You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
N/A
Describe the solution you'd like
Our 7.9 release will provide support for threshold rules in the SIEM's detection engine. We need to add support to the detection-rules CLI for threshold rules.
Describe alternatives you've considered
N/A
Additional context
Below is an email threshold rule that I exported from the SIEM. Please note that including a value for field is not mandatory.
Example threshold rule
{
"author": [],
"actions": [],
"created_at": "2020-07-15T03:55:01.873Z",
"updated_at": "2020-07-15T13:23:49.678Z",
"created_by": "threatpunter",
"description": "Identifies a high number of failed Okta user authentication attempts from a single IP address, which could be indicative of a brute force or password spraying attack. An adversary may attempt a brute force or password spraying attack to obtain unauthorized access to user accounts.",
"enabled": true,
"false_positives": [],
"filters": [],
"from": "now-360s",
"id": "a216c36f-1e60-49d7-b452-e6c0c0011929",
"immutable": false,
"index": [
"filebeat-*"
],
"interval": "5m",
"rule_id": "db2efd83-4e17-4fd8-a56c-13c526722540",
"language": "kuery",
"license": "",
"output_index": ".siem-signals-username-default",
"max_signals": 100,
"risk_score": 47,
"risk_score_mapping": [],
"name": "Okta Brute Force or Password Spraying Attack",
"query": "event.module:okta and event.dataset:okta.system and event.category:authentication and event.outcome:failure",
"references": [],
"meta": {
"from": "1m",
"kibana_siem_app_url": "http://localhost:5603/jyr/app/security/detections"
},
"severity": "medium",
"severity_mapping": [],
"updated_by": "threatpunter",
"tags": [
"Elastic",
"Okta"
],
"to": "now",
"type": "threshold",
"threat": [],
"threshold": {
"field": "source.ip",
"value": 25
},
"throttle": "no_actions",
"version": 2,
"exceptions_list": []
}
The text was updated successfully, but these errors were encountered:
Thanks for the info @threat-punter. I modified the title since there is more involved than the CLI, which should inherit support from the schema changes. I also reformatted the json data to be more readable.
Is your feature request related to a problem? Please describe.
N/A
Describe the solution you'd like
Our 7.9 release will provide support for threshold rules in the SIEM's detection engine. We need to add support to the detection-rules CLI for threshold rules.
Describe alternatives you've considered
N/A
Additional context
Below is an email threshold rule that I exported from the SIEM. Please note that including a value for
field
is not mandatory.Example threshold rule
The text was updated successfully, but these errors were encountered: