Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
47 commits
Select commit Hold shift + click to select a range
c3e3432
add euid changes to security_auth jobs
sodhikirti07 Feb 25, 2026
d0338bb
updated job names in manifest for security_auth
sodhikirti07 Feb 25, 2026
b2bea94
updated azure jobs and manifest.json
sodhikirti07 Feb 25, 2026
793b01c
updated cloudtrail jobs and manifest.json
sodhikirti07 Feb 25, 2026
64882ca
updated security host jobs and manifest.json
sodhikirti07 Feb 25, 2026
4f65695
updated security linux jobs and manifest.json
sodhikirti07 Feb 25, 2026
9f5ae57
updated security packetbeat jobs and manifest.json
sodhikirti07 Feb 25, 2026
d29ad73
updated security windows jobs and manifest.json
sodhikirti07 Feb 25, 2026
02818c4
restore user.name and host.name to jobs influencers
sodhikirti07 Mar 5, 2026
d127d7a
rename auth job
sodhikirti07 Mar 6, 2026
e9cce7a
remove auth euid job suffix
sodhikirti07 Mar 6, 2026
2fd0bee
rename security windows
sodhikirti07 Mar 9, 2026
765809d
Merge branch 'main' into update-ml-jobs-with-new-euids
sodhikirti07 Mar 9, 2026
394a50e
update influencers
sodhikirti07 Mar 9, 2026
a453c01
rename security_auth jobs, datafeed, add influencers and update manifest
sodhikirti07 Mar 9, 2026
e1ba3df
update description of security_auth jobs
sodhikirti07 Mar 9, 2026
841207d
rename security auth jobs, datafeeds, add influencers and update mani…
sodhikirti07 Mar 9, 2026
d7f2e91
update security_cloudtrail jobs, datafeeds and manifest.json
sodhikirti07 Mar 9, 2026
88ff8fb
update security_gcp_audit jobs and datafeeds
sodhikirti07 Mar 9, 2026
77a6d28
update datafeed job id for security auth, cloudtrail, azure
sodhikirti07 Mar 9, 2026
39d0c62
update security_host jobs, datafeeds
sodhikirti07 Mar 9, 2026
23bdc06
update security_linux jobs and datafeeds
sodhikirti07 Mar 9, 2026
fab6bb1
update security_packetbeat jobs and datafeeds
sodhikirti07 Mar 9, 2026
3956d67
update windows jobs and datafeeds
sodhikirti07 Mar 9, 2026
0e11989
remove user.id from security auth
sodhikirti07 Mar 9, 2026
4570d7b
add user.id to influencers
sodhikirti07 Mar 9, 2026
022b63a
Update jobs names to _ea version in test and setup files
susan-shu-c Mar 11, 2026
32cbf23
Update more test and setup files to _ea
susan-shu-c Mar 11, 2026
ab5bbaf
Update more test and setup files to _ea part 3
susan-shu-c Mar 11, 2026
3dacedd
Update test with new _ea job id
susan-shu-c Mar 11, 2026
3b045fb
Update more references to ml jobs
susan-shu-c Mar 11, 2026
848a2d0
Update test data file compressed
susan-shu-c Mar 11, 2026
d8db894
[Needs verification] Update affected_job_ids which prev contained upd…
susan-shu-c Mar 11, 2026
736e8df
Merge branch 'main' into update-ml-jobs-with-new-euids
sodhikirti07 Mar 12, 2026
9a80017
restore old datafeeds for security auth, azureactivity and cloudtrail
sodhikirti07 Mar 12, 2026
4cdc482
rename datafeeds for security auth, azureactivity and cloudtrail
sodhikirti07 Mar 12, 2026
956f495
restore old datafeeds for security windows, linux and packetbeat
sodhikirti07 Mar 12, 2026
5d7be24
renamed datafeed for security linux, windows and packetbeat
sodhikirti07 Mar 12, 2026
91ce942
update axure, gcp, cloudtrail jobs to match description
sodhikirti07 Mar 12, 2026
697854a
Merge branch 'main' into update-ml-jobs-with-new-euids
susan-shu-c Mar 13, 2026
59aeff0
Update setup module for new user_id_ea job name
susan-shu-c Mar 13, 2026
c3886c4
Merge branch 'main' into update-ml-jobs-with-new-euids
sodhikirti07 Mar 16, 2026
7c9a4af
Merge branch 'main' into update-ml-jobs-with-new-euids
sodhikirti07 Mar 19, 2026
f20f51a
Merge branch 'main' into update-ml-jobs-with-new-euids
sodhikirti07 Mar 19, 2026
d3935c7
Merge branch 'main' into update-ml-jobs-with-new-euids
sodhikirti07 Mar 20, 2026
41de35f
Merge branch 'main' into update-ml-jobs-with-new-euids
sodhikirti07 Mar 23, 2026
3f2fbdf
Merge branch 'main' into update-ml-jobs-with-new-euids
sodhikirti07 Mar 24, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions oas_docs/output/kibana.serverless.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14852,7 +14852,7 @@ paths:
anomaly_threshold: 50
id: 60b13926-289b-41b1-a537-197ef1fa5059
machine_learning_job_id:
- auth_high_count_logon_events
- auth_high_count_logon_events_ea
schema:
$ref: '#/components/schemas/Security_Detections_API_RulePatchProps'
description: |
Expand Down Expand Up @@ -15724,7 +15724,7 @@ paths:
description: New description of ml rule
id: 60b13926-289b-41b1-a537-197ef1fa5059
machine_learning_job_id:
- auth_high_count_logon_events
- auth_high_count_logon_events_ea
name: New name of ml rule
risk_score: 21
severity: low
Expand Down Expand Up @@ -16240,7 +16240,7 @@ paths:
interval: 15m
license: Elastic License v2
machine_learning_job_id:
- packetbeat_dns_tunneling
- packetbeat_dns_tunneling_ea
max_signals: 100
name: DNS Tunneling [Duplicate]
references:
Expand Down
6 changes: 3 additions & 3 deletions oas_docs/output/kibana.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16799,7 +16799,7 @@ paths:
anomaly_threshold: 50
id: 60b13926-289b-41b1-a537-197ef1fa5059
machine_learning_job_id:
- auth_high_count_logon_events
- auth_high_count_logon_events_ea
schema:
$ref: '#/components/schemas/Security_Detections_API_RulePatchProps'
description: |
Expand Down Expand Up @@ -17671,7 +17671,7 @@ paths:
description: New description of ml rule
id: 60b13926-289b-41b1-a537-197ef1fa5059
machine_learning_job_id:
- auth_high_count_logon_events
- auth_high_count_logon_events_ea
name: New name of ml rule
risk_score: 21
severity: low
Expand Down Expand Up @@ -18187,7 +18187,7 @@ paths:
interval: 15m
license: Elastic License v2
machine_learning_job_id:
- packetbeat_dns_tunneling
- packetbeat_dns_tunneling_ea
max_signals: 100
name: DNS Tunneling [Duplicate]
references:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,69 +19,69 @@
},
"jobs": [
{
"id": "auth_high_count_logon_events_for_a_source_ip",
"file": "auth_high_count_logon_events_for_a_source_ip.json"
"id": "auth_high_count_logon_events_for_a_source_ip_ea",
"file": "auth_high_count_logon_events_for_a_source_ip_ea.json"
},
{
"id": "auth_high_count_logon_fails",
"file": "auth_high_count_logon_fails.json"
"id": "auth_high_count_logon_fails_ea",
"file": "auth_high_count_logon_fails_ea.json"
},
{
"id": "auth_high_count_logon_events",
"file": "auth_high_count_logon_events.json"
"id": "auth_high_count_logon_events_ea",
"file": "auth_high_count_logon_events_ea.json"
},
{
"id": "auth_rare_hour_for_a_user",
"file": "auth_rare_hour_for_a_user.json"
"id": "auth_rare_hour_for_a_user_ea",
"file": "auth_rare_hour_for_a_user_ea.json"
},
{
"id": "auth_rare_source_ip_for_a_user",
"file": "auth_rare_source_ip_for_a_user.json"
"id": "auth_rare_source_ip_for_a_user_ea",
"file": "auth_rare_source_ip_for_a_user_ea.json"
},
{
"id": "auth_rare_user",
"file": "auth_rare_user.json"
"id": "auth_rare_user_ea",
"file": "auth_rare_user_ea.json"
},
{
"id": "suspicious_login_activity",
"file": "suspicious_login_activity.json"
"id": "suspicious_login_activity_ea",
"file": "suspicious_login_activity_ea.json"
}
],
"datafeeds": [
{
"id": "datafeed-auth_high_count_logon_events_for_a_source_ip",
"file": "datafeed_auth_high_count_logon_events_for_a_source_ip.json",
"job_id": "auth_high_count_logon_events_for_a_source_ip"
"id": "datafeed-auth_high_count_logon_events_for_a_source_ip_ea",
"file": "datafeed_auth_high_count_logon_events_for_a_source_ip_ea.json",
"job_id": "auth_high_count_logon_events_for_a_source_ip_ea"
},
{
"id": "datafeed-auth_high_count_logon_fails",
"file": "datafeed_auth_high_count_logon_fails.json",
"job_id": "auth_high_count_logon_fails"
"id": "datafeed-auth_high_count_logon_fails_ea",
"file": "datafeed_auth_high_count_logon_fails_ea.json",
"job_id": "auth_high_count_logon_fails_ea"
},
{
"id": "datafeed-auth_high_count_logon_events",
"file": "datafeed_auth_high_count_logon_events.json",
"job_id": "auth_high_count_logon_events"
"id": "datafeed-auth_high_count_logon_events_ea",
"file": "datafeed_auth_high_count_logon_events_ea.json",
"job_id": "auth_high_count_logon_events_ea"
},
{
"id": "datafeed-auth_rare_hour_for_a_user",
"file": "datafeed_auth_rare_hour_for_a_user.json",
"job_id": "auth_rare_hour_for_a_user"
"id": "datafeed-auth_rare_hour_for_a_user_ea",
"file": "datafeed_auth_rare_hour_for_a_user_ea.json",
"job_id": "auth_rare_hour_for_a_user_ea"
},
{
"id": "datafeed-auth_rare_source_ip_for_a_user",
"file": "datafeed_auth_rare_source_ip_for_a_user.json",
"job_id": "auth_rare_source_ip_for_a_user"
"id": "datafeed-auth_rare_source_ip_for_a_user_ea",
"file": "datafeed_auth_rare_source_ip_for_a_user_ea.json",
"job_id": "auth_rare_source_ip_for_a_user_ea"
},
{
"id": "datafeed-auth_rare_user",
"file": "datafeed_auth_rare_user.json",
"job_id": "auth_rare_user"
"id": "datafeed-auth_rare_user_ea",
"file": "datafeed_auth_rare_user_ea.json",
"job_id": "auth_rare_user_ea"
},
{
"id": "datafeed-suspicious_login_activity",
"file": "datafeed_suspicious_login_activity.json",
"job_id": "suspicious_login_activity"
"id": "datafeed-suspicious_login_activity_ea",
"file": "datafeed_suspicious_login_activity_ea.json",
"job_id": "suspicious_login_activity_ea"
}
],
"tags": [
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
{
"description": "Security: Authentication - Looks for an unusually large spike in successful authentication events. This can be due to password spraying, user enumeration, or brute force activity. Requires Windows event data, such as from Winlogbeat.",
"groups": ["security", "authentication"],
"groups": [
"security",
"authentication"
],
"analysis_config": {
"bucket_span": "15m",
"detectors": [
Expand All @@ -10,7 +13,15 @@
"detector_index": 0
}
],
"influencers": ["source.ip", "winlog.event_data.LogonType", "user.name", "host.name"]
"influencers": [
"source.ip",
"winlog.event_data.LogonType",
"user.name",
"user.id",
"host.name",
"host.id",
"event.module"
]
},
"allow_lazy_open": true,
"analysis_limits": {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
{
"description": "Security: Authentication - Looks for an unusually large spike in successful authentication events from a particular source IP address. This can be due to password spraying, user enumeration, or brute force activity. Requires Windows event data, such as from Winlogbeat.",
"groups": ["security", "authentication"],
"groups": [
"security",
"authentication"
],
"analysis_config": {
"bucket_span": "15m",
"detectors": [
Expand All @@ -11,7 +14,15 @@
"detector_index": 0
}
],
"influencers": ["source.ip", "winlog.event_data.LogonType", "user.name", "host.name"]
"influencers": [
"source.ip",
"winlog.event_data.LogonType",
"user.name",
"user.id",
"host.name",
"host.id",
"event.module"
]
},
"allow_lazy_open": true,
"analysis_limits": {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
{
"description": "Security: Authentication - Looks for an unusually large spike in authentication failure events. This can be due to password spraying, user enumeration, or brute force activity and may be a precursor to account takeover or credentialed access.",
"groups": ["security", "authentication"],
"groups": [
"security",
"authentication"
],
"analysis_config": {
"bucket_span": "15m",
"detectors": [
Expand All @@ -10,7 +13,14 @@
"detector_index": 0
}
],
"influencers": ["source.ip", "user.name", "host.name"]
"influencers": [
"source.ip",
"user.name",
"user.id",
"host.name",
"host.id",
"event.module"
]
},
"allow_lazy_open": true,
"analysis_limits": {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
{
"description": "Security: Authentication - Looks for a user with successful login/logon at a time of day that is unusual for the user. This can be due to credentialed access via a compromised account when the user and the threat actor are in different time zones. In addition, unauthorized user activity often takes place during non-business hours.",
"groups": ["security", "authentication"],
"groups": [
"security",
"authentication"
],
"analysis_config": {
"bucket_span": "15m",
"detectors": [
Expand All @@ -11,7 +14,14 @@
"detector_index": 0
}
],
"influencers": ["source.ip", "user.name", "host.name"]
"influencers": [
"source.ip",
"host.name",
"user.name",
"user.id",
"host.id",
"event.module"
]
},
"allow_lazy_open": true,
"analysis_limits": {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
{
"description": "Security: Authentication - Looks for a user logging in from an IP address that is unusual for the user. This can be due to credentialed access via a compromised account when the user and the threat actor are in different locations. An unusual source IP address for a username could also be due to lateral movement when a compromised account is used to pivot between hosts.",
"groups": ["security", "authentication"],
"groups": [
"security",
"authentication"
],
"analysis_config": {
"bucket_span": "15m",
"detectors": [
Expand All @@ -12,7 +15,14 @@
"detector_index": 0
}
],
"influencers": ["source.ip", "user.name", "host.name"]
"influencers": [
"source.ip",
"host.name",
"user.name",
"user.id",
"host.id",
"event.module"
]
},
"allow_lazy_open": true,
"analysis_limits": {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
{
"description": "Security: Authentication - Looks for an unusual user name in the authentication logs. An unusual user name is one way of detecting credentialed access by means of a new or dormant user account. A user account that is normally inactive, because the user has left the organization, which becomes active, may be due to credentialed access using a compromised account password. Threat actors will sometimes also create new users as a means of persisting in a compromised web application.",
"groups": ["security", "authentication"],
"groups": [
"security",
"authentication"
],
"analysis_config": {
"bucket_span": "15m",
"detectors": [
Expand All @@ -11,7 +14,14 @@
"detector_index": 0
}
],
"influencers": ["source.ip", "user.name", "host.name"]
"influencers": [
"source.ip",
"host.name",
"user.name",
"user.id",
"host.id",
"event.module"
]
},
"allow_lazy_open": true,
"analysis_limits": {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,9 +20,20 @@
],
"must_not": {
"terms": {
"process.name": ["elastic-agent.exe", "elastic-agent", "metricbeat.exe", "metricbeat", "filebeat.exe", "filebeat", "packetbeat.exe", "packetbeat", "winlogbeat.exe", "winlogbeat"]
"process.name": [
"elastic-agent.exe",
"elastic-agent",
"metricbeat.exe",
"metricbeat",
"filebeat.exe",
"filebeat",
"packetbeat.exe",
"packetbeat",
"winlogbeat.exe",
"winlogbeat"
]
}
}
}
}
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -25,9 +25,20 @@
],
"must_not": {
"terms": {
"process.name": ["elastic-agent.exe", "elastic-agent", "metricbeat.exe", "metricbeat", "filebeat.exe", "filebeat", "packetbeat.exe", "packetbeat", "winlogbeat.exe", "winlogbeat"]
"process.name": [
"elastic-agent.exe",
"elastic-agent",
"metricbeat.exe",
"metricbeat",
"filebeat.exe",
"filebeat",
"packetbeat.exe",
"packetbeat",
"winlogbeat.exe",
"winlogbeat"
]
}
}
}
}
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -20,9 +20,20 @@
],
"must_not": {
"terms": {
"process.name": ["elastic-agent.exe", "elastic-agent", "metricbeat.exe", "metricbeat", "filebeat.exe", "filebeat", "packetbeat.exe", "packetbeat", "winlogbeat.exe", "winlogbeat"]
"process.name": [
"elastic-agent.exe",
"elastic-agent",
"metricbeat.exe",
"metricbeat",
"filebeat.exe",
"filebeat",
"packetbeat.exe",
"packetbeat",
"winlogbeat.exe",
"winlogbeat"
]
}
}
}
}
}
}
Loading
Loading