*
104+
105+
106+
For information on troubleshooting the maximum alerts warning please refer to this https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts[guide].
107+
108+
109+
==== Rule query
110+
111+
112+
[source, js]
113+
----------------------------------
114+
event.kind: alert and data_stream.dataset: google_secops.alert
115+
116+
----------------------------------

0 commit comments

Comments
 (0)