-
Notifications
You must be signed in to change notification settings - Fork 520
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[New Rule] Elastic Endpoint and External Alerts (#42)
* Adds the Elastic Endpoint and External Alerts rules and required schema updates * Optimizing queries to fix tests * Apply PEP257 changes * Apply suggestions from code review * Update rules/cross-platform/external_alerts.toml * Last fixes from review * Fixing test for unrequired default * Adding increased default max_signals to not interfere with testing * Make promotions folder * Refining Elastic Endpoint rule index Co-authored-by: Ross Wolf <[email protected]> Co-authored-by: Justin Ibarra <[email protected]>
- Loading branch information
1 parent
a0b5015
commit c28795c
Showing
19 changed files
with
141 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,60 @@ | ||
[metadata] | ||
creation_date = "2020/07/08" | ||
ecs_version = ["1.5.0"] | ||
maturity = "production" | ||
updated_date = "2020/07/08" | ||
|
||
[rule] | ||
author = ["Elastic"] | ||
description = """ | ||
Generates a detection alert each time an Elastic Endpoint alert is received. Enabling this rule allows you to | ||
immediately begin investigating your Elastic Endpoint alerts. | ||
""" | ||
enabled = true | ||
from = "now-10m" | ||
index = ["logs-endpoint.alerts-*"] | ||
language = "kuery" | ||
license = "Elastic License" | ||
max_signals = 10000 | ||
name = "Elastic Endpoint" | ||
risk_score = 47 | ||
rule_id = "9a1a2dae-0b5f-4c3d-8305-a268d404c306" | ||
rule_name_override = "message" | ||
severity = "medium" | ||
tags = ["Elastic", "Endpoint"] | ||
timestamp_override = "event.ingested" | ||
type = "query" | ||
|
||
query = ''' | ||
event.kind:alert and event.module:(endpoint and not endgame) | ||
''' | ||
|
||
|
||
[[rule.risk_score_mapping]] | ||
field = "event.risk_score" | ||
operator = "equals" | ||
value = "" | ||
|
||
[[rule.severity_mapping]] | ||
field = "event.severity" | ||
operator = "equals" | ||
value = "21" | ||
severity = "low" | ||
|
||
[[rule.severity_mapping]] | ||
field = "event.severity" | ||
operator = "equals" | ||
value = "47" | ||
severity = "medium" | ||
|
||
[[rule.severity_mapping]] | ||
field = "event.severity" | ||
operator = "equals" | ||
value = "73" | ||
severity = "high" | ||
|
||
[[rule.severity_mapping]] | ||
field = "event.severity" | ||
operator = "equals" | ||
value = "99" | ||
severity = "critical" |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
[metadata] | ||
creation_date = "2020/07/08" | ||
ecs_version = ["1.5.0"] | ||
maturity = "production" | ||
updated_date = "2020/07/08" | ||
|
||
[rule] | ||
author = ["Elastic"] | ||
description = """ | ||
Generates a detection alert for each external alert written to the configured securitySolution:defaultIndex. Enabling | ||
this rule allows you to immediately begin investigating external alerts in the app. | ||
""" | ||
language = "kuery" | ||
license = "Elastic License" | ||
max_signals = 10000 | ||
name = "External Alerts" | ||
risk_score = 47 | ||
rule_id = "eb079c62-4481-4d6e-9643-3ca499df7aaa" | ||
rule_name_override = "message" | ||
severity = "medium" | ||
tags = ["Elastic"] | ||
timestamp_override = "event.ingested" | ||
type = "query" | ||
|
||
query = ''' | ||
event.kind:alert and not event.module:(endgame or endpoint) | ||
''' | ||
|
||
|
||
[[rule.risk_score_mapping]] | ||
field = "event.risk_score" | ||
operator = "equals" | ||
value = "" | ||
|
||
[[rule.severity_mapping]] | ||
field = "event.severity" | ||
operator = "equals" | ||
value = "21" | ||
severity = "low" | ||
|
||
[[rule.severity_mapping]] | ||
field = "event.severity" | ||
operator = "equals" | ||
value = "47" | ||
severity = "medium" | ||
|
||
[[rule.severity_mapping]] | ||
field = "event.severity" | ||
operator = "equals" | ||
value = "73" | ||
severity = "high" | ||
|
||
[[rule.severity_mapping]] | ||
field = "event.severity" | ||
operator = "equals" | ||
value = "99" | ||
severity = "critical" |