Skip to content

Commit ce84f54

Browse files
more final rule changes
1 parent e74ab19 commit ce84f54

File tree

113 files changed

+282
-1090
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

113 files changed

+282
-1090
lines changed

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/403_response_to_a_post.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
2-
"description": "A POST request to web application returned a 403 response which indicates the web application declined to process the request because the action requested was disallowed.",
2+
"description": "A POST request to web application returned a 403 response, which indicates the web application declined to process the request because the action requested was not allowed",
33
"false_positives": [
4-
"Security scans and tests may result in these errors. Misconfigured or buggy applications may produce large numbers of these errors. If the source is unexpected, or the user is unauthorized, or the request is unusual, these may be suspicious or malicious activity."
4+
"Security scans and tests may result in these errors. Misconfigured or buggy applications may produce large numbers of these errors. If the source is unexpected, the user unauthorized, or the request unusual, these may indicate suspicious or malicious activity."
55
],
66
"index": [
77
"apm-*-transaction*"
88
],
99
"language": "kuery",
10-
"max_signals": 33,
10+
"max_signals": 100,
1111
"name": "Web Application Suspicious Activity: POST Request Declined",
1212
"query": "http.response.status_code:403 and http.request.method:post",
1313
"references": [

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/405_response_method_not_allowed.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
2-
"description": "A request to web application returned a 405 response which indicates the web application declined to process the request because the HTTP method was not allowed for the resource.",
2+
"description": "A request to web application returned a 405 response which indicates the web application declined to process the request because the HTTP method is not allowed for the resource",
33
"false_positives": [
4-
"Security scans and tests may result in these errors. Misconfigured or buggy applications may produce large numbers of these errors. If the source is unexpected, or the user is unauthorized, or the request is unusual, these may be suspicious or malicious activity."
4+
"Security scans and tests may result in these errors. Misconfigured or buggy applications may produce large numbers of these errors. If the source is unexpected, the user unauthorized, or the request unusual, these may indicate suspicious or malicious activity."
55
],
66
"index": [
77
"apm-*-transaction*"
88
],
99
"language": "kuery",
10-
"max_signals": 33,
10+
"max_signals": 100,
1111
"name": "Web Application Suspicious Activity: Unauthorized Method",
1212
"query": "http.response.status_code:405",
1313
"references": [

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint_security_adversary_behavior_detected.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2-
"description": "Elastic Endpoint Security Alert - Adversary behavior detected.",
2+
"description": "Elastic Endpoint detected an Adversary Behavior. Click the Elastic Endpoint icon in the event.module column or the link in the rule.reference column in the External Alerts tab of the SIEM Detections page for additional information.",
33
"index": [
44
"endgame-*"
55
],
66
"language": "kuery",
7-
"max_signals": 33,
7+
"max_signals": 100,
88
"name": "Adversary Behavior - Detected - Elastic Endpoint",
99
"query": "event.kind:alert and event.module:endgame and event.action:rules_engine_event",
1010
"risk_score": 47,

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint_security_cred_dumping_detected.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
{
2-
"description": "Elastic Endpoint Security Alert - Credential dumping detected.",
2+
"description": "Elastic Endpoint detected Credential Dumping. Click the Elastic Endpoint icon in the event.module column or the link in the rule.reference column in the External Alerts tab of the SIEM Detections page for additional information.",
33
"index": [
44
"endgame-*"
55
],
66
"language": "kuery",
7-
"max_signals": 33,
8-
"name": "Cred Dumping - Detected - Elastic Endpoint",
7+
"max_signals": 100,
8+
"name": "Credential Dumping - Detected - Elastic Endpoint",
99
"query": "event.kind:alert and event.module:endgame and event.action:cred_theft_event and endgame.metadata.type:detection",
1010
"risk_score": 73,
1111
"rule_id": "571afc56-5ed9-465d-a2a9-045f099f6e7e",

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint_security_cred_dumping_prevented.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
{
2-
"description": "Elastic Endpoint Security Alert - Credential dumping prevented.",
2+
"description": "Elastic Endpoint prevented Credential Dumping. Click the Elastic Endpoint icon in the event.module column or the link in the rule.reference column in the External Alerts tab of the SIEM Detections page for additional information.",
33
"index": [
44
"endgame-*"
55
],
66
"language": "kuery",
7-
"max_signals": 33,
8-
"name": "Cred Dumping - Prevented - Elastic Endpoint",
7+
"max_signals": 100,
8+
"name": "Credential Dumping - Prevented - Elastic Endpoint",
99
"query": "event.kind:alert and event.module:endgame and event.action:cred_theft_event and endgame.metadata.type:prevention",
1010
"risk_score": 47,
1111
"rule_id": "db8c33a8-03cd-4988-9e2c-d0a4863adb13",

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint_security_cred_manipulation_detected.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
{
2-
"description": "Elastic Endpoint Security Alert - Credential manipulation detected.",
2+
"description": "Elastic Endpoint detected Credential Manipulation. Click the Elastic Endpoint icon in the event.module column or the link in the rule.reference column in the External Alerts tab of the SIEM Detections page for additional information.",
33
"index": [
44
"endgame-*"
55
],
66
"language": "kuery",
7-
"max_signals": 33,
8-
"name": "Cred Manipulation - Detected - Elastic Endpoint",
7+
"max_signals": 100,
8+
"name": "Credential Manipulation - Detected - Elastic Endpoint",
99
"query": "event.kind:alert and event.module:endgame and event.action:token_manipulation_event and endgame.metadata.type:detection",
1010
"risk_score": 73,
1111
"rule_id": "c0be5f31-e180-48ed-aa08-96b36899d48f",

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint_security_cred_manipulation_prevented.json

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,18 @@
11
{
2-
"description": "Elastic Endpoint Security Alert - Credential manipulation prevented.",
2+
"description": "Elastic Endpoint prevented Credential Manipulation. Click the Elastic Endpoint icon in the event.module column or the link in the rule.reference column in the External Alerts tab of the SIEM Detections page for additional information.",
33
"index": [
44
"endgame-*"
55
],
66
"language": "kuery",
7-
"max_signals": 33,
8-
"name": "Cred Manipulation - Prevented - Elastic Endpoint",
7+
"max_signals": 100,
8+
"name": "Credential Manipulation - Prevented - Elastic Endpoint",
99
"query": "event.kind:alert and event.module:endgame and event.action:token_manipulation_event and endgame.metadata.type:prevention",
1010
"risk_score": 47,
1111
"rule_id": "c9e38e64-3f4c-4bf3-ad48-0e61a60ea1fa",
1212
"severity": "medium",
1313
"tags": [
14-
"Elastic"
14+
"Elastic",
15+
"Endpoint"
1516
],
1617
"type": "query",
1718
"version": 1

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint_security_exploit_detected.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2-
"description": "Elastic Endpoint Security Alert - Exploit detected.",
2+
"description": "Elastic Endpoint detected an Exploit. Click the Elastic Endpoint icon in the event.module column or the link in the rule.reference column in the External Alerts tab of the SIEM Detections page for additional information.",
33
"index": [
44
"endgame-*"
55
],
66
"language": "kuery",
7-
"max_signals": 33,
7+
"max_signals": 100,
88
"name": "Exploit - Detected - Elastic Endpoint",
99
"query": "event.kind:alert and event.module:endgame and event.action:exploit_event and endgame.metadata.type:detection",
1010
"risk_score": 73,

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint_security_exploit_prevented.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2-
"description": "Elastic Endpoint Security Alert - Exploit prevented.",
2+
"description": "Elastic Endpoint prevented an Exploit. Click the Elastic Endpoint icon in the event.module column or the link in the rule.reference column in the External Alerts tab of the SIEM Detections page for additional information.",
33
"index": [
44
"endgame-*"
55
],
66
"language": "kuery",
7-
"max_signals": 33,
7+
"max_signals": 100,
88
"name": "Exploit - Prevented - Elastic Endpoint",
99
"query": "event.kind:alert and event.module:endgame and event.action:exploit_event and endgame.metadata.type:prevention",
1010
"risk_score": 47,

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint_security_malware_detected.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
{
2-
"description": "Elastic Endpoint Security Alert - Malware detected.",
2+
"description": "Elastic Endpoint detected Malware. Click the Elastic Endpoint icon in the event.module column or the link in the rule.reference column in the External Alerts tab of the SIEM Detections page for additional information.",
33
"index": [
44
"endgame-*"
55
],
66
"language": "kuery",
7-
"max_signals": 33,
7+
"max_signals": 100,
88
"name": "Malware - Detected - Elastic Endpoint",
99
"query": "event.kind:alert and event.module:endgame and event.action:file_classification_event and endgame.metadata.type:detection",
1010
"risk_score": 99,

0 commit comments

Comments
 (0)