IMPORTANT: This documentation is no longer updated. Refer to Elastic's version policy and the latest documentation.

Elastic Security External Alerts

edit

Generates a detection alert for each Elastic Security alert written to the configured indices. Enabling this rule allows you to immediately begin investigating Elastic Security alerts in the app.

Rule type: query

Rule indices:

  • logs-elastic_security.alert-*

Severity: medium

Risk score: 47

Runs every: 1m

Searches indices from: now-2m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 1000

References:

Tags:

  • Data Source: Elastic Security
  • Use Case: Threat Detection
  • Resources: Investigation Guide
  • Promotion: External Alerts

Version: 1

Rule authors:

  • Elastic

Rule license: Elastic License v2

Investigation guide

edit

Triage and analysis

Investigating Elastic Security External Alerts

The Elastic Security integration facilitates transferring security alert data from another Elasticsearch instance to your own, enabling threats to be investigated in a centralized manner.

Possible investigation steps

  • Correlate the alert with recent activity on the affected endpoint to identify any unusual or suspicious behavior patterns.
  • Check for any additional alerts or logs related to the same endpoint or user to determine if this is part of a broader attack or isolated incident.
  • Investigate the source and destination IP addresses involved in the alert to assess if they are known to be malicious or associated with previous threats.
  • Analyze any files or processes flagged in the alert to determine if they are legitimate or potentially malicious, using threat intelligence sources if necessary.
  • Consult the Elastic Security investigation guide and resources tagged in the alert for specific guidance on handling similar threats.

False positive analysis

  • Alerts triggered by routine software updates or patches can be false positives. Review the context of the alert to determine if it aligns with scheduled maintenance activities.
  • Legitimate administrative tools or scripts may trigger alerts. Identify and whitelist these tools if they are verified as non-threatening.
  • Frequent alerts from known safe applications or processes can be excluded by creating exceptions for these specific behaviors in the Elastic Security configuration.
  • Network scanning or monitoring tools used by IT teams might be flagged. Ensure these tools are documented and excluded from triggering alerts if they are part of regular operations.
  • User behavior that is consistent with their role but triggers alerts should be reviewed. If deemed non-malicious, adjust the rule to exclude these specific user actions.

Response and remediation

  • Isolate the affected endpoint immediately to prevent lateral movement and further compromise within the network.
  • Analyze the specific alert details to identify the nature of the threat and any associated indicators of compromise (IOCs).
  • Remove or quarantine any malicious files or processes identified by the Elastic Security alert to neutralize the threat.
  • Apply relevant security patches or updates to address any exploited vulnerabilities on the affected endpoint.
  • Conduct a thorough scan of the network to identify any additional endpoints that may have been compromised or are exhibiting similar behavior.
  • Document the incident and escalate to the appropriate security team or management if the threat is part of a larger attack campaign or if additional resources are needed for remediation.
  • Review and update endpoint protection policies and configurations to enhance detection and prevention capabilities against similar threats in the future.

Setup

edit

Setup

Elastic Security Alert Integration

This rule is designed to capture alert events generated by the Elastic Security integration and promote them as Elastic detection alerts.

To capture Elastic Security alerts, install and configure the Elastic Security integration to ingest alert events into the logs-elastic_security.alert-* index pattern.

If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same Elastic Security events. Consider adding a rule exception for the External Alert rule to exclude data_stream.dataset:elastic_security.alert to avoid receiving duplicate alerts.

Additional notes

For information on troubleshooting the maximum alerts warning please refer to this guide.

Rule query

edit
event.kind: alert and data_stream.dataset: elastic_security.alert