-
Notifications
You must be signed in to change notification settings - Fork 513
[microsoft_defender_endpoint, m365_defender] extract process.name from process.command_line #15226
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[microsoft_defender_endpoint, m365_defender] extract process.name from process.command_line #15226
Conversation
|
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
Some pipelines already contain logic to parse process.executable and process.name. The script will only be used when either of these fields is missing to set the process.name.
🚀 Benchmarks reportTo see the full report comment with |
efd6
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nits only
packages/m365_defender/data_stream/event/elasticsearch/ingest_pipeline/default.yml
Outdated
Show resolved
Hide resolved
packages/m365_defender/data_stream/alert/elasticsearch/ingest_pipeline/default.yml
Outdated
Show resolved
Hide resolved
packages/m365_defender/data_stream/incident/elasticsearch/ingest_pipeline/default.yml
Outdated
Show resolved
Hide resolved
packages/microsoft_defender_endpoint/data_stream/log/elasticsearch/ingest_pipeline/default.yml
Outdated
Show resolved
Hide resolved
Optimize initializing process ECS
💚 Build Succeeded
History
|
|
efd6
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks
|
I have manually tested this on a problematic sample and it behaves as wanted. |
|
Package m365_defender - 4.0.1 containing this change is available at https://epr.elastic.co/package/m365_defender/4.0.1/ |
|
Package microsoft_defender_endpoint - 3.0.1 containing this change is available at https://epr.elastic.co/package/microsoft_defender_endpoint/3.0.1/ |




Proposed Commit Message
Checklist
changelog.ymlfile.How to test this PR locally
To test integration
Clone integrations repo.
Install the elastic package locally.
Start the elastic stack using the elastic package.
Move to integrations/packages/<integration_name> directory.
Run the following command to run tests.
elastic-package test -vNOTE: To test individual integrations, replace <integration_name> with one of the following: m365_defender or microsoft_defender_endpoint.
Related issues
SDH 6382