Skip to content

Commit 06ccba9

Browse files
Merge branch 'main' into DAC-feature
2 parents 9225324 + f07a9e6 commit 06ccba9

19 files changed

+206
-19
lines changed

rules/integrations/cloud_defend/container_workload_protection.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ integration = ["cloud_defend"]
44
maturity = "production"
55
min_stack_comments = "Initial version of the Container Workload Protection alerts"
66
min_stack_version = "8.8.0"
7-
updated_date = "2023/06/22"
7+
updated_date = "2024/05/13"
88

99
[rule]
1010
author = ["Elastic"]
@@ -22,6 +22,15 @@ name = "Container Workload Protection"
2222
risk_score = 47
2323
rule_id = "4b4e9c99-27ea-4621-95c8-82341bc6e512"
2424
rule_name_override = "message"
25+
setup = """## Setup
26+
27+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
28+
29+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
30+
31+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
32+
33+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2534
severity = "medium"
2635
tags = ["Data Source: Elastic Defend for Containers", "Domain: Container"]
2736
timestamp_override = "event.ingested"

rules/integrations/endpoint/elastic_endpoint_security.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ integration = ["endpoint"]
44
maturity = "production"
55
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
66
min_stack_version = "8.3.0"
7-
updated_date = "2023/06/22"
7+
updated_date = "2024/05/13"
88
promotion = true
99

1010
[rule]
@@ -23,6 +23,15 @@ name = "Endpoint Security"
2323
risk_score = 47
2424
rule_id = "9a1a2dae-0b5f-4c3d-8305-a268d404c306"
2525
rule_name_override = "message"
26+
setup = """## Setup
27+
28+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
29+
30+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
31+
32+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
33+
34+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2635
severity = "medium"
2736
tags = ["Data Source: Elastic Defend"]
2837
timestamp_override = "event.ingested"

rules/promotions/credential_access_endgame_cred_dumping_detected.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/02/18"
33
maturity = "production"
44
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
55
min_stack_version = "8.3.0"
6-
updated_date = "2024/01/17"
6+
updated_date = "2024/05/13"
77
promotion = true
88

99
[rule]
@@ -21,6 +21,15 @@ max_signals = 10000
2121
name = "Credential Dumping - Detected - Elastic Endgame"
2222
risk_score = 73
2323
rule_id = "571afc56-5ed9-465d-a2a9-045f099f6e7e"
24+
setup = """## Setup
25+
26+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
27+
28+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
29+
30+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
31+
32+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2433
severity = "high"
2534
tags = ["Data Source: Elastic Endgame", "Use Case: Threat Detection", "Tactic: Credential Access"]
2635
type = "query"

rules/promotions/credential_access_endgame_cred_dumping_prevented.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/02/18"
33
maturity = "production"
44
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
55
min_stack_version = "8.3.0"
6-
updated_date = "2024/01/17"
6+
updated_date = "2024/05/13"
77
promotion = true
88

99
[rule]
@@ -21,6 +21,15 @@ max_signals = 10000
2121
name = "Credential Dumping - Prevented - Elastic Endgame"
2222
risk_score = 47
2323
rule_id = "db8c33a8-03cd-4988-9e2c-d0a4863adb13"
24+
setup = """## Setup
25+
26+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
27+
28+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
29+
30+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
31+
32+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2433
severity = "medium"
2534
tags = ["Data Source: Elastic Endgame", "Use Case: Threat Detection", "Tactic: Credential Access"]
2635
type = "query"

rules/promotions/endgame_adversary_behavior_detected.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/02/18"
33
maturity = "production"
44
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
55
min_stack_version = "8.3.0"
6-
updated_date = "2024/01/17"
6+
updated_date = "2024/05/13"
77
promotion = true
88

99
[rule]
@@ -21,6 +21,15 @@ max_signals = 10000
2121
name = "Adversary Behavior - Detected - Elastic Endgame"
2222
risk_score = 47
2323
rule_id = "77a3c3df-8ec4-4da4-b758-878f551dee69"
24+
setup = """## Setup
25+
26+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
27+
28+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
29+
30+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
31+
32+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2433
severity = "medium"
2534
tags = ["Data Source: Elastic Endgame"]
2635
type = "query"

rules/promotions/endgame_malware_detected.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/02/18"
33
maturity = "production"
44
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
55
min_stack_version = "8.3.0"
6-
updated_date = "2024/01/17"
6+
updated_date = "2024/05/13"
77
promotion = true
88

99
[rule]
@@ -21,6 +21,15 @@ max_signals = 10000
2121
name = "Malware - Detected - Elastic Endgame"
2222
risk_score = 99
2323
rule_id = "0a97b20f-4144-49ea-be32-b540ecc445de"
24+
setup = """## Setup
25+
26+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
27+
28+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
29+
30+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
31+
32+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2433
severity = "critical"
2534
tags = ["Data Source: Elastic Endgame"]
2635
type = "query"

rules/promotions/endgame_malware_prevented.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/02/18"
33
maturity = "production"
44
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
55
min_stack_version = "8.3.0"
6-
updated_date = "2024/01/17"
6+
updated_date = "2024/05/13"
77
promotion = true
88

99
[rule]
@@ -21,6 +21,15 @@ max_signals = 10000
2121
name = "Malware - Prevented - Elastic Endgame"
2222
risk_score = 73
2323
rule_id = "3b382770-efbb-44f4-beed-f5e0a051b895"
24+
setup = """## Setup
25+
26+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
27+
28+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
29+
30+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
31+
32+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2433
severity = "high"
2534
tags = ["Data Source: Elastic Endgame"]
2635
type = "query"

rules/promotions/endgame_ransomware_detected.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/02/18"
33
maturity = "production"
44
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
55
min_stack_version = "8.3.0"
6-
updated_date = "2024/01/17"
6+
updated_date = "2024/05/13"
77
promotion = true
88

99
[rule]
@@ -21,6 +21,15 @@ max_signals = 10000
2121
name = "Ransomware - Detected - Elastic Endgame"
2222
risk_score = 99
2323
rule_id = "8cb4f625-7743-4dfb-ae1b-ad92be9df7bd"
24+
setup = """## Setup
25+
26+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
27+
28+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
29+
30+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
31+
32+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2433
severity = "critical"
2534
tags = ["Data Source: Elastic Endgame"]
2635
type = "query"

rules/promotions/endgame_ransomware_prevented.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/02/18"
33
maturity = "production"
44
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
55
min_stack_version = "8.3.0"
6-
updated_date = "2024/01/17"
6+
updated_date = "2024/05/13"
77
promotion = true
88

99
[rule]
@@ -21,6 +21,15 @@ max_signals = 10000
2121
name = "Ransomware - Prevented - Elastic Endgame"
2222
risk_score = 73
2323
rule_id = "e3c5d5cb-41d5-4206-805c-f30561eae3ac"
24+
setup = """## Setup
25+
26+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
27+
28+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
29+
30+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
31+
32+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2433
severity = "high"
2534
tags = ["Data Source: Elastic Endgame"]
2635
type = "query"

rules/promotions/execution_endgame_exploit_detected.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/02/18"
33
maturity = "production"
44
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
55
min_stack_version = "8.3.0"
6-
updated_date = "2024/01/17"
6+
updated_date = "2024/05/13"
77
promotion = true
88

99
[rule]
@@ -21,6 +21,15 @@ max_signals = 10000
2121
name = "Exploit - Detected - Elastic Endgame"
2222
risk_score = 73
2323
rule_id = "2003cdc8-8d83-4aa5-b132-1f9a8eb48514"
24+
setup = """## Setup
25+
26+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
27+
28+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
29+
30+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
31+
32+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2433
severity = "high"
2534
tags = ["Data Source: Elastic Endgame", "Use Case: Threat Detection", "Tactic: Execution", "Tactic: Privilege Escalation"]
2635
type = "query"

rules/promotions/execution_endgame_exploit_prevented.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/02/18"
33
maturity = "production"
44
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
55
min_stack_version = "8.3.0"
6-
updated_date = "2024/01/17"
6+
updated_date = "2024/05/13"
77
promotion = true
88

99
[rule]
@@ -21,6 +21,15 @@ max_signals = 10000
2121
name = "Exploit - Prevented - Elastic Endgame"
2222
risk_score = 47
2323
rule_id = "2863ffeb-bf77-44dd-b7a5-93ef94b72036"
24+
setup = """## Setup
25+
26+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
27+
28+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
29+
30+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
31+
32+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2433
severity = "medium"
2534
tags = ["Data Source: Elastic Endgame", "Use Case: Threat Detection", "Tactic: Execution", "Tactic: Privilege Escalation"]
2635
type = "query"

rules/promotions/external_alerts.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/07/08"
33
maturity = "production"
44
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
55
min_stack_version = "8.3.0"
6-
updated_date = "2024/01/17"
6+
updated_date = "2024/05/13"
77
promotion = true
88

99
[rule]
@@ -20,6 +20,15 @@ name = "External Alerts"
2020
risk_score = 47
2121
rule_id = "eb079c62-4481-4d6e-9643-3ca499df7aaa"
2222
rule_name_override = "message"
23+
setup = """## Setup
24+
25+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
26+
27+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
28+
29+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
30+
31+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2332
severity = "medium"
2433
tags = ["OS: Windows", "Data Source: APM", "OS: macOS", "OS: Linux"]
2534
timestamp_override = "event.ingested"

rules/promotions/privilege_escalation_endgame_cred_manipulation_detected.toml

+10-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ creation_date = "2020/02/18"
33
maturity = "production"
44
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
55
min_stack_version = "8.3.0"
6-
updated_date = "2024/01/17"
6+
updated_date = "2024/05/13"
77
promotion = true
88

99
[rule]
@@ -21,6 +21,15 @@ max_signals = 10000
2121
name = "Credential Manipulation - Detected - Elastic Endgame"
2222
risk_score = 73
2323
rule_id = "c0be5f31-e180-48ed-aa08-96b36899d48f"
24+
setup = """## Setup
25+
26+
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
27+
28+
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
29+
30+
To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
31+
32+
**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
2433
severity = "high"
2534
tags = ["Data Source: Elastic Endgame", "Use Case: Threat Detection", "Tactic: Privilege Escalation"]
2635
type = "query"

0 commit comments

Comments
 (0)