diff --git a/x-pack/plugins/monitoring/public/components/elasticsearch/node/advanced.js b/x-pack/plugins/monitoring/public/components/elasticsearch/node/advanced.js
index b2a17515bbb96..67df745e619d4 100644
--- a/x-pack/plugins/monitoring/public/components/elasticsearch/node/advanced.js
+++ b/x-pack/plugins/monitoring/public/components/elasticsearch/node/advanced.js
@@ -18,8 +18,9 @@ import {
import { NodeDetailStatus } from '../node_detail_status';
import { MonitoringTimeseriesContainer } from '../../chart';
import { FormattedMessage } from '@kbn/i18n/react';
+import { AlertsCallout } from '../../../alerts/callout';
-export const AdvancedNode = ({ nodeSummary, metrics, alerts, ...props }) => {
+export const AdvancedNode = ({ nodeSummary, metrics, alerts, nodeId, ...props }) => {
const metricsToShow = [
metrics.node_gc,
metrics.node_gc_time,
@@ -50,9 +51,25 @@ export const AdvancedNode = ({ nodeSummary, metrics, alerts, ...props }) => {
-
+
+ state.nodeId === nodeId || state.stackProductUuid === nodeId
+ }
+ />
+
state.nodeId === nodeId || state.stackProductUuid === nodeId}
+ nextStepsFilter={(nextStep) => {
+ if (nextStep.text.includes('Elasticsearch nodes')) {
+ return false;
+ }
+ return true;
+ }}
+ />
{metricsToShow.map((metric, index) => (
diff --git a/x-pack/plugins/monitoring/public/views/elasticsearch/node/advanced/index.js b/x-pack/plugins/monitoring/public/views/elasticsearch/node/advanced/index.js
index 03c0714864f92..8021ae7e5f63c 100644
--- a/x-pack/plugins/monitoring/public/views/elasticsearch/node/advanced/index.js
+++ b/x-pack/plugins/monitoring/public/views/elasticsearch/node/advanced/index.js
@@ -117,6 +117,7 @@ uiRoutes.when('/elasticsearch/nodes/:node/advanced', {
{
- let cpuUsage = 0;
if (this.config.ui.container.elasticsearch.enabled) {
- cpuUsage =
+ stat.cpuUsage =
(stat.containerUsage / (stat.containerPeriods * stat.containerQuota * 1000)) * 100;
- } else {
- cpuUsage = stat.cpuUsage;
}
return {
instanceKey: `${stat.clusterUuid}:${stat.nodeId}`,
clusterUuid: stat.clusterUuid,
- shouldFire: cpuUsage > params.threshold,
+ shouldFire: stat.cpuUsage > params.threshold,
severity: AlertSeverity.Danger,
meta: stat,
ccs: stat.ccs,
diff --git a/x-pack/plugins/monitoring/server/kibana_monitoring/collectors/get_settings_collector.ts b/x-pack/plugins/monitoring/server/kibana_monitoring/collectors/get_settings_collector.ts
index a3ff4b952ce97..0dd5ce291f972 100644
--- a/x-pack/plugins/monitoring/server/kibana_monitoring/collectors/get_settings_collector.ts
+++ b/x-pack/plugins/monitoring/server/kibana_monitoring/collectors/get_settings_collector.ts
@@ -4,7 +4,7 @@
* you may not use this file except in compliance with the Elastic License.
*/
-import { Collector } from '../../../../../../src/plugins/usage_collection/server';
+import { Collector, UsageCollectionSetup } from 'src/plugins/usage_collection/server';
import { KIBANA_SETTINGS_TYPE } from '../../../common/constants';
import { MonitoringConfig } from '../../config';
@@ -48,10 +48,18 @@ export interface KibanaSettingsCollector extends Collector true,
+ schema: {
+ xpack: {
+ default_admin_email: { type: 'text' },
+ },
+ },
async fetch(this: KibanaSettingsCollector) {
let kibanaSettingsData;
const defaultAdminEmail = await checkForEmailValue(config);
diff --git a/x-pack/plugins/monitoring/server/lib/alerts/fetch_cpu_usage_node_stats.test.ts b/x-pack/plugins/monitoring/server/lib/alerts/fetch_cpu_usage_node_stats.test.ts
index 12926a30efa1b..88035c1121848 100644
--- a/x-pack/plugins/monitoring/server/lib/alerts/fetch_cpu_usage_node_stats.test.ts
+++ b/x-pack/plugins/monitoring/server/lib/alerts/fetch_cpu_usage_node_stats.test.ts
@@ -97,11 +97,18 @@ describe('fetchCpuUsageNodeStats', () => {
},
],
},
- average_usage: {
- value: 10,
- },
- average_periods: {
- value: 5,
+ histo: {
+ buckets: [
+ null,
+ {
+ usage_deriv: {
+ normalized_value: 10,
+ },
+ periods_deriv: {
+ normalized_value: 5,
+ },
+ },
+ ],
},
average_quota: {
value: 50,
@@ -185,14 +192,14 @@ describe('fetchCpuUsageNodeStats', () => {
});
await fetchCpuUsageNodeStats(callCluster, clusters, index, startMs, endMs, size);
expect(params).toStrictEqual({
- index,
+ index: '.monitoring-es-*',
filterPath: ['aggregations'],
body: {
size: 0,
query: {
bool: {
filter: [
- { terms: { cluster_uuid: clusters.map((cluster) => cluster.clusterUuid) } },
+ { terms: { cluster_uuid: ['abc123'] } },
{ term: { type: 'node_stats' } },
{ range: { timestamp: { format: 'epoch_millis', gte: 0, lte: 0 } } },
],
@@ -200,23 +207,38 @@ describe('fetchCpuUsageNodeStats', () => {
},
aggs: {
clusters: {
- terms: {
- field: 'cluster_uuid',
- size,
- include: clusters.map((cluster) => cluster.clusterUuid),
- },
+ terms: { field: 'cluster_uuid', size: 10, include: ['abc123'] },
aggs: {
nodes: {
- terms: { field: 'node_stats.node_id', size },
+ terms: { field: 'node_stats.node_id', size: 10 },
aggs: {
index: { terms: { field: '_index', size: 1 } },
average_cpu: { avg: { field: 'node_stats.process.cpu.percent' } },
- average_usage: { avg: { field: 'node_stats.os.cgroup.cpuacct.usage_nanos' } },
- average_periods: {
- avg: { field: 'node_stats.os.cgroup.cpu.stat.number_of_elapsed_periods' },
- },
average_quota: { avg: { field: 'node_stats.os.cgroup.cpu.cfs_quota_micros' } },
name: { terms: { field: 'source_node.name', size: 1 } },
+ histo: {
+ date_histogram: { field: 'timestamp', fixed_interval: '0m' },
+ aggs: {
+ average_periods: {
+ max: { field: 'node_stats.os.cgroup.cpu.stat.number_of_elapsed_periods' },
+ },
+ average_usage: { max: { field: 'node_stats.os.cgroup.cpuacct.usage_nanos' } },
+ usage_deriv: {
+ derivative: {
+ buckets_path: 'average_usage',
+ gap_policy: 'skip',
+ unit: '1s',
+ },
+ },
+ periods_deriv: {
+ derivative: {
+ buckets_path: 'average_periods',
+ gap_policy: 'skip',
+ unit: '1s',
+ },
+ },
+ },
+ },
},
},
},
diff --git a/x-pack/plugins/monitoring/server/lib/alerts/fetch_cpu_usage_node_stats.ts b/x-pack/plugins/monitoring/server/lib/alerts/fetch_cpu_usage_node_stats.ts
index 4fdb03b61950e..ecd324c083a8c 100644
--- a/x-pack/plugins/monitoring/server/lib/alerts/fetch_cpu_usage_node_stats.ts
+++ b/x-pack/plugins/monitoring/server/lib/alerts/fetch_cpu_usage_node_stats.ts
@@ -4,6 +4,8 @@
* you may not use this file except in compliance with the Elastic License.
*/
import { get } from 'lodash';
+import moment from 'moment';
+import { NORMALIZED_DERIVATIVE_UNIT } from '../../../common/constants';
import { AlertCluster, AlertCpuUsageNodeStats } from '../../alerts/types';
interface NodeBucketESResponse {
@@ -26,6 +28,9 @@ export async function fetchCpuUsageNodeStats(
endMs: number,
size: number
): Promise {
+ // Using pure MS didn't seem to work well with the date_histogram interval
+ // but minutes does
+ const intervalInMinutes = moment.duration(endMs - startMs).asMinutes();
const filterPath = ['aggregations'];
const params = {
index,
@@ -82,16 +87,6 @@ export async function fetchCpuUsageNodeStats(
field: 'node_stats.process.cpu.percent',
},
},
- average_usage: {
- avg: {
- field: 'node_stats.os.cgroup.cpuacct.usage_nanos',
- },
- },
- average_periods: {
- avg: {
- field: 'node_stats.os.cgroup.cpu.stat.number_of_elapsed_periods',
- },
- },
average_quota: {
avg: {
field: 'node_stats.os.cgroup.cpu.cfs_quota_micros',
@@ -103,6 +98,38 @@ export async function fetchCpuUsageNodeStats(
size: 1,
},
},
+ histo: {
+ date_histogram: {
+ field: 'timestamp',
+ fixed_interval: `${intervalInMinutes}m`,
+ },
+ aggs: {
+ average_periods: {
+ max: {
+ field: 'node_stats.os.cgroup.cpu.stat.number_of_elapsed_periods',
+ },
+ },
+ average_usage: {
+ max: {
+ field: 'node_stats.os.cgroup.cpuacct.usage_nanos',
+ },
+ },
+ usage_deriv: {
+ derivative: {
+ buckets_path: 'average_usage',
+ gap_policy: 'skip',
+ unit: NORMALIZED_DERIVATIVE_UNIT,
+ },
+ },
+ periods_deriv: {
+ derivative: {
+ buckets_path: 'average_periods',
+ gap_policy: 'skip',
+ unit: NORMALIZED_DERIVATIVE_UNIT,
+ },
+ },
+ },
+ },
},
},
},
@@ -120,17 +147,19 @@ export async function fetchCpuUsageNodeStats(
) as ClusterBucketESResponse[];
for (const clusterBucket of clusterBuckets) {
for (const node of clusterBucket.nodes.buckets) {
+ const lastBucket = get(node, 'histo.buckets[1]', {});
const indexName = get(node, 'index.buckets[0].key', '');
- stats.push({
+ const stat = {
clusterUuid: clusterBucket.key,
nodeId: node.key,
nodeName: get(node, 'name.buckets[0].key'),
cpuUsage: get(node, 'average_cpu.value'),
- containerUsage: get(node, 'average_usage.value'),
- containerPeriods: get(node, 'average_periods.value'),
+ containerUsage: get(lastBucket, 'usage_deriv.normalized_value'),
+ containerPeriods: get(lastBucket, 'periods_deriv.normalized_value'),
containerQuota: get(node, 'average_quota.value'),
ccs: indexName.includes(':') ? indexName.split(':')[0] : null,
- });
+ };
+ stats.push(stat);
}
}
return stats;
diff --git a/x-pack/plugins/reporting/public/panel_actions/get_csv_panel_action.tsx b/x-pack/plugins/reporting/public/panel_actions/get_csv_panel_action.tsx
index 7782576bb5a00..1e3f7e34bebdb 100644
--- a/x-pack/plugins/reporting/public/panel_actions/get_csv_panel_action.tsx
+++ b/x-pack/plugins/reporting/public/panel_actions/get_csv_panel_action.tsx
@@ -108,7 +108,7 @@ export class GetCsvReportPanelAction implements ActionDefinition
const filename = embeddable.getSavedSearch().title;
const timezone = kibanaTimezone === 'Browser' ? moment.tz.guess() : kibanaTimezone;
const fromTime = dateMath.parse(from);
- const toTime = dateMath.parse(to);
+ const toTime = dateMath.parse(to, { roundUp: true });
if (!fromTime || !toTime) {
return this.onGenerationFail(
diff --git a/x-pack/plugins/security/public/management/role_mappings/role_mappings_grid/role_mappings_grid_page.tsx b/x-pack/plugins/security/public/management/role_mappings/role_mappings_grid/role_mappings_grid_page.tsx
index 757e59a4e0583..cf0cb21598c62 100644
--- a/x-pack/plugins/security/public/management/role_mappings/role_mappings_grid/role_mappings_grid_page.tsx
+++ b/x-pack/plugins/security/public/management/role_mappings/role_mappings_grid/role_mappings_grid_page.tsx
@@ -330,14 +330,16 @@ export class RoleMappingsGridPage extends Component {
this.state.roles?.find((r) => r.name === rolename) ?? rolename;
return (
-
+
+
+
);
});
- return {roleLinks}
;
+ return (
+
+ {roleLinks}
+
+ );
},
},
{
diff --git a/x-pack/plugins/security/public/management/roles/roles_grid/roles_grid_page.test.tsx b/x-pack/plugins/security/public/management/roles/roles_grid/roles_grid_page.test.tsx
index 005eebbfbf3bb..eb6d25c9ef5ab 100644
--- a/x-pack/plugins/security/public/management/roles/roles_grid/roles_grid_page.test.tsx
+++ b/x-pack/plugins/security/public/management/roles/roles_grid/roles_grid_page.test.tsx
@@ -66,6 +66,11 @@ describe('', () => {
kibana: [{ base: [], spaces: [], feature: {} }],
transient_metadata: { enabled: false },
},
+ {
+ name: 'special%chars%role',
+ elasticsearch: { cluster: [], indices: [], run_as: [] },
+ kibana: [{ base: [], spaces: [], feature: {} }],
+ },
]);
});
@@ -121,7 +126,7 @@ describe('', () => {
expect(wrapper.find(PermissionDenied)).toMatchSnapshot();
});
- it('renders role actions as appropriate', async () => {
+ it('renders role actions as appropriate, escaping when necessary', async () => {
const wrapper = mountWithIntl(
', () => {
expect(wrapper.find(PermissionDenied)).toHaveLength(0);
- const editButton = wrapper.find('EuiButtonIcon[data-test-subj="edit-role-action-test-role-1"]');
+ let editButton = wrapper.find('EuiButtonIcon[data-test-subj="edit-role-action-test-role-1"]');
expect(editButton).toHaveLength(1);
expect(editButton.prop('href')).toBe('/edit/test-role-1');
- const cloneButton = wrapper.find(
- 'EuiButtonIcon[data-test-subj="clone-role-action-test-role-1"]'
+ editButton = wrapper.find(
+ 'EuiButtonIcon[data-test-subj="edit-role-action-special%chars%role"]'
);
+ expect(editButton).toHaveLength(1);
+ expect(editButton.prop('href')).toBe('/edit/special%25chars%25role');
+
+ let cloneButton = wrapper.find('EuiButtonIcon[data-test-subj="clone-role-action-test-role-1"]');
expect(cloneButton).toHaveLength(1);
expect(cloneButton.prop('href')).toBe('/clone/test-role-1');
+ cloneButton = wrapper.find(
+ 'EuiButtonIcon[data-test-subj="clone-role-action-special%chars%role"]'
+ );
+ expect(cloneButton).toHaveLength(1);
+ expect(cloneButton.prop('href')).toBe('/clone/special%25chars%25role');
+
expect(
wrapper.find('EuiButtonIcon[data-test-subj="edit-role-action-disabled-role"]')
).toHaveLength(1);
@@ -182,6 +197,11 @@ describe('', () => {
kibana: [{ base: [], spaces: [], feature: {} }],
metadata: { _reserved: true },
},
+ {
+ name: 'special%chars%role',
+ elasticsearch: { cluster: [], indices: [], run_as: [] },
+ kibana: [{ base: [], spaces: [], feature: {} }],
+ },
{
name: 'test-role-1',
elasticsearch: { cluster: [], indices: [], run_as: [] },
@@ -198,6 +218,11 @@ describe('', () => {
kibana: [{ base: [], spaces: [], feature: {} }],
transient_metadata: { enabled: false },
},
+ {
+ name: 'special%chars%role',
+ elasticsearch: { cluster: [], indices: [], run_as: [] },
+ kibana: [{ base: [], spaces: [], feature: {} }],
+ },
{
name: 'test-role-1',
elasticsearch: { cluster: [], indices: [], run_as: [] },
diff --git a/x-pack/plugins/security/public/management/roles/roles_grid/roles_grid_page.tsx b/x-pack/plugins/security/public/management/roles/roles_grid/roles_grid_page.tsx
index 4c8f45d7eea43..1e733dfa0767e 100644
--- a/x-pack/plugins/security/public/management/roles/roles_grid/roles_grid_page.tsx
+++ b/x-pack/plugins/security/public/management/roles/roles_grid/roles_grid_page.tsx
@@ -58,7 +58,7 @@ interface State {
}
const getRoleManagementHref = (action: 'edit' | 'clone', roleName?: string) => {
- return `/${action}${roleName ? `/${roleName}` : ''}`;
+ return `/${action}${roleName ? `/${encodeURIComponent(roleName)}` : ''}`;
};
export class RolesGridPage extends Component {
diff --git a/x-pack/plugins/security/public/management/users/users_grid/users_grid_page.test.tsx b/x-pack/plugins/security/public/management/users/users_grid/users_grid_page.test.tsx
index df8fe8cee7699..0cc3146172f70 100644
--- a/x-pack/plugins/security/public/management/users/users_grid/users_grid_page.test.tsx
+++ b/x-pack/plugins/security/public/management/users/users_grid/users_grid_page.test.tsx
@@ -71,6 +71,38 @@ describe('UsersGridPage', () => {
expect(findTestSubject(wrapper, 'userDisabled')).toHaveLength(0);
});
+ it('generates valid links when usernames contain special characters', async () => {
+ const apiClientMock = userAPIClientMock.create();
+ apiClientMock.getUsers.mockImplementation(() => {
+ return Promise.resolve([
+ {
+ username: 'username with some fun characters!@#$%^&*()',
+ email: 'foo@bar.net',
+ full_name: 'foo bar',
+ roles: ['kibana_user'],
+ enabled: true,
+ },
+ ]);
+ });
+
+ const wrapper = mountWithIntl(
+
+ );
+
+ await waitForRender(wrapper);
+
+ const link = findTestSubject(wrapper, 'userRowUserName');
+ expect(link.props().href).toMatchInlineSnapshot(
+ `"/edit/username%20with%20some%20fun%20characters!%40%23%24%25%5E%26*()"`
+ );
+ });
+
it('renders a forbidden message if user is not authorized', async () => {
const apiClient = userAPIClientMock.create();
apiClient.getUsers.mockRejectedValue({ body: { statusCode: 403 } });
diff --git a/x-pack/plugins/security/public/management/users/users_grid/users_grid_page.tsx b/x-pack/plugins/security/public/management/users/users_grid/users_grid_page.tsx
index 998739a9a83af..debe1c5e82d3b 100644
--- a/x-pack/plugins/security/public/management/users/users_grid/users_grid_page.tsx
+++ b/x-pack/plugins/security/public/management/users/users_grid/users_grid_page.tsx
@@ -112,7 +112,7 @@ export class UsersGridPage extends Component {
render: (username: string) => (
{username}
@@ -151,14 +151,16 @@ export class UsersGridPage extends Component {
const roleLinks = rolenames.map((rolename, index) => {
const roleDefinition = roles?.find((role) => role.name === rolename) ?? rolename;
return (
-
+
+
+
);
});
- return {roleLinks}
;
+ return (
+
+ {roleLinks}
+
+ );
},
},
{
diff --git a/x-pack/plugins/security_solution/public/common/containers/source/index.tsx b/x-pack/plugins/security_solution/public/common/containers/source/index.tsx
index c36e2de61fcbf..2cc1c75015e07 100644
--- a/x-pack/plugins/security_solution/public/common/containers/source/index.tsx
+++ b/x-pack/plugins/security_solution/public/common/containers/source/index.tsx
@@ -194,15 +194,14 @@ export const useIndexFields = (sourcererScopeName: SourcererScopeName) => {
const { data, notifications } = useKibana().services;
const abortCtrl = useRef(new AbortController());
const dispatch = useDispatch();
- const previousIndexesName = useRef([]);
-
const indexNamesSelectedSelector = useMemo(
() => sourcererSelectors.getIndexNamesSelectedSelector(),
[]
);
- const indexNames = useShallowEqualSelector((state) =>
- indexNamesSelectedSelector(state, sourcererScopeName)
- );
+ const { indexNames, previousIndexNames } = useShallowEqualSelector<{
+ indexNames: string[];
+ previousIndexNames: string;
+ }>((state) => indexNamesSelectedSelector(state, sourcererScopeName));
const setLoading = useCallback(
(loading: boolean) => {
@@ -230,7 +229,6 @@ export const useIndexFields = (sourcererScopeName: SourcererScopeName) => {
if (!response.isPartial && !response.isRunning) {
if (!didCancel) {
const stringifyIndices = response.indicesExist.sort().join();
- previousIndexesName.current = response.indicesExist;
dispatch(
sourcererActions.setSource({
id: sourcererScopeName,
@@ -279,8 +277,8 @@ export const useIndexFields = (sourcererScopeName: SourcererScopeName) => {
);
useEffect(() => {
- if (!isEmpty(indexNames) && !isEqual(previousIndexesName.current, indexNames)) {
+ if (!isEmpty(indexNames) && previousIndexNames !== indexNames.sort().join()) {
indexFieldsSearch(indexNames);
}
- }, [indexNames, indexFieldsSearch, previousIndexesName]);
+ }, [indexNames, indexFieldsSearch, previousIndexNames]);
};
diff --git a/x-pack/plugins/security_solution/public/common/containers/sourcerer/index.test.tsx b/x-pack/plugins/security_solution/public/common/containers/sourcerer/index.test.tsx
index accfb38bc3dc1..22cb4b91fd839 100644
--- a/x-pack/plugins/security_solution/public/common/containers/sourcerer/index.test.tsx
+++ b/x-pack/plugins/security_solution/public/common/containers/sourcerer/index.test.tsx
@@ -86,7 +86,29 @@ jest.mock('../../utils/apollo_context', () => ({
}));
describe('Sourcerer Hooks', () => {
- const state: State = mockGlobalState;
+ const state: State = {
+ ...mockGlobalState,
+ sourcerer: {
+ ...mockGlobalState.sourcerer,
+ sourcererScopes: {
+ ...mockGlobalState.sourcerer.sourcererScopes,
+ [SourcererScopeName.default]: {
+ ...mockGlobalState.sourcerer.sourcererScopes[SourcererScopeName.default],
+ indexPattern: {
+ fields: [],
+ title: '',
+ },
+ },
+ [SourcererScopeName.timeline]: {
+ ...mockGlobalState.sourcerer.sourcererScopes[SourcererScopeName.timeline],
+ indexPattern: {
+ fields: [],
+ title: '',
+ },
+ },
+ },
+ },
+ };
const { storage } = createSecuritySolutionStorageMock();
let store = createStore(
state,
diff --git a/x-pack/plugins/security_solution/public/common/containers/sourcerer/index.tsx b/x-pack/plugins/security_solution/public/common/containers/sourcerer/index.tsx
index b02a09625ccf3..d9f2abeb3832e 100644
--- a/x-pack/plugins/security_solution/public/common/containers/sourcerer/index.tsx
+++ b/x-pack/plugins/security_solution/public/common/containers/sourcerer/index.tsx
@@ -16,6 +16,9 @@ import { ManageScope, SourcererScopeName } from '../../store/sourcerer/model';
import { useIndexFields } from '../source';
import { State } from '../../store';
import { useUserInfo } from '../../../detections/components/user_info';
+import { timelineSelectors } from '../../../timelines/store/timeline';
+import { TimelineId } from '../../../../common/types/timeline';
+import { TimelineModel } from '../../../timelines/store/timeline/model';
export const useInitSourcerer = (
scopeId: SourcererScopeName.default | SourcererScopeName.detections = SourcererScopeName.default
@@ -29,6 +32,12 @@ export const useInitSourcerer = (
);
const ConfigIndexPatterns = useSelector(getConfigIndexPatternsSelector, isEqual);
+ const getTimelineSelector = useMemo(() => timelineSelectors.getTimelineByIdSelector(), []);
+ const activeTimeline = useSelector(
+ (state) => getTimelineSelector(state, TimelineId.active),
+ isEqual
+ );
+
useIndexFields(scopeId);
useIndexFields(SourcererScopeName.timeline);
@@ -40,7 +49,11 @@ export const useInitSourcerer = (
// Related to timeline
useEffect(() => {
- if (!loadingSignalIndex && signalIndexName != null) {
+ if (
+ !loadingSignalIndex &&
+ signalIndexName != null &&
+ (activeTimeline == null || (activeTimeline != null && activeTimeline.savedObjectId == null))
+ ) {
dispatch(
sourcererActions.setSelectedIndexPatterns({
id: SourcererScopeName.timeline,
@@ -48,7 +61,7 @@ export const useInitSourcerer = (
})
);
}
- }, [ConfigIndexPatterns, dispatch, loadingSignalIndex, signalIndexName]);
+ }, [activeTimeline, ConfigIndexPatterns, dispatch, loadingSignalIndex, signalIndexName]);
// Related to the detection page
useEffect(() => {
diff --git a/x-pack/plugins/security_solution/public/common/store/sourcerer/actions.ts b/x-pack/plugins/security_solution/public/common/store/sourcerer/actions.ts
index 0b40586798f09..8e92d7559f1d6 100644
--- a/x-pack/plugins/security_solution/public/common/store/sourcerer/actions.ts
+++ b/x-pack/plugins/security_solution/public/common/store/sourcerer/actions.ts
@@ -34,3 +34,9 @@ export const setSelectedIndexPatterns = actionCreator<{
selectedPatterns: string[];
eventType?: TimelineEventsType;
}>('SET_SELECTED_INDEX_PATTERNS');
+
+export const initTimelineIndexPatterns = actionCreator<{
+ id: SourcererScopeName;
+ selectedPatterns: string[];
+ eventType?: TimelineEventsType;
+}>('INIT_TIMELINE_INDEX_PATTERNS');
diff --git a/x-pack/plugins/security_solution/public/common/store/sourcerer/helpers.ts b/x-pack/plugins/security_solution/public/common/store/sourcerer/helpers.ts
index 3ae9740cfd51d..42a4fe73c43ba 100644
--- a/x-pack/plugins/security_solution/public/common/store/sourcerer/helpers.ts
+++ b/x-pack/plugins/security_solution/public/common/store/sourcerer/helpers.ts
@@ -25,16 +25,7 @@ export const createDefaultIndexPatterns = ({ eventType, id, selectedPatterns, st
if (isEmpty(newSelectedPatterns)) {
let defaultIndexPatterns = state.configIndexPatterns;
if (id === SourcererScopeName.timeline && isEmpty(newSelectedPatterns)) {
- if (eventType === 'all' && !isEmpty(state.signalIndexName)) {
- defaultIndexPatterns = [...state.configIndexPatterns, state.signalIndexName ?? ''];
- } else if (eventType === 'raw') {
- defaultIndexPatterns = state.configIndexPatterns;
- } else if (
- !isEmpty(state.signalIndexName) &&
- (eventType === 'signal' || eventType === 'alert')
- ) {
- defaultIndexPatterns = [state.signalIndexName ?? ''];
- }
+ defaultIndexPatterns = defaultIndexPatternByEventType({ state, eventType });
} else if (id === SourcererScopeName.detections && isEmpty(newSelectedPatterns)) {
defaultIndexPatterns = [state.signalIndexName ?? ''];
}
@@ -42,3 +33,21 @@ export const createDefaultIndexPatterns = ({ eventType, id, selectedPatterns, st
}
return newSelectedPatterns;
};
+
+export const defaultIndexPatternByEventType = ({
+ state,
+ eventType,
+}: {
+ state: SourcererModel;
+ eventType?: TimelineEventsType;
+}) => {
+ let defaultIndexPatterns = state.configIndexPatterns;
+ if (eventType === 'all' && !isEmpty(state.signalIndexName)) {
+ defaultIndexPatterns = [...state.configIndexPatterns, state.signalIndexName ?? ''];
+ } else if (eventType === 'raw') {
+ defaultIndexPatterns = state.configIndexPatterns;
+ } else if (!isEmpty(state.signalIndexName) && (eventType === 'signal' || eventType === 'alert')) {
+ defaultIndexPatterns = [state.signalIndexName ?? ''];
+ }
+ return defaultIndexPatterns;
+};
diff --git a/x-pack/plugins/security_solution/public/common/store/sourcerer/reducer.ts b/x-pack/plugins/security_solution/public/common/store/sourcerer/reducer.ts
index a1112607de24f..0c7c52e5e5733 100644
--- a/x-pack/plugins/security_solution/public/common/store/sourcerer/reducer.ts
+++ b/x-pack/plugins/security_solution/public/common/store/sourcerer/reducer.ts
@@ -4,8 +4,7 @@
* you may not use this file except in compliance with the Elastic License.
*/
-// Prefer importing entire lodash library, e.g. import { get } from "lodash"
-
+import { isEmpty } from 'lodash/fp';
import { reducerWithInitialState } from 'typescript-fsa-reducers';
import {
@@ -14,9 +13,10 @@ import {
setSelectedIndexPatterns,
setSignalIndexName,
setSource,
+ initTimelineIndexPatterns,
} from './actions';
import { initialSourcererState, SourcererModel } from './model';
-import { createDefaultIndexPatterns } from './helpers';
+import { createDefaultIndexPatterns, defaultIndexPatternByEventType } from './helpers';
export type SourcererState = SourcererModel;
@@ -52,6 +52,21 @@ export const sourcererReducer = reducerWithInitialState(initialSourcererState)
},
};
})
+ .case(initTimelineIndexPatterns, (state, { id, selectedPatterns, eventType }) => {
+ return {
+ ...state,
+ sourcererScopes: {
+ ...state.sourcererScopes,
+ [id]: {
+ ...state.sourcererScopes[id],
+ selectedPatterns: isEmpty(selectedPatterns)
+ ? defaultIndexPatternByEventType({ state, eventType })
+ : selectedPatterns,
+ },
+ },
+ };
+ })
+
.case(setSource, (state, { id, payload }) => {
const { ...sourcererScopes } = payload;
return {
diff --git a/x-pack/plugins/security_solution/public/common/store/sourcerer/selectors.test.ts b/x-pack/plugins/security_solution/public/common/store/sourcerer/selectors.test.ts
new file mode 100644
index 0000000000000..e6577f2461a9e
--- /dev/null
+++ b/x-pack/plugins/security_solution/public/common/store/sourcerer/selectors.test.ts
@@ -0,0 +1,70 @@
+/*
+ * Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
+ * or more contributor license agreements. Licensed under the Elastic License;
+ * you may not use this file except in compliance with the Elastic License.
+ */
+
+import { cloneDeep } from 'lodash/fp';
+import { mockGlobalState } from '../../mock';
+import { SourcererScopeName } from './model';
+import { getSourcererScopeSelector } from './selectors';
+
+describe('Sourcerer selectors', () => {
+ describe('getSourcererScopeSelector', () => {
+ it('Should exclude elastic cloud alias when selected patterns include "logs-*" as an alias', () => {
+ const mapStateToProps = getSourcererScopeSelector();
+ expect(
+ mapStateToProps(mockGlobalState, SourcererScopeName.default).selectedPatterns
+ ).toEqual([
+ 'apm-*-transaction*',
+ 'auditbeat-*',
+ 'endgame-*',
+ 'filebeat-*',
+ 'logs-*',
+ 'packetbeat-*',
+ 'winlogbeat-*',
+ '-*elastic-cloud-logs-*',
+ ]);
+ });
+
+ it('Should NOT exclude elastic cloud alias when selected patterns does NOT include "logs-*" as an alias', () => {
+ const mapStateToProps = getSourcererScopeSelector();
+ const myMockGlobalState = cloneDeep(mockGlobalState);
+ myMockGlobalState.sourcerer.sourcererScopes.default.selectedPatterns = myMockGlobalState.sourcerer.sourcererScopes.default.selectedPatterns.filter(
+ (index) => !index.includes('logs-*')
+ );
+ expect(
+ mapStateToProps(myMockGlobalState, SourcererScopeName.default).selectedPatterns
+ ).toEqual([
+ 'apm-*-transaction*',
+ 'auditbeat-*',
+ 'endgame-*',
+ 'filebeat-*',
+ 'packetbeat-*',
+ 'winlogbeat-*',
+ ]);
+ });
+
+ it('Should NOT exclude elastic cloud alias when selected patterns include "logs-endpoint.event-*" as an alias', () => {
+ const mapStateToProps = getSourcererScopeSelector();
+ const myMockGlobalState = cloneDeep(mockGlobalState);
+ myMockGlobalState.sourcerer.sourcererScopes.default.selectedPatterns = [
+ ...myMockGlobalState.sourcerer.sourcererScopes.default.selectedPatterns.filter(
+ (index) => !index.includes('logs-*')
+ ),
+ 'logs-endpoint.event-*',
+ ];
+ expect(
+ mapStateToProps(myMockGlobalState, SourcererScopeName.default).selectedPatterns
+ ).toEqual([
+ 'apm-*-transaction*',
+ 'auditbeat-*',
+ 'endgame-*',
+ 'filebeat-*',
+ 'packetbeat-*',
+ 'winlogbeat-*',
+ 'logs-endpoint.event-*',
+ ]);
+ });
+ });
+});
diff --git a/x-pack/plugins/security_solution/public/common/store/sourcerer/selectors.ts b/x-pack/plugins/security_solution/public/common/store/sourcerer/selectors.ts
index ca9ea26ba5bac..e7bd6234cb207 100644
--- a/x-pack/plugins/security_solution/public/common/store/sourcerer/selectors.ts
+++ b/x-pack/plugins/security_solution/public/common/store/sourcerer/selectors.ts
@@ -41,13 +41,18 @@ export const getIndexNamesSelectedSelector = () => {
const getScopesSelector = scopesSelector();
const getConfigIndexPatternsSelector = configIndexPatternsSelector();
- const mapStateToProps = (state: State, scopeId: SourcererScopeName): string[] => {
+ const mapStateToProps = (
+ state: State,
+ scopeId: SourcererScopeName
+ ): { indexNames: string[]; previousIndexNames: string } => {
const scope = getScopesSelector(state)[scopeId];
const configIndexPatterns = getConfigIndexPatternsSelector(state);
-
- return scope.selectedPatterns.length === 0 ? configIndexPatterns : scope.selectedPatterns;
+ return {
+ indexNames:
+ scope.selectedPatterns.length === 0 ? configIndexPatterns : scope.selectedPatterns,
+ previousIndexNames: scope.indexPattern.title,
+ };
};
-
return mapStateToProps;
};
@@ -81,11 +86,18 @@ export const defaultIndexNamesSelector = () => {
return mapStateToProps;
};
+const EXLCUDE_ELASTIC_CLOUD_INDEX = '-*elastic-cloud-logs-*';
export const getSourcererScopeSelector = () => {
const getScopesSelector = scopesSelector();
- const mapStateToProps = (state: State, scopeId: SourcererScopeName): ManageScope =>
- getScopesSelector(state)[scopeId];
+ const mapStateToProps = (state: State, scopeId: SourcererScopeName): ManageScope => ({
+ ...getScopesSelector(state)[scopeId],
+ selectedPatterns: getScopesSelector(state)[scopeId].selectedPatterns.some(
+ (index) => index === 'logs-*'
+ )
+ ? [...getScopesSelector(state)[scopeId].selectedPatterns, EXLCUDE_ELASTIC_CLOUD_INDEX]
+ : getScopesSelector(state)[scopeId].selectedPatterns,
+ });
return mapStateToProps;
};
diff --git a/x-pack/plugins/security_solution/public/detections/components/alerts_table/actions.test.tsx b/x-pack/plugins/security_solution/public/detections/components/alerts_table/actions.test.tsx
index bfc104b105236..ecc0fc54d0d47 100644
--- a/x-pack/plugins/security_solution/public/detections/components/alerts_table/actions.test.tsx
+++ b/x-pack/plugins/security_solution/public/detections/components/alerts_table/actions.test.tsx
@@ -47,7 +47,9 @@ describe('alert actions', () => {
searchStrategyClient = {
aggs: {} as ISearchStart['aggs'],
showError: jest.fn(),
- search: jest.fn().mockResolvedValue({ data: mockTimelineDetails }),
+ search: jest
+ .fn()
+ .mockImplementation(() => ({ toPromise: () => ({ data: mockTimelineDetails }) })),
searchSource: {} as ISearchStart['searchSource'],
session: dataPluginMock.createStartContract().search.session,
};
@@ -400,6 +402,78 @@ describe('alert actions', () => {
expect(createTimeline).toHaveBeenCalledWith(defaultTimelineProps);
});
});
+
+ describe('Eql', () => {
+ test(' with signal.group.id', async () => {
+ const ecsDataMock: Ecs = {
+ ...mockEcsDataWithAlert,
+ signal: {
+ rule: {
+ ...mockEcsDataWithAlert.signal?.rule!,
+ type: ['eql'],
+ timeline_id: [''],
+ },
+ group: {
+ id: ['my-group-id'],
+ },
+ },
+ };
+
+ await sendAlertToTimelineAction({
+ createTimeline,
+ ecsData: ecsDataMock,
+ nonEcsData: [],
+ updateTimelineIsLoading,
+ searchStrategyClient,
+ });
+
+ expect(updateTimelineIsLoading).not.toHaveBeenCalled();
+ expect(createTimeline).toHaveBeenCalledTimes(1);
+ expect(createTimeline).toHaveBeenCalledWith({
+ ...defaultTimelineProps,
+ timeline: {
+ ...defaultTimelineProps.timeline,
+ dataProviders: [
+ {
+ and: [],
+ enabled: true,
+ excluded: false,
+ id:
+ 'send-alert-to-timeline-action-default-draggable-event-details-value-formatted-field-value-timeline-1-alert-id-my-group-id',
+ kqlQuery: '',
+ name: '1',
+ queryMatch: { field: 'signal.group.id', operator: ':', value: 'my-group-id' },
+ },
+ ],
+ },
+ });
+ });
+
+ test(' with NO signal.group.id', async () => {
+ const ecsDataMock: Ecs = {
+ ...mockEcsDataWithAlert,
+ signal: {
+ rule: {
+ ...mockEcsDataWithAlert.signal?.rule!,
+ type: ['eql'],
+ timeline_id: [''],
+ },
+ },
+ };
+
+ await sendAlertToTimelineAction({
+ createTimeline,
+ ecsData: ecsDataMock,
+ nonEcsData: [],
+ updateTimelineIsLoading,
+ searchStrategyClient,
+ });
+
+ expect(updateTimelineIsLoading).not.toHaveBeenCalled();
+ expect(createTimeline).toHaveBeenCalledTimes(1);
+ expect(createTimeline).toHaveBeenCalledWith(defaultTimelineProps);
+ });
+ });
});
describe('determineToAndFrom', () => {
diff --git a/x-pack/plugins/security_solution/public/detections/components/alerts_table/actions.tsx b/x-pack/plugins/security_solution/public/detections/components/alerts_table/actions.tsx
index 043a5afc4480d..e3defaea2ec67 100644
--- a/x-pack/plugins/security_solution/public/detections/components/alerts_table/actions.tsx
+++ b/x-pack/plugins/security_solution/public/detections/components/alerts_table/actions.tsx
@@ -150,8 +150,10 @@ export const getThresholdAggregationDataProvider = (
];
};
-export const isEqlRule = (ecsData: Ecs) =>
- ecsData.signal?.rule?.type?.length && ecsData.signal?.rule?.type[0] === 'eql';
+export const isEqlRuleWithGroupId = (ecsData: Ecs) =>
+ ecsData.signal?.rule?.type?.length &&
+ ecsData.signal?.rule?.type[0] === 'eql' &&
+ ecsData.signal?.group?.id?.length;
export const isThresholdRule = (ecsData: Ecs) =>
ecsData.signal?.rule?.type?.length && ecsData.signal?.rule?.type[0] === 'threshold';
@@ -181,24 +183,23 @@ export const sendAlertToTimelineAction = async ({
timelineType: TimelineType.template,
},
}),
- searchStrategyClient.search<
- TimelineEventsDetailsRequestOptions,
- TimelineEventsDetailsStrategyResponse
- >(
- {
- defaultIndex: [],
- docValueFields: [],
- indexName: ecsData._index ?? '',
- eventId: ecsData._id,
- factoryQueryType: TimelineEventsQueries.details,
- },
- {
- strategy: 'securitySolutionTimelineSearchStrategy',
- }
- ),
+ searchStrategyClient
+ .search(
+ {
+ defaultIndex: [],
+ docValueFields: [],
+ indexName: ecsData._index ?? '',
+ eventId: ecsData._id,
+ factoryQueryType: TimelineEventsQueries.details,
+ },
+ {
+ strategy: 'securitySolutionTimelineSearchStrategy',
+ }
+ )
+ .toPromise(),
]);
const resultingTimeline: TimelineResult = getOr({}, 'data.getOneTimeline', responseTimeline);
- const eventData: TimelineEventsDetailsItem[] = getOr([], 'data', eventDataResp);
+ const eventData: TimelineEventsDetailsItem[] = eventDataResp.data ?? [];
if (!isEmpty(resultingTimeline)) {
const timelineTemplate: TimelineResult = omitTypenameInTimeline(resultingTimeline);
const { timeline, notes } = formatTimelineResultToModel(
@@ -327,7 +328,7 @@ export const sendAlertToTimelineAction = async ({
},
},
];
- if (isEqlRule(ecsData)) {
+ if (isEqlRuleWithGroupId(ecsData)) {
const signalGroupId = ecsData.signal?.group?.id?.length
? ecsData.signal?.group?.id[0]
: 'unknown-signal-group-id';
diff --git a/x-pack/plugins/security_solution/public/management/components/management_empty_state.tsx b/x-pack/plugins/security_solution/public/management/components/management_empty_state.tsx
index d51a23639f5cb..18745897c594f 100644
--- a/x-pack/plugins/security_solution/public/management/components/management_empty_state.tsx
+++ b/x-pack/plugins/security_solution/public/management/components/management_empty_state.tsx
@@ -66,7 +66,7 @@ const PolicyEmptyState = React.memo<{
diff --git a/x-pack/plugins/security_solution/public/overview/pages/overview.tsx b/x-pack/plugins/security_solution/public/overview/pages/overview.tsx
index 5a3b4ec384686..a292ec3e1a119 100644
--- a/x-pack/plugins/security_solution/public/overview/pages/overview.tsx
+++ b/x-pack/plugins/security_solution/public/overview/pages/overview.tsx
@@ -131,7 +131,7 @@ const OverviewComponent: React.FC = ({
(
- { indices: defaultIndicesName, onlyCheckIfIndicesExist: false },
+ { indices: defaultIndicesName, onlyCheckIfIndicesExist: true },
{
strategy: 'securitySolutionIndexFields',
}
diff --git a/x-pack/plugins/security_solution/public/timelines/components/edit_data_provider/index.tsx b/x-pack/plugins/security_solution/public/timelines/components/edit_data_provider/index.tsx
index 2bc202c65f6ab..8127f2be13d4e 100644
--- a/x-pack/plugins/security_solution/public/timelines/components/edit_data_provider/index.tsx
+++ b/x-pack/plugins/security_solution/public/timelines/components/edit_data_provider/index.tsx
@@ -189,7 +189,7 @@ export const StatefulEditDataProvider = React.memo(
-
+
(
-
+
{type !== DataProviderType.template &&
@@ -245,7 +245,7 @@ export const StatefulEditDataProvider = React.memo(
) : null}
-
+
@@ -265,7 +265,7 @@ export const StatefulEditDataProvider = React.memo(
}) || isValueFieldInvalid
}
onClick={handleSave}
- size="s"
+ size="m"
>
{i18n.SAVE}
diff --git a/x-pack/plugins/security_solution/public/timelines/components/open_timeline/helpers.ts b/x-pack/plugins/security_solution/public/timelines/components/open_timeline/helpers.ts
index c89740f667b29..4c3be81a4992a 100644
--- a/x-pack/plugins/security_solution/public/timelines/components/open_timeline/helpers.ts
+++ b/x-pack/plugins/security_solution/public/timelines/components/open_timeline/helpers.ts
@@ -378,7 +378,7 @@ export const dispatchUpdateTimeline = (dispatch: Dispatch): DispatchUpdateTimeli
ruleNote,
}: UpdateTimeline): (() => void) => () => {
dispatch(
- sourcererActions.setSelectedIndexPatterns({
+ sourcererActions.initTimelineIndexPatterns({
id: SourcererScopeName.timeline,
selectedPatterns: timeline.indexNames,
eventType: timeline.eventType,
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_403_response_to_a_post.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_403_response_to_a_post.json
index 9139ca82cc7d8..44deb00140654 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_403_response_to_a_post.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_403_response_to_a_post.json
@@ -20,9 +20,9 @@
"rule_id": "a87a4e42-1d82-44bd-b0bf-d9b7f91fb89e",
"severity": "medium",
"tags": [
- "APM",
- "Elastic"
+ "Elastic",
+ "APM"
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_405_response_method_not_allowed.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_405_response_method_not_allowed.json
index 2eb7d711e5fb8..5ff5cb39a6b21 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_405_response_method_not_allowed.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_405_response_method_not_allowed.json
@@ -20,9 +20,9 @@
"rule_id": "75ee75d8-c180-481c-ba88-ee50129a6aef",
"severity": "medium",
"tags": [
- "APM",
- "Elastic"
+ "Elastic",
+ "APM"
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_null_user_agent.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_null_user_agent.json
index e78395be8fb1b..75bbfe477732b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_null_user_agent.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_null_user_agent.json
@@ -38,9 +38,9 @@
"rule_id": "43303fd4-4839-4e48-b2b2-803ab060758d",
"severity": "medium",
"tags": [
- "APM",
- "Elastic"
+ "Elastic",
+ "APM"
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_sqlmap_user_agent.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_sqlmap_user_agent.json
index aaaab6b5c6031..10185c28a8e52 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_sqlmap_user_agent.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/apm_sqlmap_user_agent.json
@@ -20,9 +20,9 @@
"rule_id": "d49cc73f-7a16-4def-89ce-9fc7127d7820",
"severity": "medium",
"tags": [
- "APM",
- "Elastic"
+ "Elastic",
+ "APM"
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_network_connection_from_windows_binary.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_network_connection_from_windows_binary.json
deleted file mode 100644
index 5652f025952d7..0000000000000
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_network_connection_from_windows_binary.json
+++ /dev/null
@@ -1,41 +0,0 @@
-{
- "author": [
- "Elastic"
- ],
- "description": "Identifies network activity from unexpected system applications. This may indicate adversarial activity as these applications are often leveraged by adversaries to execute code and evade detection.",
- "from": "now-9m",
- "index": [
- "logs-endpoint.events.*",
- "winlogbeat-*"
- ],
- "language": "eql",
- "license": "Elastic License",
- "name": "Unusual Network Activity from a Windows System Binary",
- "query": "sequence by process.entity_id with maxspan=5m\n [process where event.type in (\"start\", \"process_started\") and\n\n /* known applocker bypasses */\n process.name in (\"bginfo.exe\",\n \"cdb.exe\",\n \"control.exe\",\n \"cmstp.exe\",\n \"csi.exe\",\n \"dnx.exe\",\n \"fsi.exe\",\n \"ieexec.exe\",\n \"iexpress.exe\",\n \"installutil.exe\",\n \"Microsoft.Workflow.Compiler.exe\",\n \"MSBuild.exe\",\n \"msdt.exe\",\n \"mshta.exe\",\n \"msiexec.exe\",\n \"msxsl.exe\",\n \"odbcconf.exe\",\n \"rcsi.exe\",\n \"regsvr32.exe\",\n \"xwizard.exe\")]\n [network where event.type == \"connection\" and\n process.name in (\"bginfo.exe\",\n \"cdb.exe\",\n \"control.exe\",\n \"cmstp.exe\",\n \"csi.exe\",\n \"dnx.exe\",\n \"fsi.exe\",\n \"ieexec.exe\",\n \"iexpress.exe\",\n \"installutil.exe\",\n \"Microsoft.Workflow.Compiler.exe\",\n \"MSBuild.exe\",\n \"msdt.exe\",\n \"mshta.exe\",\n \"msiexec.exe\",\n \"msxsl.exe\",\n \"odbcconf.exe\",\n \"rcsi.exe\",\n \"regsvr32.exe\",\n \"xwizard.exe\")]\n",
- "risk_score": 21,
- "rule_id": "1fe3b299-fbb5-4657-a937-1d746f2c711a",
- "severity": "medium",
- "tags": [
- "Elastic",
- "Windows"
- ],
- "threat": [
- {
- "framework": "MITRE ATT&CK",
- "tactic": {
- "id": "TA0005",
- "name": "Defense Evasion",
- "reference": "https://attack.mitre.org/tactics/TA0005/"
- },
- "technique": [
- {
- "id": "T1127",
- "name": "Trusted Developer Utilities Proxy Execution",
- "reference": "https://attack.mitre.org/techniques/T1127/"
- }
- ]
- }
- ],
- "type": "eql",
- "version": 1
-}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_cloudtrail_logging_created.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_cloudtrail_logging_created.json
index 3dc084a3af54b..7c98f47fd05e2 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_cloudtrail_logging_created.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_cloudtrail_logging_created.json
@@ -25,11 +25,12 @@
"rule_id": "594e0cbf-86cc-45aa-9ff7-ff27db27d3ed",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Logging",
- "Continuous Monitoring"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_gcp_pub_sub_subscription_creation.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_gcp_pub_sub_subscription_creation.json
index 720c6f71dafdd..6b90ec776926c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_gcp_pub_sub_subscription_creation.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_gcp_pub_sub_subscription_creation.json
@@ -22,10 +22,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
- "Logging"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_gcp_pub_sub_topic_creation.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_gcp_pub_sub_topic_creation.json
index 93695334faae2..e53c36b236639 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_gcp_pub_sub_topic_creation.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_gcp_pub_sub_topic_creation.json
@@ -22,10 +22,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
- "Logging"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_update_event_hub_auth_rule.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_update_event_hub_auth_rule.json
index cddc98ba2e6d7..d65a0bcdbc6d0 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_update_event_hub_auth_rule.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/collection_update_event_hub_auth_rule.json
@@ -22,11 +22,12 @@
"rule_id": "b6dce542-2b75-4ffb-b7d6-38787298ba9d",
"severity": "medium",
"tags": [
- "Azure",
"Elastic",
- "SecOps",
+ "Cloud",
+ "Azure",
"Continuous Monitoring",
- "Logging"
+ "SecOps",
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_certutil_network_connection.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_certutil_network_connection.json
index f32877da78d99..e88297aa2c813 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_certutil_network_connection.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_certutil_network_connection.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_cobalt_strike_beacon.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_cobalt_strike_beacon.json
index 7ebc13ac8079b..27ad410df1fa2 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_cobalt_strike_beacon.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_cobalt_strike_beacon.json
@@ -23,7 +23,9 @@
"severity": "high",
"tags": [
"Elastic",
- "Network"
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_dns_directly_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_dns_directly_to_the_internet.json
index 79ec202c41ffb..3df567b09055a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_dns_directly_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_dns_directly_to_the_internet.json
@@ -23,7 +23,9 @@
"severity": "medium",
"tags": [
"Elastic",
- "Network"
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -43,5 +45,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_download_rar_powershell_from_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_download_rar_powershell_from_internet.json
index 7b739f005a0cb..92411011ba66e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_download_rar_powershell_from_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_download_rar_powershell_from_internet.json
@@ -23,7 +23,9 @@
"severity": "medium",
"tags": [
"Elastic",
- "Network"
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_fin7_c2_behavior.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_fin7_c2_behavior.json
index 04d68aff0da1c..1ea40aad7861a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_fin7_c2_behavior.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_fin7_c2_behavior.json
@@ -22,7 +22,9 @@
"severity": "high",
"tags": [
"Elastic",
- "Network"
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ftp_file_transfer_protocol_activity_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ftp_file_transfer_protocol_activity_to_the_internet.json
index 9a009ffd3fd21..c73fdf1bded9d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ftp_file_transfer_protocol_activity_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ftp_file_transfer_protocol_activity_to_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -54,5 +58,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_halfbaked_beacon.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_halfbaked_beacon.json
index 7dacb9afcbd60..19c2832b4b82e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_halfbaked_beacon.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_halfbaked_beacon.json
@@ -23,7 +23,9 @@
"severity": "high",
"tags": [
"Elastic",
- "Network"
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_irc_internet_relay_chat_protocol_activity_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_irc_internet_relay_chat_protocol_activity_to_the_internet.json
index 0e35d4b1c5ca0..f1901fa70def2 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_irc_internet_relay_chat_protocol_activity_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_irc_internet_relay_chat_protocol_activity_to_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_nat_traversal_port_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_nat_traversal_port_activity.json
index e42bf4029eb01..5afdd1f629ae4 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_nat_traversal_port_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_nat_traversal_port_activity.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -39,5 +43,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_port_26_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_port_26_activity.json
index 1cdfd44eb2adf..edd913da4d2b3 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_port_26_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_port_26_activity.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -23,7 +24,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_port_8000_activity_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_port_8000_activity_to_the_internet.json
index 319f95ed88e08..0c35bd5e23ed5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_port_8000_activity_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_port_8000_activity_to_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -39,5 +43,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_pptp_point_to_point_tunneling_protocol_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_pptp_point_to_point_tunneling_protocol_activity.json
index bd478f2b23fc0..c706a5b7248c8 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_pptp_point_to_point_tunneling_protocol_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_pptp_point_to_point_tunneling_protocol_activity.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -39,5 +43,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_proxy_port_activity_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_proxy_port_activity_to_the_internet.json
index ee02505300611..8535a9591b88f 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_proxy_port_activity_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_proxy_port_activity_to_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -39,5 +43,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_rdp_remote_desktop_protocol_from_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_rdp_remote_desktop_protocol_from_the_internet.json
index 87544647b17e1..4a3fd026f54a7 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_rdp_remote_desktop_protocol_from_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_rdp_remote_desktop_protocol_from_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -69,5 +73,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_remote_file_copy_desktopimgdownldr.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_remote_file_copy_desktopimgdownldr.json
index d5b21dfe2db18..596c4bbac57ba 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_remote_file_copy_desktopimgdownldr.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_remote_file_copy_desktopimgdownldr.json
@@ -11,7 +11,7 @@
"language": "kuery",
"license": "Elastic License",
"name": "Remote File Download via Desktopimgdownldr Utility",
- "query": "event.category:process and event.type:(start or process_started) and (process.name:desktopimgdownldr.exe or process.pe.original_file_name:desktopimgdownldr.exe) and process.args:/lockscreenurl\\:http*",
+ "query": "event.category:process and event.type:(start or process_started) and (process.name:desktopimgdownldr.exe or process.pe.original_file_name:desktopimgdownldr.exe or winlog.event_data.OriginalFileName:desktopimgdownldr.exe) and process.args:/lockscreenurl\\:http*",
"references": [
"https://labs.sentinelone.com/living-off-windows-land-a-new-native-file-downldr/"
],
@@ -20,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_remote_file_copy_mpcmdrun.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_remote_file_copy_mpcmdrun.json
index aeadc849eac17..9eef2fbbc62a6 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_remote_file_copy_mpcmdrun.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_remote_file_copy_mpcmdrun.json
@@ -12,7 +12,7 @@
"license": "Elastic License",
"name": "Remote File Download via MpCmdRun",
"note": "### Investigating Remote File Download via MpCmdRun\nVerify details such as the parent process, URL reputation, and downloaded file details. Additionally, `MpCmdRun` logs this information in the Appdata Temp folder in `MpCmdRun.log`.",
- "query": "event.category:process and event.type:(start or process_started) and (process.name:MpCmdRun.exe or process.pe.original_file_name:MpCmdRun.exe) and process.args:((\"-DownloadFile\" or \"-downloadfile\") and \"-url\" and \"-path\")",
+ "query": "event.category:process and event.type:(start or process_started) and (process.name:MpCmdRun.exe or process.pe.original_file_name:MpCmdRun.exe or winlog.event_data.OriginalFileName:MpCmdRun.exe) and process.args:((\"-DownloadFile\" or \"-downloadfile\") and \"-url\" and \"-path\")",
"references": [
"https://twitter.com/mohammadaskar2/status/1301263551638761477",
"https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-can-ironically-be-used-to-download-malware/"
@@ -22,7 +22,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_smtp_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_smtp_to_the_internet.json
index 3a082c29a4cf1..f041255374f12 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_smtp_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_smtp_to_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -54,5 +58,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_sql_server_port_activity_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_sql_server_port_activity_to_the_internet.json
index 95ac4d8836800..7e4f3907fc31e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_sql_server_port_activity_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_sql_server_port_activity_to_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -39,5 +43,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ssh_secure_shell_from_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ssh_secure_shell_from_the_internet.json
index fe5608459ffce..08ab14aeb5c7c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ssh_secure_shell_from_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ssh_secure_shell_from_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -69,5 +73,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ssh_secure_shell_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ssh_secure_shell_to_the_internet.json
index 9ecfe39a79303..4bc48ebe0c316 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ssh_secure_shell_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_ssh_secure_shell_to_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -39,5 +43,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_teamviewer_remote_file_copy.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_teamviewer_remote_file_copy.json
index 793ff4ebda72f..c597f6b2718b9 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_teamviewer_remote_file_copy.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_teamviewer_remote_file_copy.json
@@ -20,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_telnet_port_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_telnet_port_activity.json
index 4455d8adfdf83..9007db322ae58 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_telnet_port_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_telnet_port_activity.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_tor_activity_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_tor_activity_to_the_internet.json
index b278c36d01c1b..e82106a87bc2e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_tor_activity_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_tor_activity_to_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
@@ -54,5 +58,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_vnc_virtual_network_computing_from_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_vnc_virtual_network_computing_from_the_internet.json
index 97d2b940a6949..9321d2a2103de 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_vnc_virtual_network_computing_from_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_vnc_virtual_network_computing_from_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_vnc_virtual_network_computing_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_vnc_virtual_network_computing_to_the_internet.json
index 97757af22be0c..38f38e9762645 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_vnc_virtual_network_computing_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/command_and_control_vnc_virtual_network_computing_to_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Command and Control"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_attempted_bypass_of_okta_mfa.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_attempted_bypass_of_okta_mfa.json
index 118f8f6b2ad4a..fb8256bf2509c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_attempted_bypass_of_okta_mfa.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_attempted_bypass_of_okta_mfa.json
@@ -21,10 +21,11 @@
"severity": "high",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_attempts_to_brute_force_okta_user_account.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_attempts_to_brute_force_okta_user_account.json
index 5aae95476e9da..d8d5b5305aaaa 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_attempts_to_brute_force_okta_user_account.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_attempts_to_brute_force_okta_user_account.json
@@ -22,6 +22,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Identity",
"Okta",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_aws_iam_assume_role_brute_force.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_aws_iam_assume_role_brute_force.json
index e350c3697f685..b7e89a9120bbb 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_aws_iam_assume_role_brute_force.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_aws_iam_assume_role_brute_force.json
@@ -21,11 +21,12 @@
"rule_id": "ea248a02-bc47-4043-8e94-2885b19b2636",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/exfiltration_compress_credentials_keychains.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_compress_credentials_keychains.json
similarity index 95%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/exfiltration_compress_credentials_keychains.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_compress_credentials_keychains.json
index bf2a52066ae1c..c13ac69e50987 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/exfiltration_compress_credentials_keychains.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_compress_credentials_keychains.json
@@ -20,7 +20,10 @@
"severity": "high",
"tags": [
"Elastic",
- "MacOS"
+ "Host",
+ "macOS",
+ "Threat Detection",
+ "Credential Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_credential_dumping_msbuild.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_credential_dumping_msbuild.json
index a67fa01ab371a..0761ba515d9b1 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_credential_dumping_msbuild.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_credential_dumping_msbuild.json
@@ -20,7 +20,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Credential Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_domain_backup_dpapi_private_keys.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_domain_backup_dpapi_private_keys.json
index dc4f5e11754d3..eefd6ee9e601b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_domain_backup_dpapi_private_keys.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_domain_backup_dpapi_private_keys.json
@@ -22,7 +22,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Credential Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_gcp_iam_service_account_key_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_gcp_iam_service_account_key_deletion.json
index 63d5081869f1b..5db891caa2857 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_gcp_iam_service_account_key_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_gcp_iam_service_account_key_deletion.json
@@ -23,6 +23,7 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_gcp_key_created_for_service_account.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_gcp_key_created_for_service_account.json
index c1ae7f5fc1953..a6d45b7465771 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_gcp_key_created_for_service_account.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_gcp_key_created_for_service_account.json
@@ -23,6 +23,7 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iam_user_addition_to_group.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iam_user_addition_to_group.json
index 7c5aa9bc7f3a8..8244cb755787f 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iam_user_addition_to_group.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iam_user_addition_to_group.json
@@ -24,11 +24,12 @@
"rule_id": "333de828-8190-4cf5-8d7c-7575846f6fe0",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iis_apppoolsa_pwd_appcmd.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iis_apppoolsa_pwd_appcmd.json
index dd7bc43c58382..6a182617945f1 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iis_apppoolsa_pwd_appcmd.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iis_apppoolsa_pwd_appcmd.json
@@ -12,7 +12,7 @@
"license": "Elastic License",
"max_signals": 33,
"name": "Microsoft IIS Service Account Password Dumped",
- "query": "event.category:process AND event.type:(start OR process_started) AND (process.name:appcmd.exe OR process.pe.original_file_name:appcmd.exe) AND process.args:(/[lL][iI][sS][tT]/ AND /\\/[tT][eE][xX][tT]\\:[pP][aA][sS][sS][wW][oO][rR][dD]/)",
+ "query": "event.category:process AND event.type:(start OR process_started) AND (process.name:appcmd.exe OR process.pe.original_file_name:appcmd.exe or winlog.event_data.OriginalFileName:appcmd.exe) AND process.args:(/[lL][iI][sS][tT]/ AND /\\/[tT][eE][xX][tT]\\:[pP][aA][sS][sS][wW][oO][rR][dD]/)",
"references": [
"https://blog.netspi.com/decrypting-iis-passwords-to-break-out-of-the-dmz-part-1/"
],
@@ -21,7 +21,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Credential Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iis_connectionstrings_dumping.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iis_connectionstrings_dumping.json
index 2735fcbbd6130..f750a0f5594b4 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iis_connectionstrings_dumping.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_iis_connectionstrings_dumping.json
@@ -12,7 +12,7 @@
"license": "Elastic License",
"max_signals": 33,
"name": "Microsoft IIS Connection Strings Decryption",
- "query": "event.category:process and event.type:(start or process_started) and (process.name:aspnet_regiis.exe or process.pe.original_file_name:aspnet_regiis.exe) and process.args:(connectionStrings and \"-pdf\")",
+ "query": "event.category:process and event.type:(start or process_started) and (process.name:aspnet_regiis.exe or process.pe.original_file_name:aspnet_regiis.exe or winlog.event_data.OriginalFileName:aspnet_regiis.exe) and process.args:(connectionStrings and \"-pdf\")",
"references": [
"https://blog.netspi.com/decrypting-iis-passwords-to-break-out-of-the-dmz-part-1/",
"https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/greenbug-espionage-telco-south-asia"
@@ -22,7 +22,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Credential Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_kerberosdump_kcc.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_kerberosdump_kcc.json
index 4713d09f8adec..dda2f67c11663 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_kerberosdump_kcc.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_kerberosdump_kcc.json
@@ -21,7 +21,10 @@
"severity": "high",
"tags": [
"Elastic",
- "MacOS"
+ "Host",
+ "macOS",
+ "Threat Detection",
+ "Credential Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_key_vault_modified.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_key_vault_modified.json
index a45591c73dcb3..33df4e5930066 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_key_vault_modified.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_key_vault_modified.json
@@ -24,9 +24,10 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
- "SecOps",
"Continuous Monitoring",
+ "SecOps",
"Data Protection"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_mimikatz_memssp_default_logs.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_mimikatz_memssp_default_logs.json
index fa1f99eef7f00..ae9b63371a452 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_mimikatz_memssp_default_logs.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_mimikatz_memssp_default_logs.json
@@ -17,7 +17,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Credential Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_okta_brute_force_or_password_spraying.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_okta_brute_force_or_password_spraying.json
index c36f878792ccf..9e10dd6dae522 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_okta_brute_force_or_password_spraying.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_okta_brute_force_or_password_spraying.json
@@ -24,10 +24,11 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_root_console_failure_brute_force.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_root_console_failure_brute_force.json
similarity index 96%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_root_console_failure_brute_force.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_root_console_failure_brute_force.json
index 5f7781be82efd..f65a7b11d11ad 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_root_console_failure_brute_force.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_root_console_failure_brute_force.json
@@ -23,11 +23,12 @@
"rule_id": "4d50a94f-2844-43fa-8395-6afbd5e1c5ef",
"severity": "high",
"tags": [
+ "Elastic",
+ "Cloud",
"AWS",
"Continuous Monitoring",
- "Elastic",
- "Identity and Access",
- "SecOps"
+ "SecOps",
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_secretsmanager_getsecretvalue.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_secretsmanager_getsecretvalue.json
index 879e93750df9c..a33593f701ba7 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_secretsmanager_getsecretvalue.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_secretsmanager_getsecretvalue.json
@@ -26,11 +26,12 @@
"rule_id": "a00681e3-9ed6-447c-ab2c-be648821c622",
"severity": "high",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Data Protection",
- "Continuous Monitoring"
+ "Data Protection"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_storage_account_key_regenerated.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_storage_account_key_regenerated.json
index 2a3dc85294a9d..62e1aab700680 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_storage_account_key_regenerated.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_storage_account_key_regenerated.json
@@ -22,10 +22,11 @@
"rule_id": "1e0b832e-957e-43ae-b319-db82d228c908",
"severity": "low",
"tags": [
- "Azure",
"Elastic",
- "SecOps",
+ "Cloud",
+ "Azure",
"Continuous Monitoring",
+ "SecOps",
"Identity and Access"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_tcpdump_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_tcpdump_activity.json
index 306a38f5d2a28..67ab62e8d0ee5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_tcpdump_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_tcpdump_activity.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Credential Access"
],
"threat": [
{
@@ -55,5 +58,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.json
index c80f24a21d958..a1ff4bfc890a1 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -52,5 +55,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_attempt_to_disable_iptables_or_firewall.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_attempt_to_disable_iptables_or_firewall.json
index 4d4f10bbaa599..b17e4979a885c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_attempt_to_disable_iptables_or_firewall.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_attempt_to_disable_iptables_or_firewall.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_attempt_to_disable_syslog_service.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_attempt_to_disable_syslog_service.json
index 3c34b04a77a50..960000c91e4fa 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_attempt_to_disable_syslog_service.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_attempt_to_disable_syslog_service.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_azure_diagnostic_settings_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_azure_diagnostic_settings_deletion.json
index 49d98813dc040..7721790b5cf97 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_azure_diagnostic_settings_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_azure_diagnostic_settings_deletion.json
@@ -23,9 +23,10 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
- "SecOps",
"Continuous Monitoring",
+ "SecOps",
"Monitoring"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_base16_or_base32_encoding_or_decoding_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_base16_or_base32_encoding_or_decoding_activity.json
index 3cdfac92572b1..140e1ccd8e890 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_base16_or_base32_encoding_or_decoding_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_base16_or_base32_encoding_or_decoding_activity.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -55,5 +58,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_base64_encoding_or_decoding_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_base64_encoding_or_decoding_activity.json
index 2d26d867b8718..fa322fca5db8a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_base64_encoding_or_decoding_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_base64_encoding_or_decoding_activity.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -55,5 +58,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_clearing_windows_event_logs.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_clearing_windows_event_logs.json
index 60ce575148f4c..11d57b855f974 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_clearing_windows_event_logs.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_clearing_windows_event_logs.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudtrail_logging_deleted.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudtrail_logging_deleted.json
index 64261af2a3105..169f429a6dd26 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudtrail_logging_deleted.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudtrail_logging_deleted.json
@@ -25,11 +25,12 @@
"rule_id": "7024e2a0-315d-4334-bb1a-441c593e16ab",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Logging",
- "Continuous Monitoring"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudtrail_logging_suspended.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudtrail_logging_suspended.json
index 090073698026d..cbd040a7f7a30 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudtrail_logging_suspended.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudtrail_logging_suspended.json
@@ -25,11 +25,12 @@
"rule_id": "1aa8fa52-44a7-4dae-b058-f3333b91c8d7",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Logging",
- "Continuous Monitoring"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudwatch_alarm_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudwatch_alarm_deletion.json
index aeaf0a4168814..e18deb65c497b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudwatch_alarm_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cloudwatch_alarm_deletion.json
@@ -25,11 +25,12 @@
"rule_id": "f772ec8a-e182-483c-91d2-72058f76a44c",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_code_injection_conhost.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_code_injection_conhost.json
index 63c7ea12b3b6b..ed1b8978c6329 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_code_injection_conhost.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_code_injection_conhost.json
@@ -21,7 +21,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_config_service_rule_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_config_service_rule_deletion.json
index 268f52a8efd5e..b7d9321814fd7 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_config_service_rule_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_config_service_rule_deletion.json
@@ -25,11 +25,12 @@
"rule_id": "7024e2a0-315d-4334-bb1a-552d604f27bc",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_configuration_recorder_stopped.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_configuration_recorder_stopped.json
index b926937450f5a..b28572deaf204 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_configuration_recorder_stopped.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_configuration_recorder_stopped.json
@@ -25,11 +25,12 @@
"rule_id": "fbd44836-0d69-4004-a0b4-03c20370c435",
"severity": "high",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cve_2020_0601.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cve_2020_0601.json
index 2abad3c255f15..3beb71763f1ae 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cve_2020_0601.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_cve_2020_0601.json
@@ -15,7 +15,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -35,5 +38,5 @@
}
],
"type": "query",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_delete_volume_usn_journal_with_fsutil.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_delete_volume_usn_journal_with_fsutil.json
index 50213b9f1a42c..5fde3c462eded 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_delete_volume_usn_journal_with_fsutil.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_delete_volume_usn_journal_with_fsutil.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_deleting_backup_catalogs_with_wbadmin.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_deleting_backup_catalogs_with_wbadmin.json
index 026735f413eab..554ccc6972e5d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_deleting_backup_catalogs_with_wbadmin.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_deleting_backup_catalogs_with_wbadmin.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_deletion_of_bash_command_line_history.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_deletion_of_bash_command_line_history.json
index 85d8bdcb2582f..eef37499c8eb5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_deletion_of_bash_command_line_history.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_deletion_of_bash_command_line_history.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_disable_selinux_attempt.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_disable_selinux_attempt.json
index d107c0b262091..35476a76fd4b5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_disable_selinux_attempt.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_disable_selinux_attempt.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_disable_windows_firewall_rules_with_netsh.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_disable_windows_firewall_rules_with_netsh.json
index 6fbf9ca800f79..a69fde9f6a5cc 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_disable_windows_firewall_rules_with_netsh.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_disable_windows_firewall_rules_with_netsh.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_dotnet_compiler_parent_process.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_dotnet_compiler_parent_process.json
similarity index 93%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_dotnet_compiler_parent_process.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_dotnet_compiler_parent_process.json
index 0a675bd7aab74..08cbb33710b26 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_dotnet_compiler_parent_process.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_dotnet_compiler_parent_process.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_ec2_flow_log_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_ec2_flow_log_deletion.json
index 9f3d4e6b5e379..d36294684698e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_ec2_flow_log_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_ec2_flow_log_deletion.json
@@ -25,11 +25,12 @@
"rule_id": "9395fd2c-9947-4472-86ef-4aceb2f7e872",
"severity": "high",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Logging",
- "Continuous Monitoring"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_ec2_network_acl_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_ec2_network_acl_deletion.json
index 6ecc9ad3d558d..b6ac9be800807 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_ec2_network_acl_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_ec2_network_acl_deletion.json
@@ -27,11 +27,12 @@
"rule_id": "8623535c-1e17-44e1-aa97-7a0699c3037d",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Network",
- "Continuous Monitoring"
+ "Network Security"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_encoding_or_decoding_files_via_certutil.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_encoding_or_decoding_files_via_certutil.json
index 0d47aab2c64bd..f00ac3f90527b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_encoding_or_decoding_files_via_certutil.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_encoding_or_decoding_files_via_certutil.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_event_hub_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_event_hub_deletion.json
index 29df07cced4d7..d09edf473c939 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_event_hub_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_event_hub_deletion.json
@@ -24,11 +24,12 @@
"rule_id": "e0f36de1-0342-453d-95a9-a068b257b053",
"severity": "medium",
"tags": [
- "Azure",
"Elastic",
- "SecOps",
+ "Cloud",
+ "Azure",
"Continuous Monitoring",
- "Logging"
+ "SecOps",
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_office_app.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_office_app.json
index a987c00b392ec..c41b3aad2f42c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_office_app.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_office_app.json
@@ -23,7 +23,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_script.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_script.json
index 0537f27bad463..a8e16d8bda238 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_script.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_script.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_system_process.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_system_process.json
index 11fdd128475dc..60c9a317bbb6c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_system_process.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_by_system_process.json
@@ -20,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_renamed.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_renamed.json
index a90e5ebc57800..5daab573db5bd 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_renamed.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_renamed.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_unusal_process.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_unusal_process.json
index 4f353a6ff9e6f..09247d2f21323 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_unusal_process.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_msbuild_started_unusal_process.json
@@ -23,7 +23,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -43,5 +46,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_suspicious_explorer_winword.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_suspicious_explorer_winword.json
index 69d334cf13fdb..7d9f190ba7be2 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_suspicious_explorer_winword.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_suspicious_explorer_winword.json
@@ -11,13 +11,16 @@
"language": "kuery",
"license": "Elastic License",
"name": "Potential DLL SideLoading via Trusted Microsoft Programs",
- "query": "event.category:process and event.type:(start or process_started) and process.pe.original_file_name:(WinWord.exe or EXPLORER.EXE or w3wp.exe or DISM.EXE) and not (process.name:(winword.exe or WINWORD.EXE or explorer.exe or w3wp.exe or Dism.exe) or process.executable:(\"C:\\Windows\\explorer.exe\" or C\\:\\\\Program?Files\\\\Microsoft?Office\\\\root\\\\Office*\\\\WINWORD.EXE or C\\:\\\\Program?Files?\\(x86\\)\\\\Microsoft?Office\\\\root\\\\Office*\\\\WINWORD.EXE or \"C:\\Windows\\System32\\Dism.exe\" or \"C:\\Windows\\SysWOW64\\Dism.exe\" or \"C:\\Windows\\System32\\inetsrv\\w3wp.exe\"))",
+ "query": "event.category:process and event.type:(start or process_started) and (process.pe.original_file_name:(WinWord.exe or EXPLORER.EXE or w3wp.exe or DISM.EXE) or winlog.event_data.OriginalFileName:(WinWord.exe or EXPLORER.EXE or w3wp.exe or DISM.EXE)) and not (process.name:(winword.exe or WINWORD.EXE or explorer.exe or w3wp.exe or Dism.exe) or process.executable:(\"C:\\Windows\\explorer.exe\" or C\\:\\\\Program?Files\\\\Microsoft?Office\\\\root\\\\Office*\\\\WINWORD.EXE or C\\:\\\\Program?Files?\\(x86\\)\\\\Microsoft?Office\\\\root\\\\Office*\\\\WINWORD.EXE or \"C:\\Windows\\System32\\Dism.exe\" or \"C:\\Windows\\SysWOW64\\Dism.exe\" or \"C:\\Windows\\System32\\inetsrv\\w3wp.exe\"))",
"risk_score": 73,
"rule_id": "1160dcdb-0a0a-4a79-91d8-9b84616edebd",
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_via_trusted_developer_utilities.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_via_trusted_developer_utilities.json
index a1d14155cc3b3..7963c03699f78 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_via_trusted_developer_utilities.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_via_trusted_developer_utilities.json
@@ -7,7 +7,8 @@
"These programs may be used by Windows developers but use by non-engineers is unusual."
],
"index": [
- "winlogbeat-*"
+ "winlogbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -18,7 +19,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_file_deletion_via_shred.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_file_deletion_via_shred.json
index 5b02f63a1c7f7..dc73b7bc1eb76 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_file_deletion_via_shred.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_file_deletion_via_shred.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_file_mod_writable_dir.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_file_mod_writable_dir.json
index 8ee2d4fda7bf8..b97e5c1d6a182 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_file_mod_writable_dir.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_file_mod_writable_dir.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -40,5 +43,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_firewall_policy_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_firewall_policy_deletion.json
index 759fc9d5ecb1f..69a123ba678fd 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_firewall_policy_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_firewall_policy_deletion.json
@@ -22,11 +22,12 @@
"rule_id": "e02bd3ea-72c6-4181-ac2b-0f83d17ad969",
"severity": "low",
"tags": [
- "Azure",
"Elastic",
- "SecOps",
+ "Cloud",
+ "Azure",
"Continuous Monitoring",
- "Network"
+ "SecOps",
+ "Network Security"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_created.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_created.json
index b80a5f0e17949..dc08dace20bfc 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_created.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_created.json
@@ -22,6 +22,7 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_deleted.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_deleted.json
index 64c8d01df47e9..7ee5af109f37b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_deleted.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_deleted.json
@@ -22,6 +22,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_modified.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_modified.json
index b2c0e259b45e0..b4107fb9f08fd 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_modified.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_firewall_rule_modified.json
@@ -22,6 +22,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_logging_bucket_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_logging_bucket_deletion.json
index 62447b789d632..079a87b5c615b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_logging_bucket_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_logging_bucket_deletion.json
@@ -23,10 +23,11 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
- "Logging"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_logging_sink_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_logging_sink_deletion.json
index 0fc83070ffbb7..8466b618fab98 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_logging_sink_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_logging_sink_deletion.json
@@ -22,10 +22,11 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
- "Logging"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_pub_sub_subscription_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_pub_sub_subscription_deletion.json
index 2ae47140b66a5..5b87b8722595c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_pub_sub_subscription_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_pub_sub_subscription_deletion.json
@@ -22,10 +22,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
- "Logging"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_pub_sub_topic_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_pub_sub_topic_deletion.json
index f276af3e21862..5a681a35006a7 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_pub_sub_topic_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_pub_sub_topic_deletion.json
@@ -22,10 +22,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
- "Logging"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_storage_bucket_configuration_modified.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_storage_bucket_configuration_modified.json
index 3b18732137c32..5992beef9873e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_storage_bucket_configuration_modified.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_storage_bucket_configuration_modified.json
@@ -22,6 +22,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_storage_bucket_permissions_modified.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_storage_bucket_permissions_modified.json
index ad6beb9383eea..0687bb1e5178a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_storage_bucket_permissions_modified.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_gcp_storage_bucket_permissions_modified.json
@@ -22,6 +22,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_guardduty_detector_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_guardduty_detector_deletion.json
index 3910b8e4039ad..50ee5a902b144 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_guardduty_detector_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_guardduty_detector_deletion.json
@@ -25,11 +25,12 @@
"rule_id": "523116c0-d89d-4d7c-82c2-39e6845a78ef",
"severity": "high",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_hex_encoding_or_decoding_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_hex_encoding_or_decoding_activity.json
index f5345b2276e8a..6d3d6f456da4c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_hex_encoding_or_decoding_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_hex_encoding_or_decoding_activity.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -55,5 +58,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_hidden_file_dir_tmp.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_hidden_file_dir_tmp.json
index e66968a50709e..c21c15909d82a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_hidden_file_dir_tmp.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_hidden_file_dir_tmp.json
@@ -21,7 +21,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -56,5 +59,5 @@
}
],
"type": "query",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_iis_httplogging_disabled.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_iis_httplogging_disabled.json
index 507260f04d016..7d75f50856125 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_iis_httplogging_disabled.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_iis_httplogging_disabled.json
@@ -12,13 +12,16 @@
"license": "Elastic License",
"max_signals": 33,
"name": "IIS HTTP Logging Disabled",
- "query": "event.category:process and event.type:(start or process_started) and (process.name:appcmd.exe or process.pe.original_file_name:appcmd.exe) and process.args:/dontLog\\:\\\"True\\\" and not process.parent.name:iissetup.exe",
+ "query": "event.category:process and event.type:(start or process_started) and (process.name:appcmd.exe or process.pe.original_file_name:appcmd.exe or winlog.event_data.OriginalFileName:appcmd.exe) and process.args:/dontLog\\:\\\"True\\\" and not process.parent.name:iissetup.exe",
"risk_score": 73,
"rule_id": "ebf1adea-ccf2-4943-8b96-7ab11ca173a5",
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_injection_msbuild.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_injection_msbuild.json
index 9abce01769e92..7978ef9004271 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_injection_msbuild.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_injection_msbuild.json
@@ -18,7 +18,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -53,5 +56,5 @@
}
],
"type": "query",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_installutil_beacon.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_installutil_beacon.json
similarity index 67%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_installutil_beacon.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_installutil_beacon.json
index 7437bf27141ec..231ed1b36dc0f 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_installutil_beacon.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_installutil_beacon.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "InstallUtil Process Making Network Connections",
- "query": "/* this can be done without a sequence however, this does include more info on the process */\n\nsequence by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and process.name == \"installutil.exe\"]\n [network where event.type == \"connection\" and process.name == \"installutil.exe\" and network.direction == \"outgoing\"]\n",
+ "query": "/* the benefit of doing this as an eql sequence vs kql is this will limit to alerting only on the first network connection */\n\nsequence by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and process.name : \"installutil.exe\"]\n [network where event.type == \"connection\" and process.name : \"installutil.exe\" and network.direction == \"outgoing\"]\n",
"risk_score": 21,
"rule_id": "a13167f1-eec2-4015-9631-1fee60406dcf",
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_kernel_module_removal.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_kernel_module_removal.json
index ad751a1031437..5c38974b46525 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_kernel_module_removal.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_kernel_module_removal.json
@@ -23,7 +23,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -58,5 +61,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_as_elastic_endpoint_process.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_as_elastic_endpoint_process.json
index 8b7ef47443e2f..163c7e834ba34 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_as_elastic_endpoint_process.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_as_elastic_endpoint_process.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_renamed_autoit.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_renamed_autoit.json
index cc964bfdd3e92..be83f8c41a2ea 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_renamed_autoit.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_renamed_autoit.json
@@ -11,13 +11,16 @@
"language": "lucene",
"license": "Elastic License",
"name": "Renamed AutoIt Scripts Interpreter",
- "query": "event.category:process AND event.type:(start OR process_started) AND process.pe.original_file_name:/[aA][uU][tT][oO][iI][tT]\\d\\.[eE][xX][eE]/ AND NOT process.name:/[aA][uU][tT][oO][iI][tT]\\d{1,3}\\.[eE][xX][eE]/",
+ "query": "event.category:process AND event.type:(start OR process_started) AND (process.pe.original_file_name:/[aA][uU][tT][oO][iI][tT]\\d\\.[eE][xX][eE]/ OR winlog.event_data.OriginalFileName:/[aA][uU][tT][oO][iI][tT]\\d\\.[eE][xX][eE]/) AND NOT process.name:/[aA][uU][tT][oO][iI][tT]\\d{1,3}\\.[eE][xX][eE]/",
"risk_score": 47,
"rule_id": "2e1e835d-01e5-48ca-b9fc-7a61f7f11902",
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_suspicious_werfault_childproc.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_suspicious_werfault_childproc.json
index 3000e7ac86daa..df0ecf1d534a1 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_suspicious_werfault_childproc.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_suspicious_werfault_childproc.json
@@ -24,7 +24,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_werfault.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_werfault.json
index db421146085ff..9f5615d466374 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_werfault.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_masquerading_werfault.json
@@ -24,7 +24,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_misc_lolbin_connecting_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_misc_lolbin_connecting_to_the_internet.json
index 5b5f69a0aef74..3d87720818ff5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_misc_lolbin_connecting_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_misc_lolbin_connecting_to_the_internet.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -52,5 +55,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_modification_of_boot_config.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_modification_of_boot_config.json
index 6025fc5ca6452..84ccc52249622 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_modification_of_boot_config.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_modification_of_boot_config.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_msbuild_beacon_sequence.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_msbuild_beacon_sequence.json
similarity index 79%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_msbuild_beacon_sequence.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_msbuild_beacon_sequence.json
index 59295c3735a3a..0740e26d3bba6 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_msbuild_beacon_sequence.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_msbuild_beacon_sequence.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "MsBuild Network Connection Sequence",
- "query": "sequence by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and process.name == \"MSBuild.exe\"]\n [network where process.name == \"MSBuild.exe\" and\n not (destination.address == \"127.0.0.1\" and source.address == \"127.0.0.1\")]\n",
+ "query": "sequence by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and process.name : \"MSBuild.exe\"]\n [network where process.name : \"MSBuild.exe\" and\n not (destination.ip == \"127.0.0.1\" and source.ip == \"127.0.0.1\")]\n",
"risk_score": 21,
"rule_id": "9dc6ed5d-62a9-4feb-a903-fafa1d33b8e9",
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_mshta_beacon.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_mshta_beacon.json
similarity index 69%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_mshta_beacon.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_mshta_beacon.json
index 105f536628777..fd19942a33d48 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_mshta_beacon.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_mshta_beacon.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "Mshta Making Network Connections",
- "query": "sequence by process.entity_id with maxspan=2h\n [process where event.type in (\"start\", \"process_started\") and process.name == \"mshta.exe\" and\n process.parent.name != \"Microsoft.ConfigurationManagement.exe\" and\n process.parent.executable not in (\"C:\\\\Amazon\\\\Amazon Assistant\\\\amazonAssistantService.exe\",\n \"C:\\\\TeamViewer\\\\TeamViewer.exe\") and\n process.args != \"ADSelfService_Enroll.hta\"]\n [network where process.name == \"mshta.exe\"]\n",
+ "query": "sequence by process.entity_id with maxspan=2h\n [process where event.type in (\"start\", \"process_started\") and process.name : \"mshta.exe\" and\n not process.parent.name : \"Microsoft.ConfigurationManagement.exe\" and\n not (process.parent.executable : \"C:\\\\Amazon\\\\Amazon Assistant\\\\amazonAssistantService.exe\" or\n process.parent.executable : \"C:\\\\TeamViewer\\\\TeamViewer.exe\") and\n not process.args : \"ADSelfService_Enroll.hta\"]\n [network where process.name : \"mshta.exe\"]\n",
"risk_score": 21,
"rule_id": "c2d90150-0133-451c-a783-533e736c12d7",
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_msxsl_beacon.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_msxsl_beacon.json
similarity index 79%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_msxsl_beacon.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_msxsl_beacon.json
index 27704b3e182ed..c188387304214 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_msxsl_beacon.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_msxsl_beacon.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "MsXsl Making Network Connections",
- "query": "sequence by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and process.name == \"msxsl.exe\"]\n [network where event.type == \"connection\" and process.name == \"msxsl.exe\" and network.direction == \"outgoing\"]\n",
+ "query": "sequence by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and process.name : \"msxsl.exe\"]\n [network where event.type == \"connection\" and process.name : \"msxsl.exe\" and network.direction == \"outgoing\"]\n",
"risk_score": 21,
"rule_id": "870d1753-1078-403e-92d4-735f142edcca",
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_network_connection_from_windows_binary.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_network_connection_from_windows_binary.json
new file mode 100644
index 0000000000000..4e1d0cad0b5da
--- /dev/null
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_network_connection_from_windows_binary.json
@@ -0,0 +1,44 @@
+{
+ "author": [
+ "Elastic"
+ ],
+ "description": "Identifies network activity from unexpected system applications. This may indicate adversarial activity as these applications are often leveraged by adversaries to execute code and evade detection.",
+ "from": "now-9m",
+ "index": [
+ "logs-endpoint.events.*",
+ "winlogbeat-*"
+ ],
+ "language": "eql",
+ "license": "Elastic License",
+ "name": "Unusual Network Activity from a Windows System Binary",
+ "query": "sequence by process.entity_id with maxspan=5m\n [process where event.type in (\"start\", \"process_started\") and\n\n /* known applocker bypasses */\n (process.name : \"bginfo.exe\" or\n process.name : \"cdb.exe\" or\n process.name : \"control.exe\" or\n process.name : \"cmstp.exe\" or\n process.name : \"csi.exe\" or\n process.name : \"dnx.exe\" or\n process.name : \"fsi.exe\" or\n process.name : \"ieexec.exe\" or\n process.name : \"iexpress.exe\" or\n process.name : \"installutil.exe\" or\n process.name : \"Microsoft.Workflow.Compiler.exe\" or\n process.name : \"MSBuild.exe\" or\n process.name : \"msdt.exe\" or\n process.name : \"mshta.exe\" or\n process.name : \"msiexec.exe\" or\n process.name : \"msxsl.exe\" or\n process.name : \"odbcconf.exe\" or\n process.name : \"rcsi.exe\" or\n process.name : \"regsvr32.exe\" or\n process.name : \"xwizard.exe\")]\n [network where event.type == \"connection\" and\n (process.name : \"bginfo.exe\" or\n process.name : \"cdb.exe\" or\n process.name : \"control.exe\" or\n process.name : \"cmstp.exe\" or\n process.name : \"csi.exe\" or\n process.name : \"dnx.exe\" or\n process.name : \"fsi.exe\" or\n process.name : \"ieexec.exe\" or\n process.name : \"iexpress.exe\" or\n process.name : \"installutil.exe\" or\n process.name : \"Microsoft.Workflow.Compiler.exe\" or\n process.name : \"MSBuild.exe\" or\n process.name : \"msdt.exe\" or\n process.name : \"mshta.exe\" or\n process.name : \"msiexec.exe\" or\n process.name : \"msxsl.exe\" or\n process.name : \"odbcconf.exe\" or\n process.name : \"rcsi.exe\" or\n process.name : \"regsvr32.exe\" or\n process.name : \"xwizard.exe\")]\n",
+ "risk_score": 21,
+ "rule_id": "1fe3b299-fbb5-4657-a937-1d746f2c711a",
+ "severity": "medium",
+ "tags": [
+ "Elastic",
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
+ ],
+ "threat": [
+ {
+ "framework": "MITRE ATT&CK",
+ "tactic": {
+ "id": "TA0005",
+ "name": "Defense Evasion",
+ "reference": "https://attack.mitre.org/tactics/TA0005/"
+ },
+ "technique": [
+ {
+ "id": "T1127",
+ "name": "Trusted Developer Utilities Proxy Execution",
+ "reference": "https://attack.mitre.org/techniques/T1127/"
+ }
+ ]
+ }
+ ],
+ "type": "eql",
+ "version": 1
+}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_network_watcher_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_network_watcher_deletion.json
index 09bbba5a049e4..0e6d9172eb2c1 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_network_watcher_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_network_watcher_deletion.json
@@ -23,10 +23,11 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
- "SecOps",
"Continuous Monitoring",
- "Network"
+ "SecOps",
+ "Network Security"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_reg_beacon.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_reg_beacon.json
similarity index 66%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_reg_beacon.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_reg_beacon.json
index 332c719eaa41d..aa4f9985f6e2c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_reg_beacon.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_reg_beacon.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "Registration Tool Making Network Connections",
- "query": "sequence by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and\n process.name in (\"regasm.exe\", \"regsvcs.exe\", \"regsvr32.exe\")]\n [network where event.type == \"connection\" and process.name in (\"regasm.exe\", \"regsvcs.exe\", \"regsvr32.exe\")]\nuntil\n [process where event.type == \"end\" and process.name in (\"regasm.exe\", \"regsvcs.exe\", \"regsvr32.exe\")]\n",
+ "query": "sequence by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and\n (process.name : \"RegAsm.exe\" or process.name : \"regsvcs.exe\" or process.name : \"regsvr32.exe\")]\n [network where event.type == \"connection\" and\n (process.name : \"RegAsm.exe\" or process.name : \"regsvcs.exe\" or process.name : \"regsvr32.exe\")]\nuntil\n [process where event.type == \"end\" and\n (process.name : \"RegAsm.exe\" or process.name : \"regsvcs.exe\" or process.name : \"regsvr32.exe\")]\n",
"risk_score": 21,
"rule_id": "6d3456a5-4a42-49d1-aaf2-7b1fd475b2c6",
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/evasion_rundll32_no_arguments.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_rundll32_no_arguments.json
similarity index 61%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/evasion_rundll32_no_arguments.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_rundll32_no_arguments.json
index 06fad7e0f630b..2950b792219b6 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/evasion_rundll32_no_arguments.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_rundll32_no_arguments.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "Unusual Child Processes of RunDLL32",
- "query": "sequence with maxspan=1h\n [process where event.type in (\"start\", \"process_started\") and\n (process.name == \"rundll32.exe\" or process.pe.original_file_name == \"rundll32.exe\") and\n\n /* zero arguments excluding the binary itself (and accounting for when the binary may not be logged in args) */\n ((process.args == \"rundll32.exe\" and process.args_count == 1) or\n (process.args != \"rundll32.exe\" and process.args_count == 0))\n\n ] by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and\n (process.name == \"rundll32.exe\" or process.pe.original_file_name == \"rundll32.exe\")\n ] by process.parent.entity_id\n",
+ "query": "sequence with maxspan=1h\n [process where event.type in (\"start\", \"process_started\") and\n /* uncomment once in winlogbeat */\n (process.name : \"rundll32.exe\" /* or process.pe.original_file_name == \"RUNDLL32.EXE\" */ ) and\n process.args_count < 2\n ] by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and\n /* uncomment once in winlogbeat */\n (process.name : \"rundll32.exe\" /* or process.pe.original_file_name == \"RUNDLL32.EXE\" */ )\n ] by process.parent.entity_id\n",
"risk_score": 21,
"rule_id": "f036953a-4615-4707-a1ca-dc53bf69dcd5",
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_rundll32_sequence.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_rundll32_sequence.json
similarity index 67%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_rundll32_sequence.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_rundll32_sequence.json
index 6f465325039a6..c022d0a603858 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/c2_rundll32_sequence.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_rundll32_sequence.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "Unusual Network Connection Sequence via RunDLL32",
- "query": "sequence by process.entity_id with maxspan=2h\n [process where event.type in (\"start\", \"process_started\") and\n (process.name == \"rundll32.exe\" or process.pe.original_file_name == \"rundll32.exe\") and\n\n /* zero arguments excluding the binary itself (and accounting for when the binary may not be logged in args) */\n ((process.args == \"rundll32.exe\" and process.args_count == 1) or\n (process.args != \"rundll32.exe\" and process.args_count == 0))]\n\n [network where event.type == \"connection\" and\n (process.name == \"rundll32.exe\" or process.pe.original_file_name == \"rundll32.exe\")]\n",
+ "query": "sequence by process.entity_id with maxspan=2h\n [process where event.type in (\"start\", \"process_started\") and\n /* uncomment once in winlogbeat */\n (process.name : \"rundll32.exe\" /* or process.pe.original_file_name == \"RUNDLL32.EXE\" */ ) and\n process.args_count < 2]\n [network where event.type == \"connection\" and\n /* uncomment once in winlogbeat */\n (process.name : \"rundll32.exe\" /* or process.pe.original_file_name == \"RUNDLL32.EXE\" */ )]\n",
"risk_score": 21,
"rule_id": "2b347f66-6739-4ae3-bd94-195036dde8b3",
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_s3_bucket_configuration_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_s3_bucket_configuration_deletion.json
index adbe310b784e5..6cfdf40781397 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_s3_bucket_configuration_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_s3_bucket_configuration_deletion.json
@@ -28,11 +28,12 @@
"rule_id": "227dc608-e558-43d9-b521-150772250bae",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Asset Visibility",
- "Continuous Monitoring"
+ "Asset Visibility"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_sdelete_like_filename_rename.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_sdelete_like_filename_rename.json
index ec3030d44ff29..6fea9a3c78945 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_sdelete_like_filename_rename.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_sdelete_like_filename_rename.json
@@ -18,7 +18,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_managedcode_host_process.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_managedcode_host_process.json
index 1bb3f26c0298f..85eac81808a71 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_managedcode_host_process.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_managedcode_host_process.json
@@ -20,7 +20,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_suspicious_okta_user_password_reset_or_unlock_attempts.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_okta_user_password_reset_or_unlock_attempts.json
similarity index 99%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_suspicious_okta_user_password_reset_or_unlock_attempts.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_okta_user_password_reset_or_unlock_attempts.json
index 5f115416fa032..fedeaca68ab64 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/credential_access_suspicious_okta_user_password_reset_or_unlock_attempts.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_okta_user_password_reset_or_unlock_attempts.json
@@ -25,6 +25,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Identity",
"Okta",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/evasion_suspicious_scrobj_load.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_scrobj_load.json
similarity index 51%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/evasion_suspicious_scrobj_load.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_scrobj_load.json
index 7880b86533b53..16364f590cd0e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/evasion_suspicious_scrobj_load.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_scrobj_load.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "Windows Suspicious Script Object Execution",
- "query": "sequence by process.entity_id with maxspan=2m\n [process where event.type in (\"start\", \"process_started\") and\n /* process.code_signature.* fields need to be populated for 7.10 */\n process.code_signature.subject_name == \"Microsoft Corporation\" and process.code_signature.trusted == true and\n process.name not in (\"cscript.exe\",\n \"iexplore.exe\",\n \"MicrosoftEdge.exe\",\n \"msiexec.exe\",\n \"smartscreen.exe\",\n \"taskhostw.exe\",\n \"w3wp.exe\",\n \"wscript.exe\")]\n [library where event.type == \"start\" and file.name == \"scrobj.dll\"]\n",
+ "query": "/* add winlogbeat-* when process.code_signature.* fields are populated */\n\nsequence by process.entity_id with maxspan=2m\n [process where event.type in (\"start\", \"process_started\") and\n /* uncomment once in winlogbeat */\n /* process.code_signature.subject_name == \"Microsoft Corporation\" and process.code_signature.trusted == true and */\n not (process.name : \"cscript.exe\" or\n process.name : \"iexplore.exe\" or\n process.name : \"MicrosoftEdge.exe\" or\n process.name : \"msiexec.exe\" or\n process.name : \"smartscreen.exe\" or\n process.name : \"taskhostw.exe\" or\n process.name : \"w3wp.exe\" or\n process.name : \"wscript.exe\")]\n [library where event.type == \"start\" and file.name : \"scrobj.dll\"]\n",
"risk_score": 21,
"rule_id": "4ed678a9-3a4f-41fb-9fea-f85a6e0a0dff",
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/evasion_suspicious_wmi_script.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_wmi_script.json
similarity index 59%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/evasion_suspicious_wmi_script.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_wmi_script.json
index 943471f5801c2..e922416264359 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/evasion_suspicious_wmi_script.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_wmi_script.json
@@ -5,19 +5,21 @@
"description": "Identifies WMIC whitelisting bypass techniques by alerting on suspicious execution of scripts. When WMIC loads scripting libraries it may be indicative of a whitelist bypass.",
"from": "now-9m",
"index": [
- "logs-endpoint.events.*",
- "winlogbeat-*"
+ "logs-endpoint.events.*"
],
"language": "eql",
"license": "Elastic License",
"name": "Suspicious WMIC XSL Script Execution",
- "query": "/* lots of wildcards in the args\n need to verify args cleanup is accurate\n*/\n\nsequence by process.entity_id with maxspan=2m\n[process where event.type in (\"start\", \"process_started\") and\n (process.name == \"wmic.exe\" or process.pe.original_file_name == \"wmic.exe\") and\n wildcard(process.args, \"format*:*\", \"/format*:*\", \"*-format*:*\") and\n not process.args in (\"/format:table\", \"/format:table\") or wildcard(process.args, \"format*:*\")]\n[library where event.type == \"start\" and file.name in (\"jscript.dll\", \"vbscript.dll\")]\n",
+ "query": "sequence by process.entity_id with maxspan=2m\n[process where event.type in (\"start\", \"process_started\") and\n (process.name : \"WMIC.exe\" or process.pe.original_file_name == \"wmic.exe\") and\n wildcard(process.args, \"format*:*\", \"/format*:*\", \"*-format*:*\") and\n not wildcard(process.command_line, \"* /format:table *\")]\n[library where event.type == \"start\" and file.name in (\"jscript.dll\", \"vbscript.dll\")]\n",
"risk_score": 21,
"rule_id": "7f370d54-c0eb-4270-ac5a-9a6020585dc6",
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_zoom_child_process.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_zoom_child_process.json
index 7b08f5a565424..f3c20e5251184 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_zoom_child_process.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_suspicious_zoom_child_process.json
@@ -20,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_system_critical_proc_abnormal_file_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_system_critical_proc_abnormal_file_activity.json
index 6fea3a75c8e62..31702332d7cd4 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_system_critical_proc_abnormal_file_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_system_critical_proc_abnormal_file_activity.json
@@ -17,7 +17,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_unusual_system_vp_child_program.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_unusual_system_vp_child_program.json
index 4efec948f49a7..65439d6d653b6 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_unusual_system_vp_child_program.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_unusual_system_vp_child_program.json
@@ -17,7 +17,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_via_filter_manager.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_via_filter_manager.json
index 210e9c778afef..3092ea653aa4b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_via_filter_manager.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_via_filter_manager.json
@@ -4,7 +4,8 @@
],
"description": "The Filter Manager Control Program (fltMC.exe) binary may be abused by adversaries to unload a filter driver and evade defenses.",
"index": [
- "winlogbeat-*"
+ "winlogbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -15,7 +16,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_volume_shadow_copy_deletion_via_vssadmin.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_volume_shadow_copy_deletion_via_vssadmin.json
index 8a504281b03f7..493ee919000dc 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_volume_shadow_copy_deletion_via_vssadmin.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_volume_shadow_copy_deletion_via_vssadmin.json
@@ -17,7 +17,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_volume_shadow_copy_deletion_via_wmic.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_volume_shadow_copy_deletion_via_wmic.json
index 2ae938bb34104..49a68f4bfcf66 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_volume_shadow_copy_deletion_via_wmic.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_volume_shadow_copy_deletion_via_wmic.json
@@ -17,7 +17,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Defense Evasion"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_waf_acl_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_waf_acl_deletion.json
index 32101029fb107..86ed9e2f9c042 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_waf_acl_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_waf_acl_deletion.json
@@ -25,11 +25,12 @@
"rule_id": "91d04cd4-47a9-4334-ab14-084abe274d49",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Network",
- "Continuous Monitoring"
+ "Network Security"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_waf_rule_or_rule_group_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_waf_rule_or_rule_group_deletion.json
index a08c05d0d6ca7..302e89d416f4b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_waf_rule_or_rule_group_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_waf_rule_or_rule_group_deletion.json
@@ -25,11 +25,12 @@
"rule_id": "5beaebc1-cc13-4bfc-9949-776f9e0dc318",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Network",
- "Continuous Monitoring"
+ "Network Security"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_blob_container_access_mod.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_blob_container_access_mod.json
index 7e601c9928d08..16db02338de55 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_blob_container_access_mod.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_blob_container_access_mod.json
@@ -23,9 +23,10 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
- "SecOps",
"Continuous Monitoring",
+ "SecOps",
"Asset Visibility"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_kernel_module_enumeration.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_kernel_module_enumeration.json
index af9c4b5409964..f2681f5501af0 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_kernel_module_enumeration.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_kernel_module_enumeration.json
@@ -20,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Discovery"
],
"threat": [
{
@@ -40,5 +43,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_net_command_system_account.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_net_command_system_account.json
index 96c300cfde016..682434f28f745 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_net_command_system_account.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_net_command_system_account.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Discovery"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_post_exploitation_public_ip_reconnaissance.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_post_exploitation_public_ip_reconnaissance.json
index 952d70ee3589a..36e95cf4ade41 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_post_exploitation_public_ip_reconnaissance.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_post_exploitation_public_ip_reconnaissance.json
@@ -24,8 +24,8 @@
"tags": [
"Elastic",
"Network",
- "Threat Detection, Preventing and Hunting",
- "Post-Execution"
+ "Threat Detection",
+ "Discovery"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_process_discovery_via_tasklist_command.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_process_discovery_via_tasklist_command.json
index c2d95de4129f9..59ddc00d6525d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_process_discovery_via_tasklist_command.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_process_discovery_via_tasklist_command.json
@@ -7,7 +7,8 @@
"Administrators may use the tasklist command to display a list of currently running processes. By itself, it does not indicate malicious activity. After obtaining a foothold, it's possible adversaries may use discovery commands like tasklist to get information about running processes."
],
"index": [
- "winlogbeat-*"
+ "winlogbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -18,7 +19,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Discovery"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_virtual_machine_fingerprinting.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_virtual_machine_fingerprinting.json
index d913a92e2ee0e..66b744667f568 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_virtual_machine_fingerprinting.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_virtual_machine_fingerprinting.json
@@ -20,7 +20,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Discovery"
],
"threat": [
{
@@ -40,5 +43,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_whoami_command_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_whoami_command_activity.json
index cb330879be9b3..2e577e44c960e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_whoami_command_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_whoami_command_activity.json
@@ -7,7 +7,8 @@
"Some normal use of this program, at varying levels of frequency, may originate from scripts, automation tools and frameworks. Usage by non-engineers and ordinary users is unusual."
],
"index": [
- "winlogbeat-*"
+ "winlogbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -18,7 +19,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Discovery"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_whoami_commmand.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_whoami_commmand.json
index a8b34362d9579..ddf309b377609 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_whoami_commmand.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/discovery_whoami_commmand.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Discovery"
],
"threat": [
{
@@ -40,5 +43,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint.json
index f3acc5d3a2b5e..d6e7419391f9c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/elastic_endpoint.json
@@ -60,7 +60,7 @@
],
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"timestamp_override": "event.ingested",
"type": "query",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_adversary_behavior_detected.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_adversary_behavior_detected.json
index b3bac305bc1f1..8084067b3a6d2 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_adversary_behavior_detected.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_adversary_behavior_detected.json
@@ -17,7 +17,7 @@
"severity": "medium",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_dumping_detected.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_dumping_detected.json
index 2f91c1fe813f9..9c28d065b322d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_dumping_detected.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_dumping_detected.json
@@ -17,7 +17,7 @@
"severity": "high",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_dumping_prevented.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_dumping_prevented.json
index 75488c2d3a5ed..352712e38f42d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_dumping_prevented.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_dumping_prevented.json
@@ -17,7 +17,7 @@
"severity": "medium",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_manipulation_detected.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_manipulation_detected.json
index adc29d9106774..259bcd51aeb3e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_manipulation_detected.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_manipulation_detected.json
@@ -17,7 +17,7 @@
"severity": "high",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_manipulation_prevented.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_manipulation_prevented.json
index 99def69978a48..19348062b10f1 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_manipulation_prevented.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_cred_manipulation_prevented.json
@@ -17,7 +17,7 @@
"severity": "medium",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_exploit_detected.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_exploit_detected.json
index 80eb3ce637f30..2fd3aaa0d8a57 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_exploit_detected.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_exploit_detected.json
@@ -17,7 +17,7 @@
"severity": "high",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_exploit_prevented.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_exploit_prevented.json
index 50444904654de..8f90e1162546b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_exploit_prevented.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_exploit_prevented.json
@@ -17,7 +17,7 @@
"severity": "medium",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_malware_detected.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_malware_detected.json
index bb2ddf92a83e7..3d740f8b7064f 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_malware_detected.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_malware_detected.json
@@ -17,7 +17,7 @@
"severity": "critical",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_malware_prevented.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_malware_prevented.json
index fae8a3a0ab5a6..33195c7fcbecc 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_malware_prevented.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_malware_prevented.json
@@ -17,7 +17,7 @@
"severity": "high",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_permission_theft_detected.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_permission_theft_detected.json
index 821c3b0d8a63b..fac13a6d358dd 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_permission_theft_detected.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_permission_theft_detected.json
@@ -17,7 +17,7 @@
"severity": "high",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_permission_theft_prevented.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_permission_theft_prevented.json
index e38afe19e7d38..a2d8700076c23 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_permission_theft_prevented.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_permission_theft_prevented.json
@@ -17,7 +17,7 @@
"severity": "medium",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_process_injection_detected.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_process_injection_detected.json
index 52eb3c2d96bf7..ef4f29067b0c5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_process_injection_detected.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_process_injection_detected.json
@@ -17,7 +17,7 @@
"severity": "high",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_process_injection_prevented.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_process_injection_prevented.json
index 76aff15e1588c..b22751e35c053 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_process_injection_prevented.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_process_injection_prevented.json
@@ -17,7 +17,7 @@
"severity": "medium",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_ransomware_detected.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_ransomware_detected.json
index 29efdd910904d..3b973f42bbca5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_ransomware_detected.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_ransomware_detected.json
@@ -17,7 +17,7 @@
"severity": "critical",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_ransomware_prevented.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_ransomware_prevented.json
index c603e503c5dad..b6458b73e8015 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_ransomware_prevented.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/endpoint_ransomware_prevented.json
@@ -17,7 +17,7 @@
"severity": "high",
"tags": [
"Elastic",
- "Endpoint"
+ "Endpoint Security"
],
"type": "query",
"version": 4
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/escalation_uac_sdclt.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/escalation_uac_sdclt.json
deleted file mode 100644
index 843ba3401b4e4..0000000000000
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/escalation_uac_sdclt.json
+++ /dev/null
@@ -1,41 +0,0 @@
-{
- "author": [
- "Elastic"
- ],
- "description": "Identifies User Account Control (UAC) bypass via sdclt.exe. Attackers bypass UAC to stealthily execute code with elevated permissions.",
- "from": "now-9m",
- "index": [
- "logs-endpoint.events.*",
- "winlogbeat-*"
- ],
- "language": "eql",
- "license": "Elastic License",
- "name": "Bypass UAC via Sdclt",
- "query": "sequence with maxspan=1m\n [process where event.type in (\"start\", \"process_started\") and process.name == \"sdclt.exe\" and\n /* process.code_signature.* fields need to be populated for 7.10 */\n process.code_signature.subject_name == \"Microsoft Corporation\" and process.code_signature.trusted == true and\n process.args == \"/kickoffelev\"\n ] by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and process.parent.name == \"sdclt.exe\" and\n process.executable not in (\"C:\\\\Windows\\\\System32\\\\sdclt.exe\",\n \"C:\\\\Windows\\\\System32\\\\control.exe\",\n \"C:\\\\Windows\\\\SysWOW64\\\\sdclt.exe\",\n \"C:\\\\Windows\\\\SysWOW64\\\\control.exe\")\n ] by process.parent.entity_id\n",
- "risk_score": 21,
- "rule_id": "9b54e002-034a-47ac-9307-ad12c03fa900",
- "severity": "high",
- "tags": [
- "Elastic",
- "Windows"
- ],
- "threat": [
- {
- "framework": "MITRE ATT&CK",
- "tactic": {
- "id": "TA0004",
- "name": "Privilege Escalation",
- "reference": "https://attack.mitre.org/tactics/TA0004/"
- },
- "technique": [
- {
- "id": "T1088",
- "name": "Bypass User Account Control",
- "reference": "https://attack.mitre.org/techniques/T1088/"
- }
- ]
- }
- ],
- "type": "eql",
- "version": 1
-}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_prompt_connecting_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_prompt_connecting_to_the_internet.json
index e9989fe50019e..d73b1a4cab008 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_prompt_connecting_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_prompt_connecting_to_the_internet.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_powershell.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_powershell.json
index bb252b1416832..220a7f94dce9a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_powershell.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_powershell.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_svchost.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_svchost.json
index aeae5518fece1..d6b1e67b11982 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_svchost.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_svchost.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_unusual_process.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_unusual_process.json
index 577bee1ffe6de..566a5963c122a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_unusual_process.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_shell_started_by_unusual_process.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_virtual_machine.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_virtual_machine.json
index 5e7852e1c1b13..31c4d488c6960 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_virtual_machine.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_command_virtual_machine.json
@@ -24,11 +24,12 @@
"rule_id": "60884af6-f553-4a6c-af13-300047455491",
"severity": "medium",
"tags": [
- "Azure",
"Elastic",
- "SecOps",
+ "Cloud",
+ "Azure",
"Continuous Monitoring",
- "Logging"
+ "SecOps",
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_html_help_executable_program_connecting_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_html_help_executable_program_connecting_to_the_internet.json
index 963c6b2e53ed6..d33f2287c7d8b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_html_help_executable_program_connecting_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_html_help_executable_program_connecting_to_the_internet.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
@@ -52,5 +55,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_local_service_commands.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_local_service_commands.json
index 7b20cefdc67f0..693ca83e387b3 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_local_service_commands.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_local_service_commands.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_ms_office_written_file.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_ms_office_written_file.json
index 35d7a7c969ee7..2db46080a4e75 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_ms_office_written_file.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_ms_office_written_file.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "Execution of File Written or Modified by Microsoft Office",
- "query": "sequence with maxspan=2h\n [file where event.type != \"delete\" and file.extension == \"exe\" and\n process.name in (\"winword.exe\",\n \"excel.exe\",\n \"outlook.exe\",\n \"powerpnt.exe\",\n \"eqnedt32.exe\",\n \"fltldr.exe\",\n \"mspub.exe\",\n \"msaccess.exe\")\n ] by host.id, file.path\n [process where event.type in (\"start\", \"process_started\")] by host.id, process.executable\n",
+ "query": "sequence with maxspan=2h\n [file where event.type != \"deletion\" and file.extension : \"exe\" and\n (process.name : \"WINWORD.EXE\" or\n process.name : \"EXCEL.EXE\" or\n process.name : \"OUTLOOK.EXE\" or\n process.name : \"POWERPNT.EXE\" or\n process.name : \"eqnedt32.exe\" or\n process.name : \"fltldr.exe\" or\n process.name : \"MSPUB.EXE\" or\n process.name : \"MSACCESS.EXE\")\n ] by host.id, file.path\n [process where event.type in (\"start\", \"process_started\")] by host.id, process.executable\n",
"risk_score": 21,
"rule_id": "0d8ad79f-9025-45d8-80c1-4f0cd3c5e8e5",
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_msbuild_making_network_connections.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_msbuild_making_network_connections.json
index fcbbfbdb3d686..7fd2933fe46f1 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_msbuild_making_network_connections.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_msbuild_making_network_connections.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_mshta_making_network_connections.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_mshta_making_network_connections.json
index 7af823070889f..9b863c2ed5ee4 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_mshta_making_network_connections.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_mshta_making_network_connections.json
@@ -20,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
@@ -40,5 +43,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_msxsl_network.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_msxsl_network.json
index 1dc75575636fb..17987218af0ae 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_msxsl_network.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_msxsl_network.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_pdf_written_file.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_pdf_written_file.json
index 3963b3d594902..a807052cf7b0d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_pdf_written_file.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_pdf_written_file.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "Execution of File Written or Modified by PDF Reader",
- "query": "sequence with maxspan=2h\n [file where event.type != \"delete\" and file.extension == \"exe\" and\n process.name in (\"acrord32.exe\", \"rdrcef.exe\", \"foxitphantomPDF.exe\", \"foxitreader.exe\") and\n file.name not in (\"foxitphantomPDF.exe\",\n \"FoxitPhantomPDFUpdater.exe\",\n \"foxitreader.exe\",\n \"FoxitReaderUpdater.exe\",\n \"acrord32.exe\",\n \"rdrcef.exe\")\n ] by host.id, file.path\n [process where event.type in (\"start\", \"process_started\")] by host.id, process.executable\n",
+ "query": "sequence with maxspan=2h\n [file where event.type != \"deletion\" and file.extension : \"exe\" and\n (process.name : \"AcroRd32.exe\" or\n process.name : \"rdrcef.exe\" or\n process.name : \"FoxitPhantomPDF.exe\" or\n process.name : \"FoxitReader.exe\") and\n not (file.name : \"FoxitPhantomPDF.exe\" or\n file.name : \"FoxitPhantomPDFUpdater.exe\" or\n file.name : \"FoxitReader.exe\" or\n file.name : \"FoxitReaderUpdater.exe\" or\n file.name : \"AcroRd32.exe\" or\n file.name : \"rdrcef.exe\")\n ] by host.id, file.path\n [process where event.type in (\"start\", \"process_started\")] by host.id, process.executable\n",
"risk_score": 21,
"rule_id": "1defdd62-cd8d-426e-a246-81a37751bb2b",
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_perl_tty_shell.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_perl_tty_shell.json
index 4502f42bbb4c4..ee6cee941bef2 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_perl_tty_shell.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_perl_tty_shell.json
@@ -17,7 +17,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_psexec_lateral_movement_command.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_psexec_lateral_movement_command.json
index f647d8d00e084..8505a837ad591 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_psexec_lateral_movement_command.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_psexec_lateral_movement_command.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
@@ -55,5 +58,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_python_tty_shell.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_python_tty_shell.json
index 0e8b5f0218d00..151c3fbb8df46 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_python_tty_shell.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_python_tty_shell.json
@@ -17,7 +17,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_register_server_program_connecting_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_register_server_program_connecting_to_the_internet.json
index 899bb1c20e711..bf1a30f11137e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_register_server_program_connecting_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_register_server_program_connecting_to_the_internet.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_script_executing_powershell.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_script_executing_powershell.json
index 6d7f11f01fae0..843cf322e5849 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_script_executing_powershell.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_script_executing_powershell.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_ms_office_child_process.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_ms_office_child_process.json
index 005a0c38c8a8b..90c60ceea37ab 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_ms_office_child_process.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_ms_office_child_process.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_ms_outlook_child_process.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_ms_outlook_child_process.json
index 74e21c7d17479..d5ee8fa818367 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_ms_outlook_child_process.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_ms_outlook_child_process.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_pdf_reader.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_pdf_reader.json
index adf1a76bfb901..bf37f5a803e58 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_pdf_reader.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_pdf_reader.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_suspicious_psexesvc.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_psexesvc.json
similarity index 76%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_suspicious_psexesvc.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_psexesvc.json
index 51396fb5995f6..205b5148f2fb4 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_execution_suspicious_psexesvc.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_suspicious_psexesvc.json
@@ -11,13 +11,16 @@
"language": "kuery",
"license": "Elastic License",
"name": "Suspicious Process Execution via Renamed PsExec Executable",
- "query": "event.category:process and event.type:(start or process_started) and process.pe.original_file_name:(psexesvc.exe or PSEXESVC.exe) and process.parent.name:services.exe and not process.name:(psexesvc.exe or PSEXESVC.exe)",
+ "query": "event.category:process and event.type:(start or process_started) and (process.pe.original_file_name:(psexesvc.exe or PSEXESVC.exe) or winlog.event_data.OriginalFileName:(psexesvc.exe or PSEXESVC.exe)) and process.parent.name:services.exe and not process.name:(psexesvc.exe or PSEXESVC.exe)",
"risk_score": 47,
"rule_id": "e2f9fdf5-8076-45ad-9427-41e0e03dc9c2",
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_dns_service_children.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_dns_service_children.json
index 96305b2197bfc..52e67b0c7bcff 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_dns_service_children.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_dns_service_children.json
@@ -7,7 +7,8 @@
"Werfault.exe will legitimately spawn when dns.exe crashes, but the DNS service is very stable and so this is a low occurring event. Denial of Service (DoS) attempts by intentionally crashing the service will also cause werfault.exe to spawn."
],
"index": [
- "winlogbeat-*"
+ "winlogbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -24,7 +25,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_dns_service_file_writes.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_dns_service_file_writes.json
index c175ecbfa78b6..229fc28beee9c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_dns_service_file_writes.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_dns_service_file_writes.json
@@ -4,7 +4,8 @@
],
"description": "Identifies an unexpected file being modified by dns.exe, the process responsible for Windows DNS Server services, which may indicate activity related to remote code execution or other forms of exploitation.",
"index": [
- "winlogbeat-*"
+ "winlogbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -20,7 +21,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_network_connection_via_rundll32.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_network_connection_via_rundll32.json
index 1104159350655..2763f69e1f8e8 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_network_connection_via_rundll32.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_network_connection_via_rundll32.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 5
+ "version": 6
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_process_network_connection.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_process_network_connection.json
index 774e8e9189ced..877c489b0d187 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_process_network_connection.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_unusual_process_network_connection.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_compiled_html_file.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_compiled_html_file.json
index fe3e110830420..276e5c18335f5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_compiled_html_file.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_compiled_html_file.json
@@ -7,7 +7,8 @@
"The HTML Help executable program (hh.exe) runs whenever a user clicks a compiled help (.chm) file or menu item that opens the help file inside the Help Viewer. This is not always malicious, but adversaries may abuse this technology to conceal malicious code."
],
"index": [
- "winlogbeat-*"
+ "winlogbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -18,7 +19,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_hidden_shell_conhost.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_hidden_shell_conhost.json
index 7fbf962469f71..b6f6502e603aa 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_hidden_shell_conhost.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_hidden_shell_conhost.json
@@ -20,7 +20,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_net_com_assemblies.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_net_com_assemblies.json
index d9dcbfe25a4c2..0a21599c31a4a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_net_com_assemblies.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_net_com_assemblies.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
@@ -52,5 +55,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_system_manager.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_system_manager.json
index 081ebcb518999..13493a90e3e50 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_system_manager.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_system_manager.json
@@ -24,11 +24,12 @@
"rule_id": "37b211e8-4e2f-440f-86d8-06cc8f158cfa",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Logging",
- "Continuous Monitoring"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_xp_cmdshell_mssql_stored_procedure.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_xp_cmdshell_mssql_stored_procedure.json
index 8769e641fad90..91097b2050d17 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_xp_cmdshell_mssql_stored_procedure.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_via_xp_cmdshell_mssql_stored_procedure.json
@@ -17,7 +17,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_wpad_exploitation.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_wpad_exploitation.json
index 03c4482b60340..a09bce5119ecf 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_wpad_exploitation.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/execution_wpad_exploitation.json
@@ -5,19 +5,21 @@
"description": "Identifies probable exploitation of the Web Proxy Auto-Discovery Protocol (WPAD) service. Attackers who have access to the local network or upstream DNS traffic can inject malicious JavaScript to the WPAD service which can lead to a full system compromise.",
"from": "now-9m",
"index": [
- "logs-endpoint.events.*",
- "winlogbeat-*"
+ "logs-endpoint.events.*"
],
"language": "eql",
"license": "Elastic License",
"name": "WPAD Service Exploit",
- "query": "/* preference would be to use user.sid rather than domain+name, once it is available in ECS + datasources */\n\nsequence with maxspan=5s\n [process where event.type in (\"start\", \"process_started\") and process.name == \"svchost.exe\" and\n user.domain == \"NT AUTHORITY\" and user.name == \"LOCAL SERVICE\"] by process.entity_id\n [network where network.protocol == \"dns\" and process.name == \"svchost.exe\" and\n dns.question.name == \"wpad\" and process.name == \"svchost.exe\"] by process.entity_id\n [network where event.type == \"connection\" and process.name == \"svchost.exe\"\n and network.direction == \"outgoing\" and destination.port == 80] by process.entity_id\n [library where event.type == \"start\" and process.name == \"svchost.exe\" and\n file.name == \"jscript.dll\" and process.name == \"svchost.exe\"] by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and\n process.parent.name == \"svchost.exe\"] by process.parent.entity_id\n",
+ "query": "/* preference would be to use user.sid rather than domain+name, once it is available in ECS + datasources */\n\nsequence with maxspan=5s\n [process where event.type in (\"start\", \"process_started\") and process.name : \"svchost.exe\" and\n user.domain == \"NT AUTHORITY\" and user.name == \"LOCAL SERVICE\"] by process.entity_id\n [network where network.protocol == \"dns\" and process.name : \"svchost.exe\" and\n dns.question.name : \"wpad\" and process.name : \"svchost.exe\"] by process.entity_id\n [network where event.type == \"connection\" and process.name : \"svchost.exe\"\n and network.direction == \"outgoing\" and destination.port == 80] by process.entity_id\n [library where event.type == \"start\" and process.name : \"svchost.exe\" and\n file.name : \"jscript.dll\" and process.name : \"svchost.exe\"] by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and\n process.parent.name : \"svchost.exe\"] by process.parent.entity_id\n",
"risk_score": 21,
"rule_id": "ec328da1-d5df-482b-866c-4a435692b1f3",
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Execution"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/exfiltration_ec2_snapshot_change_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/exfiltration_ec2_snapshot_change_activity.json
index fc18a516be0f4..abf64d55ab99a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/exfiltration_ec2_snapshot_change_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/exfiltration_ec2_snapshot_change_activity.json
@@ -25,11 +25,12 @@
"rule_id": "98fd7407-0bd5-5817-cda0-3fcc33113a56",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Asset Visibility",
- "Continuous Monitoring"
+ "Asset Visibility"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/exfiltration_gcp_logging_sink_modification.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/exfiltration_gcp_logging_sink_modification.json
index 4e8954c3441cd..5e3cc2da2f871 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/exfiltration_gcp_logging_sink_modification.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/exfiltration_gcp_logging_sink_modification.json
@@ -22,10 +22,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
- "Logging"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/external_alerts.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/external_alerts.json
index 6bc14f4e5af8a..a8a86348a1019 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/external_alerts.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/external_alerts.json
@@ -54,9 +54,14 @@
}
],
"tags": [
- "Elastic"
+ "Elastic",
+ "Network",
+ "Windows",
+ "APM",
+ "macOS",
+ "Linux"
],
"timestamp_override": "event.ingested",
"type": "query",
- "version": 1
+ "version": 2
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_attempt_to_revoke_okta_api_token.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_attempt_to_revoke_okta_api_token.json
index f9d71a2e1cbff..f2ad30fa26020 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_attempt_to_revoke_okta_api_token.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_attempt_to_revoke_okta_api_token.json
@@ -24,10 +24,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_azure_automation_runbook_deleted.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_azure_automation_runbook_deleted.json
index 662709774f5ba..f474357cc6e2c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_azure_automation_runbook_deleted.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_azure_automation_runbook_deleted.json
@@ -23,6 +23,7 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudtrail_logging_updated.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudtrail_logging_updated.json
index c648ae1ea4b5b..d7f4c2b19bc0f 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudtrail_logging_updated.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudtrail_logging_updated.json
@@ -25,11 +25,12 @@
"rule_id": "3e002465-876f-4f04-b016-84ef48ce7e5d",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Logging",
- "Continuous Monitoring"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudwatch_log_group_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudwatch_log_group_deletion.json
index f7e9077c14314..ae978f6564d67 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudwatch_log_group_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudwatch_log_group_deletion.json
@@ -25,11 +25,12 @@
"rule_id": "68a7a5a5-a2fc-4a76-ba9f-26849de881b4",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Logging",
- "Continuous Monitoring"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudwatch_log_stream_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudwatch_log_stream_deletion.json
index b50efb21e42f0..7b985fdb6f693 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudwatch_log_stream_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_cloudwatch_log_stream_deletion.json
@@ -25,11 +25,12 @@
"rule_id": "d624f0ae-3dd1-4856-9aad-ccfe4d4bfa17",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Logging",
- "Continuous Monitoring"
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_ec2_disable_ebs_encryption.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_ec2_disable_ebs_encryption.json
index 370a65c31e7c1..c60619e894717 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_ec2_disable_ebs_encryption.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_ec2_disable_ebs_encryption.json
@@ -26,11 +26,12 @@
"rule_id": "bb9b13b2-1700-48a8-a750-b43b0a72ab69",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Data Protection",
- "Continuous Monitoring"
+ "Data Protection"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_iam_role_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_iam_role_deletion.json
index 2c67be7408d1d..09a9996680155 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_iam_role_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_iam_role_deletion.json
@@ -22,6 +22,7 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_service_account_deleted.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_service_account_deleted.json
index 2aa702e5ca4d1..9d34f31c1700d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_service_account_deleted.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_service_account_deleted.json
@@ -22,6 +22,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_service_account_disabled.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_service_account_disabled.json
index 9b5188f43633d..606ebd1e6128e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_service_account_disabled.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_service_account_disabled.json
@@ -22,6 +22,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_storage_bucket_deleted.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_storage_bucket_deleted.json
index 6adad4b687de7..859c59ff8a325 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_storage_bucket_deleted.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_storage_bucket_deleted.json
@@ -22,6 +22,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_network_deleted.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_network_deleted.json
index c5dc9f25f893f..7f702f11a9515 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_network_deleted.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_network_deleted.json
@@ -22,6 +22,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_route_created.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_route_created.json
index 5e8fea09befc4..1da90189f96b8 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_route_created.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_route_created.json
@@ -23,6 +23,7 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_route_deleted.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_route_deleted.json
index 8482e0efbb036..c379f07f021a6 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_route_deleted.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_gcp_virtual_private_cloud_route_deleted.json
@@ -23,6 +23,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_hosts_file_modified.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_hosts_file_modified.json
index bf04626dee277..5d7e0bec4332c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_hosts_file_modified.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_hosts_file_modified.json
@@ -22,9 +22,12 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Host",
"Linux",
"Windows",
- "macOS"
+ "macOS",
+ "Threat Detection",
+ "Impact"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_iam_deactivate_mfa_device.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_iam_deactivate_mfa_device.json
index ca5cfd4ae596b..83e184d9bf805 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_iam_deactivate_mfa_device.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_iam_deactivate_mfa_device.json
@@ -25,11 +25,12 @@
"rule_id": "d8fc1cca-93ed-43c1-bbb6-c0dd3eff2958",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_iam_group_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_iam_group_deletion.json
index 00a10772d4d9a..6212aa70747a5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_iam_group_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_iam_group_deletion.json
@@ -25,11 +25,12 @@
"rule_id": "867616ec-41e5-4edc-ada2-ab13ab45de8a",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_possible_okta_dos_attack.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_possible_okta_dos_attack.json
index 9bc44bf4e6da9..d1852478c666f 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_possible_okta_dos_attack.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_possible_okta_dos_attack.json
@@ -21,10 +21,11 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_rds_cluster_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_rds_cluster_deletion.json
index 829c244dd45c0..116483173564e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_rds_cluster_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_rds_cluster_deletion.json
@@ -27,11 +27,12 @@
"rule_id": "9055ece6-2689-4224-a0e0-b04881e1f8ad",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Asset Visibility",
- "Continuous Monitoring"
+ "Asset Visibility"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_rds_instance_cluster_stoppage.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_rds_instance_cluster_stoppage.json
index 68459d0e777b9..3227649149380 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_rds_instance_cluster_stoppage.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_rds_instance_cluster_stoppage.json
@@ -27,11 +27,12 @@
"rule_id": "ecf2b32c-e221-4bd4-aa3b-c7d59b3bc01d",
"severity": "medium",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Asset Visibility",
- "Continuous Monitoring"
+ "Asset Visibility"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_resource_group_deletion.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_resource_group_deletion.json
index a0c56c19b964e..8086c09e4b174 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_resource_group_deletion.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/impact_resource_group_deletion.json
@@ -23,10 +23,11 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
- "SecOps",
"Continuous Monitoring",
- "Logging"
+ "SecOps",
+ "Log Auditing"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/index.ts b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/index.ts
index 6e376930617de..5fec97e83bad4 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/index.ts
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/index.ts
@@ -221,14 +221,14 @@ import rule209 from './credential_access_okta_brute_force_or_password_spraying.j
import rule210 from './execution_unusual_dns_service_children.json';
import rule211 from './execution_unusual_dns_service_file_writes.json';
import rule212 from './lateral_movement_dns_server_overflow.json';
-import rule213 from './initial_access_root_console_failure_brute_force.json';
+import rule213 from './credential_access_root_console_failure_brute_force.json';
import rule214 from './initial_access_unsecure_elasticsearch_node.json';
import rule215 from './credential_access_domain_backup_dpapi_private_keys.json';
-import rule216 from './lateral_movement_gpo_schtask_service_creation.json';
-import rule217 from './credential_access_kerberosdump_kcc.json';
-import rule218 from './defense_evasion_execution_suspicious_psexesvc.json';
-import rule219 from './execution_via_xp_cmdshell_mssql_stored_procedure.json';
-import rule220 from './exfiltration_compress_credentials_keychains.json';
+import rule216 from './persistence_gpo_schtask_service_creation.json';
+import rule217 from './credential_access_compress_credentials_keychains.json';
+import rule218 from './credential_access_kerberosdump_kcc.json';
+import rule219 from './execution_suspicious_psexesvc.json';
+import rule220 from './execution_via_xp_cmdshell_mssql_stored_procedure.json';
import rule221 from './privilege_escalation_printspooler_service_suspicious_file.json';
import rule222 from './privilege_escalation_printspooler_suspicious_spl_file.json';
import rule223 from './defense_evasion_azure_diagnostic_settings_deletion.json';
@@ -250,16 +250,16 @@ import rule238 from './persistence_azure_automation_webhook_created.json';
import rule239 from './privilege_escalation_uac_bypass_diskcleanup_hijack.json';
import rule240 from './credential_access_attempts_to_brute_force_okta_user_account.json';
import rule241 from './credential_access_storage_account_key_regenerated.json';
-import rule242 from './credential_access_suspicious_okta_user_password_reset_or_unlock_attempts.json';
+import rule242 from './defense_evasion_suspicious_okta_user_password_reset_or_unlock_attempts.json';
import rule243 from './defense_evasion_system_critical_proc_abnormal_file_activity.json';
import rule244 from './defense_evasion_unusual_system_vp_child_program.json';
-import rule245 from './defense_evasion_mfa_disabled_for_azure_user.json';
-import rule246 from './discovery_blob_container_access_mod.json';
+import rule245 from './discovery_blob_container_access_mod.json';
+import rule246 from './persistence_mfa_disabled_for_azure_user.json';
import rule247 from './persistence_user_added_as_owner_for_azure_application.json';
import rule248 from './persistence_user_added_as_owner_for_azure_service_principal.json';
-import rule249 from './defense_evasion_suspicious_managedcode_host_process.json';
-import rule250 from './execution_command_shell_started_by_unusual_process.json';
-import rule251 from './execution_suspicious_dotnet_compiler_parent_process.json';
+import rule249 from './defense_evasion_dotnet_compiler_parent_process.json';
+import rule250 from './defense_evasion_suspicious_managedcode_host_process.json';
+import rule251 from './execution_command_shell_started_by_unusual_process.json';
import rule252 from './defense_evasion_masquerading_as_elastic_endpoint_process.json';
import rule253 from './defense_evasion_masquerading_suspicious_werfault_childproc.json';
import rule254 from './defense_evasion_masquerading_werfault.json';
@@ -268,28 +268,28 @@ import rule256 from './credential_access_mimikatz_memssp_default_logs.json';
import rule257 from './defense_evasion_code_injection_conhost.json';
import rule258 from './defense_evasion_network_watcher_deletion.json';
import rule259 from './initial_access_external_guest_user_invite.json';
-import rule260 from './defense_evasion_azure_conditional_access_policy_modified.json';
-import rule261 from './defense_evasion_azure_privileged_identity_management_role_modified.json';
-import rule262 from './defense_evasion_masquerading_renamed_autoit.json';
-import rule263 from './impact_azure_automation_runbook_deleted.json';
-import rule264 from './initial_access_consent_grant_attack_via_azure_registered_application.json';
-import rule265 from './c2_installutil_beacon.json';
-import rule266 from './c2_msbuild_beacon_sequence.json';
-import rule267 from './c2_mshta_beacon.json';
-import rule268 from './c2_msxsl_beacon.json';
-import rule269 from './c2_network_connection_from_windows_binary.json';
-import rule270 from './c2_reg_beacon.json';
-import rule271 from './c2_rundll32_sequence.json';
-import rule272 from './command_and_control_teamviewer_remote_file_copy.json';
-import rule273 from './escalation_uac_sdclt.json';
-import rule274 from './evasion_rundll32_no_arguments.json';
-import rule275 from './evasion_suspicious_scrobj_load.json';
-import rule276 from './evasion_suspicious_wmi_script.json';
-import rule277 from './execution_ms_office_written_file.json';
-import rule278 from './execution_pdf_written_file.json';
-import rule279 from './execution_wpad_exploitation.json';
-import rule280 from './lateral_movement_cmd_service.json';
-import rule281 from './persistence_app_compat_shim.json';
+import rule260 from './defense_evasion_masquerading_renamed_autoit.json';
+import rule261 from './impact_azure_automation_runbook_deleted.json';
+import rule262 from './initial_access_consent_grant_attack_via_azure_registered_application.json';
+import rule263 from './persistence_azure_conditional_access_policy_modified.json';
+import rule264 from './persistence_azure_privileged_identity_management_role_modified.json';
+import rule265 from './command_and_control_teamviewer_remote_file_copy.json';
+import rule266 from './defense_evasion_installutil_beacon.json';
+import rule267 from './defense_evasion_msbuild_beacon_sequence.json';
+import rule268 from './defense_evasion_mshta_beacon.json';
+import rule269 from './defense_evasion_msxsl_beacon.json';
+import rule270 from './defense_evasion_network_connection_from_windows_binary.json';
+import rule271 from './defense_evasion_reg_beacon.json';
+import rule272 from './defense_evasion_rundll32_no_arguments.json';
+import rule273 from './defense_evasion_rundll32_sequence.json';
+import rule274 from './defense_evasion_suspicious_scrobj_load.json';
+import rule275 from './defense_evasion_suspicious_wmi_script.json';
+import rule276 from './execution_ms_office_written_file.json';
+import rule277 from './execution_pdf_written_file.json';
+import rule278 from './execution_wpad_exploitation.json';
+import rule279 from './lateral_movement_cmd_service.json';
+import rule280 from './persistence_app_compat_shim.json';
+import rule281 from './privilege_escalation_uac_sdclt.json';
import rule282 from './command_and_control_remote_file_copy_desktopimgdownldr.json';
import rule283 from './command_and_control_remote_file_copy_mpcmdrun.json';
import rule284 from './defense_evasion_execution_suspicious_explorer_winword.json';
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_consent_grant_attack_via_azure_registered_application.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_consent_grant_attack_via_azure_registered_application.json
index 8147859fa4e6f..1dab4e8df71b4 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_consent_grant_attack_via_azure_registered_application.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_consent_grant_attack_via_azure_registered_application.json
@@ -20,6 +20,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_console_login_root.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_console_login_root.json
index 621881e264138..1d6f5b2c90f26 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_console_login_root.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_console_login_root.json
@@ -24,11 +24,12 @@
"rule_id": "e2a67480-3b79-403d-96e3-fdd2992c50ef",
"severity": "high",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_external_guest_user_invite.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_external_guest_user_invite.json
index 392e0ec745fc2..455fc3c762978 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_external_guest_user_invite.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_external_guest_user_invite.json
@@ -23,9 +23,10 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
- "SecOps",
"Continuous Monitoring",
+ "SecOps",
"Identity and Access"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_gcp_iam_custom_role_creation.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_gcp_iam_custom_role_creation.json
index 0eab41ad8c4bd..ff7ad0e8d29a2 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_gcp_iam_custom_role_creation.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_gcp_iam_custom_role_creation.json
@@ -22,6 +22,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_password_recovery.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_password_recovery.json
index 2f0eed31d05be..13279ea170358 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_password_recovery.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_password_recovery.json
@@ -24,11 +24,12 @@
"rule_id": "69c420e8-6c9e-4d28-86c0-8a2be2d1e78c",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rdp_remote_desktop_protocol_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rdp_remote_desktop_protocol_to_the_internet.json
index 15c3c81a551bd..ce0f44713523f 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rdp_remote_desktop_protocol_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rdp_remote_desktop_protocol_to_the_internet.json
@@ -8,7 +8,8 @@
],
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -19,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Initial Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rpc_remote_procedure_call_from_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rpc_remote_procedure_call_from_the_internet.json
index 7c61f95f9e9f3..b8f3e01823312 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rpc_remote_procedure_call_from_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rpc_remote_procedure_call_from_the_internet.json
@@ -5,7 +5,8 @@
"description": "This rule detects network events that may indicate the use of RPC traffic from the Internet. RPC is commonly used by system administrators to remotely control a system for maintenance or to use shared resources. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or back-door vector.",
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -16,7 +17,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Initial Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rpc_remote_procedure_call_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rpc_remote_procedure_call_to_the_internet.json
index e8da93ed9d1c7..e8e4ea4eb3746 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rpc_remote_procedure_call_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_rpc_remote_procedure_call_to_the_internet.json
@@ -5,7 +5,8 @@
"description": "This rule detects network events that may indicate the use of RPC traffic to the Internet. RPC is commonly used by system administrators to remotely control a system for maintenance or to use shared resources. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or back-door vector.",
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -16,7 +17,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Initial Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_smb_windows_file_sharing_activity_to_the_internet.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_smb_windows_file_sharing_activity_to_the_internet.json
index aff8a415b7e35..fec0f308a8d27 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_smb_windows_file_sharing_activity_to_the_internet.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_smb_windows_file_sharing_activity_to_the_internet.json
@@ -5,7 +5,8 @@
"description": "This rule detects network events that may indicate the use of Windows file sharing (also called SMB or CIFS) traffic to the Internet. SMB is commonly used within networks to share files, printers, and other system resources amongst trusted systems. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or back-door vector or for data exfiltration.",
"index": [
"filebeat-*",
- "packetbeat-*"
+ "packetbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -16,7 +17,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Network"
+ "Host",
+ "Network",
+ "Threat Detection",
+ "Initial Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_suspicious_activity_reported_by_okta_user.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_suspicious_activity_reported_by_okta_user.json
index 24837084c8381..5b1946dc7c07d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_suspicious_activity_reported_by_okta_user.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_suspicious_activity_reported_by_okta_user.json
@@ -24,10 +24,11 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_unsecure_elasticsearch_node.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_unsecure_elasticsearch_node.json
index e6d718a23eb96..a577a3413e5df 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_unsecure_elasticsearch_node.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/initial_access_unsecure_elasticsearch_node.json
@@ -23,7 +23,9 @@
"severity": "medium",
"tags": [
"Elastic",
- "Network"
+ "Network",
+ "Threat Detection",
+ "Initial Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_cmd_service.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_cmd_service.json
index bd14db77b9fe9..f4e137663762a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_cmd_service.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_cmd_service.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "Service Command Lateral Movement",
- "query": "/* dependent on a wildcard for remote path */\n\nsequence by process.entity_id with maxspan=1m\n [process where event.type in (\"start\", \"process_started\") and\n (process.name == \"sc.exe\" or process.pe.original_file_name == \"sc.exe\") and\n wildcard(process.args, \"\\\\\\\\*\") and wildcard(process.args, \"binPath*\", \"binpath*\") and\n process.args in (\"create\", \"config\", \"failure\", \"start\")]\n [network where event.type == \"connection\" and process.name == \"sc.exe\" and destination.address != \"127.0.0.1\"]\n",
+ "query": "sequence by process.entity_id with maxspan=1m\n [process where event.type in (\"start\", \"process_started\") and\n /* uncomment once in winlogbeat */\n (process.name == \"sc.exe\" /* or process.pe.original_file_name == \"sc.exe\" */ ) and\n /* case insensitive */\n wildcard(process.args, \"\\\\\\\\*\") and wildcard(process.args, \"binPath=*\", \"binpath=*\") and \n (process.args : \"create\" or\n process.args : \"config\" or\n process.args : \"failure\" or\n process.args : \"start\")]\n [network where event.type == \"connection\" and process.name : \"sc.exe\" and destination.ip != \"127.0.0.1\"]\n",
"risk_score": 21,
"rule_id": "d61cbcf8-1bc1-4cff-85ba-e7b21c5beedc",
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Lateral Movement"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_direct_outbound_smb_connection.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_direct_outbound_smb_connection.json
index e4014b22a6c09..39f45a736383a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_direct_outbound_smb_connection.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_direct_outbound_smb_connection.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Lateral Movement"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_dns_server_overflow.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_dns_server_overflow.json
index 2a86dcac12e7b..052d0de3ef79e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_dns_server_overflow.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_dns_server_overflow.json
@@ -26,7 +26,8 @@
"tags": [
"Elastic",
"Network",
- "Windows"
+ "Threat Detection",
+ "Lateral Movement"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_remote_ssh_login_enabled.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_remote_ssh_login_enabled.json
index f1ce68abf8302..149dab112929c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_remote_ssh_login_enabled.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_remote_ssh_login_enabled.json
@@ -21,7 +21,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "MacOS"
+ "Host",
+ "macOS",
+ "Threat Detection",
+ "Lateral Movement"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_telnet_network_activity_external.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_telnet_network_activity_external.json
index e4804329c0f30..ff62251a465f7 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_telnet_network_activity_external.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_telnet_network_activity_external.json
@@ -20,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Lateral Movement"
],
"threat": [
{
@@ -40,5 +43,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_telnet_network_activity_internal.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_telnet_network_activity_internal.json
index 30312987d166c..bb6c03e9410e5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_telnet_network_activity_internal.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_telnet_network_activity_internal.json
@@ -20,7 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Lateral Movement"
],
"threat": [
{
@@ -40,5 +43,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_hping_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_hping_activity.json
index 3a5c4d9e69d49..775d201cd1808 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_hping_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_hping_activity.json
@@ -23,8 +23,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection"
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_iodine_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_iodine_activity.json
index 63c82c5662df6..510eecb9d2fee 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_iodine_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_iodine_activity.json
@@ -23,8 +23,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection"
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_mknod_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_mknod_activity.json
index 99d087fe675a6..a81567740590d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_mknod_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_mknod_activity.json
@@ -23,7 +23,9 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection"
],
"type": "query",
"version": 5
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_netcat_network_connection.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_netcat_network_connection.json
index bce10f640691b..ebe884debc9a0 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_netcat_network_connection.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_netcat_network_connection.json
@@ -25,8 +25,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection"
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_nmap_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_nmap_activity.json
index 5d9e338425bda..76866f67d7288 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_nmap_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_nmap_activity.json
@@ -23,8 +23,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection"
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_nping_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_nping_activity.json
index bd019c9a80c4c..cc744614d68af 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_nping_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_nping_activity.json
@@ -23,8 +23,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection"
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_process_started_in_temp_directory.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_process_started_in_temp_directory.json
index f0bbc892d7d9c..1662d63066feb 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_process_started_in_temp_directory.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_process_started_in_temp_directory.json
@@ -20,8 +20,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection"
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_socat_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_socat_activity.json
index fac03d31b57bf..07cd9e4a065b3 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_socat_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_socat_activity.json
@@ -23,8 +23,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection"
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_strace_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_strace_activity.json
index c1b782d612ccb..06be108db2f14 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_strace_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/linux_strace_activity.json
@@ -23,8 +23,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection"
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_error_message_spike.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_error_message_spike.json
index 0730c421cf5f2..890b777751a03 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_error_message_spike.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_error_message_spike.json
@@ -20,10 +20,11 @@
"rule_id": "78d3d8d9-b476-451d-a9e0-7a5addd70670",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
"ML"
],
"type": "machine_learning",
- "version": 1
+ "version": 2
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_error_code.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_error_code.json
index 8003cdd7504c7..62254d970ca7e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_error_code.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_error_code.json
@@ -20,10 +20,11 @@
"rule_id": "19de8096-e2b0-4bd8-80c9-34a820813fff",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
"ML"
],
"type": "machine_learning",
- "version": 1
+ "version": 2
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_city.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_city.json
index 2c54dbd03daba..5c1189c989bac 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_city.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_city.json
@@ -20,10 +20,11 @@
"rule_id": "809b70d3-e2c3-455e-af1b-2626a5a1a276",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
"ML"
],
"type": "machine_learning",
- "version": 1
+ "version": 2
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_country.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_country.json
index 68cbf4979a933..149ebd1a84fd4 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_country.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_country.json
@@ -20,10 +20,11 @@
"rule_id": "dca28dee-c999-400f-b640-50a081cc0fd1",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
"ML"
],
"type": "machine_learning",
- "version": 1
+ "version": 2
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_user.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_user.json
index e4ec651e71934..a8c0bce169432 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_user.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_cloudtrail_rare_method_by_user.json
@@ -20,10 +20,11 @@
"rule_id": "ac706eae-d5ec-4b14-b4fd-e8ba8086f0e1",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
"ML"
],
"type": "machine_learning",
- "version": 1
+ "version": 2
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_compiler_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_compiler_activity.json
index eb764c5e40817..592bd723e1a0c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_compiler_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_compiler_activity.json
@@ -17,7 +17,9 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"type": "machine_learning",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_kernel_module_arguments.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_kernel_module_arguments.json
index d289e0ba6f008..52a1d6dd5c60a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_kernel_module_arguments.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_kernel_module_arguments.json
@@ -20,7 +20,9 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_metadata_process.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_metadata_process.json
index c1cc619164b1f..ec033a609cac1 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_metadata_process.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_metadata_process.json
@@ -11,13 +11,15 @@
"interval": "15m",
"license": "Elastic License",
"machine_learning_job_id": "linux_rare_metadata_process",
- "name": "Unusual Process Calling the Metadata Service",
+ "name": "Unusual Linux Process Calling the Metadata Service",
"risk_score": 21,
"rule_id": "9d302377-d226-4e12-b54c-1906b5aec4f6",
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"type": "machine_learning",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_metadata_user.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_metadata_user.json
index 59a04dd54dd89..a4a6b38bd32b8 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_metadata_user.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_metadata_user.json
@@ -17,7 +17,9 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"type": "machine_learning",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_activity.json
index bf86f78fe3e72..04df4adab8525 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_activity.json
@@ -18,9 +18,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_port_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_port_activity.json
index a588a6f5bcb0a..c5a0891a7bbc4 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_port_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_port_activity.json
@@ -20,9 +20,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_service.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_service.json
index 5c56845024eb2..81dff605dc779 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_service.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_service.json
@@ -20,9 +20,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_url_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_url_activity.json
index 3b3f751dfc60b..5336c31d4a741 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_url_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_network_url_activity.json
@@ -20,9 +20,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_process_all_hosts.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_process_all_hosts.json
index 8475410735f34..04d112c26e886 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_process_all_hosts.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_process_all_hosts.json
@@ -21,9 +21,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_sudo_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_sudo_activity.json
index 8f03b24a6bd18..57d5260d111db 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_sudo_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_sudo_activity.json
@@ -17,7 +17,9 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_user_name.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_user_name.json
index 3e4b1f15fdce4..3f889dc529317 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_user_name.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_anomalous_user_name.json
@@ -21,9 +21,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_information_discovery.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_information_discovery.json
index 40f117c6a5708..cdd1ee8d46653 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_information_discovery.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_information_discovery.json
@@ -17,7 +17,9 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_network_configuration_discovery.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_network_configuration_discovery.json
index 326024114f145..b143293ac995b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_network_configuration_discovery.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_network_configuration_discovery.json
@@ -17,7 +17,9 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_network_connection_discovery.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_network_connection_discovery.json
index 881a2f9fa3410..ffab1c9eb8495 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_network_connection_discovery.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_network_connection_discovery.json
@@ -17,7 +17,9 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_process_discovery.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_process_discovery.json
index 66859e2f9ccbf..69d2940029011 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_process_discovery.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_process_discovery.json
@@ -17,7 +17,9 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_user_discovery.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_user_discovery.json
index 4437334b0aa1f..b5c5e66af6e7e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_user_discovery.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_linux_system_user_discovery.json
@@ -17,7 +17,9 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"threat": [
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_dns_tunneling.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_dns_tunneling.json
index 1352fde91b59b..fbce00ebaf5a3 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_dns_tunneling.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_dns_tunneling.json
@@ -20,9 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Packetbeat"
+ "Network",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_dns_question.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_dns_question.json
index b16e67052a212..744e9fbfc18d8 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_dns_question.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_dns_question.json
@@ -20,9 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Packetbeat"
+ "Network",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_server_domain.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_server_domain.json
index a8971300fe11b..a672985655859 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_server_domain.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_server_domain.json
@@ -20,9 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Packetbeat"
+ "Network",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_urls.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_urls.json
index 469f5d741ef6e..5600fbe74c7fc 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_urls.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_urls.json
@@ -20,9 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Packetbeat"
+ "Network",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_user_agent.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_user_agent.json
index ebcf4f987e9de..5cce9c63fd88e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_user_agent.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_packetbeat_rare_user_agent.json
@@ -20,9 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Packetbeat"
+ "Network",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_rare_process_by_host_linux.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_rare_process_by_host_linux.json
index 385158dd6b65d..5c25b47833112 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_rare_process_by_host_linux.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_rare_process_by_host_linux.json
@@ -21,9 +21,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_rare_process_by_host_windows.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_rare_process_by_host_windows.json
index d0a99b32d4713..e86bc96fddae5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_rare_process_by_host_windows.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_rare_process_by_host_windows.json
@@ -21,9 +21,11 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_suspicious_login_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_suspicious_login_activity.json
index f309debcdffe9..ae0ac2b716e32 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_suspicious_login_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_suspicious_login_activity.json
@@ -20,9 +20,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Host",
"Linux",
+ "Threat Detection",
"ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_metadata_process.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_metadata_process.json
index 56874ec371b43..3e35b2af5e3b8 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_metadata_process.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_metadata_process.json
@@ -17,8 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
"version": 1
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_metadata_user.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_metadata_user.json
index f124cda7717c3..7c45ab4dfa08b 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_metadata_user.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_metadata_user.json
@@ -17,8 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
"version": 1
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_network_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_network_activity.json
index 0ab591097f975..937fcbc079eb8 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_network_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_network_activity.json
@@ -21,9 +21,11 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_path_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_path_activity.json
index a7b309e6d7fcd..d45661f737b5d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_path_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_path_activity.json
@@ -20,9 +20,11 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_process_all_hosts.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_process_all_hosts.json
index bc6346f457b65..88764ed1bf46d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_process_all_hosts.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_process_all_hosts.json
@@ -21,9 +21,11 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_process_creation.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_process_creation.json
index 97351a1f517b3..2ebc7ee667d4e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_process_creation.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_process_creation.json
@@ -20,9 +20,11 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_script.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_script.json
index d0dc8d7e40fa2..91714b10d2ab6 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_script.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_script.json
@@ -20,9 +20,11 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_service.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_service.json
index b7e7a0357e118..3aea73eb489e5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_service.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_service.json
@@ -20,9 +20,11 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_user_name.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_user_name.json
index 26bd6837cbde5..749cbb218bcd8 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_user_name.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_anomalous_user_name.json
@@ -21,9 +21,11 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_rare_user_runas_event.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_rare_user_runas_event.json
index 1af765f568bb1..8ed8a005d9aa5 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_rare_user_runas_event.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_rare_user_runas_event.json
@@ -20,9 +20,11 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_rare_user_type10_remote_login.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_rare_user_type10_remote_login.json
index b69e759120ce4..dda4e0bbad88d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_rare_user_type10_remote_login.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/ml_windows_rare_user_type10_remote_login.json
@@ -21,9 +21,11 @@
"severity": "low",
"tags": [
"Elastic",
- "ML",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "ML"
],
"type": "machine_learning",
- "version": 2
+ "version": 3
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_deactivate_okta_mfa_rule.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_deactivate_okta_mfa_rule.json
index c503d2298adad..0ee0bbd6d6226 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_deactivate_okta_mfa_rule.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_deactivate_okta_mfa_rule.json
@@ -24,10 +24,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"type": "query",
"version": 2
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_delete_okta_policy.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_delete_okta_policy.json
index d095d7c1166de..211fdb1ae3474 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_delete_okta_policy.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_delete_okta_policy.json
@@ -24,10 +24,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"type": "query",
"version": 2
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_mfa_rule.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_mfa_rule.json
index 2fe27575b7b2a..eb726e24c89da 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_mfa_rule.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_mfa_rule.json
@@ -24,10 +24,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"type": "query",
"version": 2
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_network_zone.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_network_zone.json
index 23b3313488847..682dc17f0ed49 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_network_zone.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_network_zone.json
@@ -24,10 +24,11 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Network",
- "Continuous Monitoring"
+ "Network Security"
],
"type": "query",
"version": 2
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_policy.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_policy.json
index 5b19031046b66..88e556d37a27c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_policy.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_okta_policy.json
@@ -24,10 +24,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"type": "query",
"version": 2
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_or_delete_application_sign_on_policy.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_or_delete_application_sign_on_policy.json
index 58ba13e147a38..262a91f8e25c9 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_or_delete_application_sign_on_policy.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_attempt_to_modify_or_delete_application_sign_on_policy.json
@@ -24,10 +24,11 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"type": "query",
"version": 2
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_threat_detected_by_okta_threatinsight.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_threat_detected_by_okta_threatinsight.json
index 1efcf0474c049..0101ae0459454 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_threat_detected_by_okta_threatinsight.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/okta_threat_detected_by_okta_threatinsight.json
@@ -21,10 +21,11 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"type": "query",
"version": 2
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_administrator_privileges_assigned_to_okta_group.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_administrator_privileges_assigned_to_okta_group.json
index 87d5bf3e0f48c..fad3e3c922478 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_administrator_privileges_assigned_to_okta_group.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_administrator_privileges_assigned_to_okta_group.json
@@ -24,10 +24,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_adobe_hijack_persistence.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_adobe_hijack_persistence.json
index a4c62b98fb060..077147a8ed1a6 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_adobe_hijack_persistence.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_adobe_hijack_persistence.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_app_compat_shim.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_app_compat_shim.json
index e9e2e044ddc04..5c467c39f5128 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_app_compat_shim.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_app_compat_shim.json
@@ -11,13 +11,16 @@
"language": "eql",
"license": "Elastic License",
"name": "Installation of Custom Shim Databases",
- "query": "/* dependent on wildcard for registry.value */\n\nsequence by process.entity_id with maxspan=5m\n [process where event.type in (\"start\", \"process_started\") and\n not (process.name == \"sdbinst.exe\" and process.parent.name == \"msiexec.exe\")]\n [registry where event.type in (\"creation\", \"change\") and\n wildcard(registry.path, \"HKLM\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\AppCompatFlags\\\\Custom\\\\*.sdb\")]\n",
+ "query": "sequence by process.entity_id with maxspan=5m\n [process where event.type in (\"start\", \"process_started\") and\n not (process.name : \"sdbinst.exe\" and process.parent.name : \"msiexec.exe\")]\n [registry where event.type in (\"creation\", \"change\") and\n wildcard(registry.path, \"HKLM\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\AppCompatFlags\\\\Custom\\\\*.sdb\")]\n",
"risk_score": 21,
"rule_id": "c5ce48a6-7f57-4ee8-9313-3d0024caee10",
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_create_okta_api_token.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_create_okta_api_token.json
index c1d7d51f1401e..9d1a7c7aef464 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_create_okta_api_token.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_create_okta_api_token.json
@@ -24,10 +24,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_deactivate_mfa_for_okta_user_account.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_deactivate_mfa_for_okta_user_account.json
index 9cd9572400a6c..764c60b829498 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_deactivate_mfa_for_okta_user_account.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_deactivate_mfa_for_okta_user_account.json
@@ -24,10 +24,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_deactivate_okta_policy.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_deactivate_okta_policy.json
index d5c9e505659f6..9003f6877341f 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_deactivate_okta_policy.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_deactivate_okta_policy.json
@@ -24,10 +24,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Monitoring",
- "Continuous Monitoring"
+ "Monitoring"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_reset_mfa_factors_for_okta_user_account.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_reset_mfa_factors_for_okta_user_account.json
index 302618773e323..4fef3e833a7b6 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_reset_mfa_factors_for_okta_user_account.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_attempt_to_reset_mfa_factors_for_okta_user_account.json
@@ -24,10 +24,11 @@
"severity": "low",
"tags": [
"Elastic",
+ "Identity",
"Okta",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_account_created.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_account_created.json
index 645c025ec4738..5c000967ce44d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_account_created.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_account_created.json
@@ -22,11 +22,12 @@
"rule_id": "df26fd74-1baa-4479-b42e-48da84642330",
"severity": "low",
"tags": [
+ "Elastic",
+ "Cloud",
"Azure",
"Continuous Monitoring",
- "Elastic",
- "Identity and Access",
- "SecOps"
+ "SecOps",
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_runbook_created_or_modified.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_runbook_created_or_modified.json
index e96700e409090..28a5864353942 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_runbook_created_or_modified.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_runbook_created_or_modified.json
@@ -23,6 +23,7 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_webhook_created.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_webhook_created.json
index f31fdcc18978e..5dde815022283 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_webhook_created.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_automation_webhook_created.json
@@ -23,6 +23,7 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_azure_conditional_access_policy_modified.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_conditional_access_policy_modified.json
similarity index 99%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_azure_conditional_access_policy_modified.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_conditional_access_policy_modified.json
index 8d4d4b971316e..14d6d3d479c6a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_azure_conditional_access_policy_modified.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_conditional_access_policy_modified.json
@@ -20,6 +20,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_pim_user_added_global_admin.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_pim_user_added_global_admin.json
index b8ea2c55dd3f9..24411a40ffc46 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_pim_user_added_global_admin.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_pim_user_added_global_admin.json
@@ -22,6 +22,7 @@
"severity": "high",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_azure_privileged_identity_management_role_modified.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_privileged_identity_management_role_modified.json
similarity index 99%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_azure_privileged_identity_management_role_modified.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_privileged_identity_management_role_modified.json
index f675a490c4e05..77e955727b2d8 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_azure_privileged_identity_management_role_modified.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_azure_privileged_identity_management_role_modified.json
@@ -21,6 +21,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_ec2_network_acl_creation.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_ec2_network_acl_creation.json
index 1b98b9744cd5b..8deaa9924cc1d 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_ec2_network_acl_creation.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_ec2_network_acl_creation.json
@@ -27,11 +27,12 @@
"rule_id": "39144f38-5284-4f8e-a2ae-e3fd628d90b0",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Network",
- "Continuous Monitoring"
+ "Network Security"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_gcp_service_account_created.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_gcp_service_account_created.json
index aa9d48459262e..62e28e588cd0a 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_gcp_service_account_created.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_gcp_service_account_created.json
@@ -22,6 +22,7 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"GCP",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_gpo_schtask_service_creation.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_gpo_schtask_service_creation.json
similarity index 96%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_gpo_schtask_service_creation.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_gpo_schtask_service_creation.json
index fbf6fddcb8c00..536eda4e21476 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/lateral_movement_gpo_schtask_service_creation.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_gpo_schtask_service_creation.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_iam_group_creation.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_iam_group_creation.json
index 0addb86b8d031..963ac46b7ed94 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_iam_group_creation.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_iam_group_creation.json
@@ -25,11 +25,12 @@
"rule_id": "169f3a93-efc7-4df2-94d6-0d9438c310d1",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_kernel_module_activity.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_kernel_module_activity.json
index e3dedeef07eb5..b29a8b2384f95 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_kernel_module_activity.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_kernel_module_activity.json
@@ -23,7 +23,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
@@ -43,5 +46,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_local_scheduled_task_commands.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_local_scheduled_task_commands.json
index 78f035318c614..9e5a6a0eae041 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_local_scheduled_task_commands.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_local_scheduled_task_commands.json
@@ -20,7 +20,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_mfa_disabled_for_azure_user.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_mfa_disabled_for_azure_user.json
similarity index 99%
rename from x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_mfa_disabled_for_azure_user.json
rename to x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_mfa_disabled_for_azure_user.json
index eda6f5b2bdf62..8a9f4d4c661e9 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/defense_evasion_mfa_disabled_for_azure_user.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_mfa_disabled_for_azure_user.json
@@ -17,6 +17,7 @@
"severity": "medium",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_priv_escalation_via_accessibility_features.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_priv_escalation_via_accessibility_features.json
index 5899b58bce4d5..e7f4598a19f33 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_priv_escalation_via_accessibility_features.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_priv_escalation_via_accessibility_features.json
@@ -4,7 +4,8 @@
],
"description": "Windows contains accessibility features that may be launched with a key combination before a user has logged in. An adversary can modify the way these programs are launched to get a command prompt or backdoor without logging in to the system.",
"index": [
- "winlogbeat-*"
+ "winlogbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -15,7 +16,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_rds_cluster_creation.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_rds_cluster_creation.json
index eb77c183d90ea..06ca022726aad 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_rds_cluster_creation.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_rds_cluster_creation.json
@@ -27,11 +27,12 @@
"rule_id": "e14c5fd7-fdd7-49c2-9e5b-ec49d817bc8d",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Asset Visibility",
- "Continuous Monitoring"
+ "Asset Visibility"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_shell_activity_by_web_server.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_shell_activity_by_web_server.json
index 2aaf0012acabf..ea10fa9bdf865 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_shell_activity_by_web_server.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_shell_activity_by_web_server.json
@@ -23,7 +23,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
@@ -43,5 +46,5 @@
}
],
"type": "query",
- "version": 5
+ "version": 6
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_system_shells_via_services.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_system_shells_via_services.json
index 32d78480325e6..880101e8d9338 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_system_shells_via_services.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_system_shells_via_services.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_account_creation.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_account_creation.json
index 3f2e00f0976de..9bc603b5ad547 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_account_creation.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_account_creation.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 4
+ "version": 5
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_added_as_owner_for_azure_application.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_added_as_owner_for_azure_application.json
index 8882b87e91291..3fddde78beb33 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_added_as_owner_for_azure_application.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_added_as_owner_for_azure_application.json
@@ -17,6 +17,7 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_added_as_owner_for_azure_service_principal.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_added_as_owner_for_azure_service_principal.json
index f7c0af67692e7..de6482f14d2f0 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_added_as_owner_for_azure_service_principal.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_user_added_as_owner_for_azure_service_principal.json
@@ -20,6 +20,7 @@
"severity": "low",
"tags": [
"Elastic",
+ "Cloud",
"Azure",
"Continuous Monitoring",
"SecOps",
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_application_shimming.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_application_shimming.json
index f20cc75dfa38b..c9d56a9c68edb 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_application_shimming.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_application_shimming.json
@@ -4,7 +4,8 @@
],
"description": "The Application Shim was created to allow for backward compatibility of software as the operating system codebase changes over time. This Windows functionality has been abused by attackers to stealthily gain persistence and arbitrary code execution in legitimate Windows processes.",
"index": [
- "winlogbeat-*"
+ "winlogbeat-*",
+ "logs-endpoint.events.*"
],
"language": "kuery",
"license": "Elastic License",
@@ -15,7 +16,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_telemetrycontroller_scheduledtask_hijack.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_telemetrycontroller_scheduledtask_hijack.json
index b7f4ec5d8a73c..0622309387f35 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_telemetrycontroller_scheduledtask_hijack.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_telemetrycontroller_scheduledtask_hijack.json
@@ -20,7 +20,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_update_orchestrator_service_hijack.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_update_orchestrator_service_hijack.json
index e512e92a31560..bdddf2eb7e8c7 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_update_orchestrator_service_hijack.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/persistence_via_update_orchestrator_service_hijack.json
@@ -20,7 +20,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Persistence"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_printspooler_service_suspicious_file.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_printspooler_service_suspicious_file.json
index 1a76e077a7465..398e4ca22b757 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_printspooler_service_suspicious_file.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_printspooler_service_suspicious_file.json
@@ -21,7 +21,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Privilege Escalation"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_printspooler_suspicious_spl_file.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_printspooler_suspicious_spl_file.json
index c5ffe5a9f6a11..18da4c8075c8f 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_printspooler_suspicious_spl_file.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_printspooler_suspicious_spl_file.json
@@ -21,7 +21,10 @@
"severity": "high",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Privilege Escalation"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_root_login_without_mfa.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_root_login_without_mfa.json
index 16389d43945f1..16af96e98448c 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_root_login_without_mfa.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_root_login_without_mfa.json
@@ -24,11 +24,12 @@
"rule_id": "bc0c6f0d-dab0-47a3-b135-0925f0a333bc",
"severity": "high",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_setgid_bit_set_via_chmod.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_setgid_bit_set_via_chmod.json
index e72e58132adee..ff63d1e38d950 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_setgid_bit_set_via_chmod.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_setgid_bit_set_via_chmod.json
@@ -18,7 +18,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Privilege Escalation"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_setuid_bit_set_via_chmod.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_setuid_bit_set_via_chmod.json
index 5e560097d2545..47490fe08ff12 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_setuid_bit_set_via_chmod.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_setuid_bit_set_via_chmod.json
@@ -18,7 +18,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Privilege Escalation"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_sudoers_file_mod.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_sudoers_file_mod.json
index 73a804fcbda8f..5519f6ce3a9ec 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_sudoers_file_mod.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_sudoers_file_mod.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Linux"
+ "Host",
+ "Linux",
+ "Threat Detection",
+ "Privilege Escalation"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_uac_bypass_diskcleanup_hijack.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_uac_bypass_diskcleanup_hijack.json
index b22457db49e49..80b01f90d3cf4 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_uac_bypass_diskcleanup_hijack.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_uac_bypass_diskcleanup_hijack.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Privilege Escalation"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_uac_bypass_event_viewer.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_uac_bypass_event_viewer.json
index 740ff47e5abe5..415111c725828 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_uac_bypass_event_viewer.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_uac_bypass_event_viewer.json
@@ -17,7 +17,10 @@
"severity": "low",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Privilege Escalation"
],
"threat": [
{
@@ -37,5 +40,5 @@
}
],
"type": "query",
- "version": 3
+ "version": 4
}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_uac_sdclt.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_uac_sdclt.json
new file mode 100644
index 0000000000000..ce82db3a96e11
--- /dev/null
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_uac_sdclt.json
@@ -0,0 +1,44 @@
+{
+ "author": [
+ "Elastic"
+ ],
+ "description": "Identifies User Account Control (UAC) bypass via sdclt.exe. Attackers bypass UAC to stealthily execute code with elevated permissions.",
+ "from": "now-9m",
+ "index": [
+ "logs-endpoint.events.*",
+ "winlogbeat-*"
+ ],
+ "language": "eql",
+ "license": "Elastic License",
+ "name": "Bypass UAC via Sdclt",
+ "query": "/* add winlogbeat-* when process.code_signature.* fields are populated */\n\nsequence with maxspan=1m\n [process where event.type in (\"start\", \"process_started\") and process.name : \"sdclt.exe\" and\n /* uncomment once in winlogbeat */\n /* process.code_signature.subject_name == \"Microsoft Corporation\" and process.code_signature.trusted == true and */\n process.args : \"/kickoffelev\"\n ] by process.entity_id\n [process where event.type in (\"start\", \"process_started\") and process.parent.name : \"sdclt.exe\" and\n not (process.executable : \"C:\\\\Windows\\\\System32\\\\sdclt.exe\" or\n process.executable : \"C:\\\\Windows\\\\System32\\\\control.exe\" or\n process.executable : \"C:\\\\Windows\\\\SysWOW64\\\\sdclt.exe\" or\n process.executable : \"C:\\\\Windows\\\\SysWOW64\\\\control.exe\")\n ] by process.parent.entity_id\n",
+ "risk_score": 21,
+ "rule_id": "9b54e002-034a-47ac-9307-ad12c03fa900",
+ "severity": "high",
+ "tags": [
+ "Elastic",
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Privilege Escalation"
+ ],
+ "threat": [
+ {
+ "framework": "MITRE ATT&CK",
+ "tactic": {
+ "id": "TA0004",
+ "name": "Privilege Escalation",
+ "reference": "https://attack.mitre.org/tactics/TA0004/"
+ },
+ "technique": [
+ {
+ "id": "T1088",
+ "name": "Bypass User Account Control",
+ "reference": "https://attack.mitre.org/techniques/T1088/"
+ }
+ ]
+ }
+ ],
+ "type": "eql",
+ "version": 1
+}
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_unusual_parentchild_relationship.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_unusual_parentchild_relationship.json
index 0cac8561c7e9c..ad871716a67aa 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_unusual_parentchild_relationship.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_unusual_parentchild_relationship.json
@@ -17,7 +17,10 @@
"severity": "medium",
"tags": [
"Elastic",
- "Windows"
+ "Host",
+ "Windows",
+ "Threat Detection",
+ "Privilege Escalation"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_updateassumerolepolicy.json b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_updateassumerolepolicy.json
index 55947e00170ae..3d1e66497bd2e 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_updateassumerolepolicy.json
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/rules/prepackaged_rules/privilege_escalation_updateassumerolepolicy.json
@@ -24,11 +24,12 @@
"rule_id": "a60326d7-dca7-4fb7-93eb-1ca03a1febbd",
"severity": "low",
"tags": [
- "AWS",
"Elastic",
+ "Cloud",
+ "AWS",
+ "Continuous Monitoring",
"SecOps",
- "Identity and Access",
- "Continuous Monitoring"
+ "Identity and Access"
],
"threat": [
{
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/signals/single_search_after.test.ts b/x-pack/plugins/security_solution/server/lib/detection_engine/signals/single_search_after.test.ts
index 7b7c40f0c4355..c4869f024a977 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/signals/single_search_after.test.ts
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/signals/single_search_after.test.ts
@@ -105,7 +105,9 @@ describe('singleSearchAfter', () => {
timestampOverride: undefined,
buildRuleMessage,
});
- expect(searchErrors).toEqual(['reason: some reason, type: some type, caused by: some reason']);
+ expect(searchErrors).toEqual([
+ 'reason: "some reason" type: "some type" caused by reason: "some reason" caused by type: "some type"',
+ ]);
});
test('if singleSearchAfter works with a given sort id', async () => {
const searchAfterSortId = '1234567891111';
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/signals/utils.test.ts b/x-pack/plugins/security_solution/server/lib/detection_engine/signals/utils.test.ts
index 157f741439bd2..894e934ff0247 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/signals/utils.test.ts
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/signals/utils.test.ts
@@ -878,7 +878,7 @@ describe('utils', () => {
];
const createdErrors = createErrorsFromShard({ errors });
expect(createdErrors).toEqual([
- 'reason: some reason, type: some type, caused by: some reason',
+ 'reason: "some reason" type: "some type" caused by reason: "some reason" caused by type: "some type"',
]);
});
@@ -917,8 +917,54 @@ describe('utils', () => {
];
const createdErrors = createErrorsFromShard({ errors });
expect(createdErrors).toEqual([
- 'reason: some reason, type: some type, caused by: some reason',
- 'reason: some reason 2, type: some type 2, caused by: some reason 2',
+ 'reason: "some reason" type: "some type" caused by reason: "some reason" caused by type: "some type"',
+ 'reason: "some reason 2" type: "some type 2" caused by reason: "some reason 2" caused by type: "some type 2"',
+ ]);
+ });
+
+ test('You can have missing values for the shard errors and get the expected output of an empty string', () => {
+ const errors: ShardError[] = [
+ {
+ shard: 1,
+ index: 'index-123',
+ node: 'node-123',
+ reason: {},
+ },
+ ];
+ const createdErrors = createErrorsFromShard({ errors });
+ expect(createdErrors).toEqual(['']);
+ });
+
+ test('You can have a single value for the shard errors and get expected output without extra spaces anywhere', () => {
+ const errors: ShardError[] = [
+ {
+ shard: 1,
+ index: 'index-123',
+ node: 'node-123',
+ reason: {
+ reason: 'some reason something went wrong',
+ },
+ },
+ ];
+ const createdErrors = createErrorsFromShard({ errors });
+ expect(createdErrors).toEqual(['reason: "some reason something went wrong"']);
+ });
+
+ test('You can have two values for the shard errors and get expected output with one space exactly between the two values', () => {
+ const errors: ShardError[] = [
+ {
+ shard: 1,
+ index: 'index-123',
+ node: 'node-123',
+ reason: {
+ reason: 'some reason something went wrong',
+ caused_by: { type: 'some type' },
+ },
+ },
+ ];
+ const createdErrors = createErrorsFromShard({ errors });
+ expect(createdErrors).toEqual([
+ 'reason: "some reason something went wrong" caused by type: "some type"',
]);
});
});
diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/signals/utils.ts b/x-pack/plugins/security_solution/server/lib/detection_engine/signals/utils.ts
index ac10f5ed9a72d..e2b39b8d0a8c8 100644
--- a/x-pack/plugins/security_solution/server/lib/detection_engine/signals/utils.ts
+++ b/x-pack/plugins/security_solution/server/lib/detection_engine/signals/utils.ts
@@ -511,7 +511,23 @@ export const getSignalTimeTuples = ({
*/
export const createErrorsFromShard = ({ errors }: { errors: ShardError[] }): string[] => {
return errors.map((error) => {
- return `reason: ${error.reason.reason}, type: ${error.reason.caused_by.type}, caused by: ${error.reason.caused_by.reason}`;
+ const {
+ reason: {
+ reason,
+ type,
+ caused_by: { reason: causedByReason, type: causedByType } = {
+ reason: undefined,
+ type: undefined,
+ },
+ } = {},
+ } = error;
+
+ return [
+ ...(reason != null ? [`reason: "${reason}"`] : []),
+ ...(type != null ? [`type: "${type}"`] : []),
+ ...(causedByReason != null ? [`caused by reason: "${causedByReason}"`] : []),
+ ...(causedByType != null ? [`caused by type: "${causedByType}"`] : []),
+ ].join(' ');
});
};
diff --git a/x-pack/plugins/security_solution/server/lib/types.ts b/x-pack/plugins/security_solution/server/lib/types.ts
index 29db38bbbea68..c735412aedbf5 100644
--- a/x-pack/plugins/security_solution/server/lib/types.ts
+++ b/x-pack/plugins/security_solution/server/lib/types.ts
@@ -48,21 +48,26 @@ export interface ShardsResponse {
failures?: ShardError[];
}
-export interface ShardError {
+/**
+ * This type is being very conservative with the partials to not expect anything to
+ * be guaranteed on the type as we don't have regular and proper types of ShardError.
+ * Once we do, remove this type for the regular ShardError type from the elastic library.
+ */
+export type ShardError = Partial<{
shard: number;
index: string;
node: string;
- reason: {
+ reason: Partial<{
type: string;
reason: string;
index_uuid: string;
index: string;
- caused_by: {
+ caused_by: Partial<{
type: string;
reason: string;
- };
- };
-}
+ }>;
+ }>;
+}>;
export interface SearchResponse {
took: number;
diff --git a/x-pack/plugins/telemetry_collection_xpack/tsconfig.json b/x-pack/plugins/telemetry_collection_xpack/tsconfig.json
new file mode 100644
index 0000000000000..476f5926f757a
--- /dev/null
+++ b/x-pack/plugins/telemetry_collection_xpack/tsconfig.json
@@ -0,0 +1,21 @@
+{
+ "extends": "../../../tsconfig.base.json",
+ "compilerOptions": {
+ "composite": true,
+ "outDir": "./target/types",
+ "emitDeclarationOnly": true,
+ "declaration": true,
+ "declarationMap": true
+ },
+ "include": [
+ "common/**/*",
+ "server/**/*",
+ "../../../typings/*"
+ ],
+ "references": [
+ { "path": "../../../src/core/tsconfig.json" },
+ { "path": "../../../src/plugins/telemetry_collection_manager/tsconfig.json" },
+ { "path": "../../../src/plugins/telemetry/tsconfig.json" }
+ ]
+}
+
diff --git a/x-pack/plugins/translations/translations/ja-JP.json b/x-pack/plugins/translations/translations/ja-JP.json
index 5cabdd62d7c87..7deecb82fb167 100644
--- a/x-pack/plugins/translations/translations/ja-JP.json
+++ b/x-pack/plugins/translations/translations/ja-JP.json
@@ -8570,9 +8570,6 @@
"xpack.indexLifecycleMgmt.editPolicy.lifecyclePoliciesLoadingFailedTitle": "既存のライフサイクルポリシーを読み込めません",
"xpack.indexLifecycleMgmt.editPolicy.lifecyclePoliciesReloadButton": "再試行",
"xpack.indexLifecycleMgmt.editPolicy.lifecyclePolicyDescriptionText": "インデックスへのアクティブな書き込みから削除までの、インデックスライフサイクルの 4 つのフェーズを自動化するには、インデックスポリシーを使用します。",
- "xpack.indexLifecycleMgmt.editPolicy.maximumAgeMissingError": "最高年齢が必要です。",
- "xpack.indexLifecycleMgmt.editPolicy.maximumDocumentsMissingError": "最高ドキュメント数が必要です。",
- "xpack.indexLifecycleMgmt.editPolicy.maximumIndexSizeMissingError": "最大インデックスサイズが必要です。",
"xpack.indexLifecycleMgmt.editPolicy.nameLabel": "名前",
"xpack.indexLifecycleMgmt.editPolicy.nodeAllocation.customOption.description": "ノード属性を使用して、シャード割り当てを制御します。{learnMoreLink}。",
"xpack.indexLifecycleMgmt.editPolicy.nodeAllocation.doNotModifyAllocationOption": "割り当て構成を修正しない",
@@ -20272,7 +20269,6 @@
"xpack.triggersActionsUI.sections.addModalConnectorForm.saveButtonLabel": "保存",
"xpack.triggersActionsUI.sections.addModalConnectorForm.updateSuccessNotificationText": "「{connectorName}」を作成しました",
"xpack.triggersActionsUI.sections.alertAdd.betaBadgeTooltipContent": "{pluginName} はベータ段階で、変更される可能性があります。デザインとコードはオフィシャル GA 機能よりも完成度が低く、現状のまま保証なしで提供されています。ベータ機能にはオフィシャル GA 機能の SLA が適用されません。",
- "xpack.triggersActionsUI.sections.alertAdd.cancelButtonLabel": "キャンセル",
"xpack.triggersActionsUI.sections.alertAdd.conditionPrompt": "条件を定義してください",
"xpack.triggersActionsUI.sections.alertAdd.errorLoadingAlertVisualizationTitle": "アラートビジュアライゼーションを読み込めません",
"xpack.triggersActionsUI.sections.alertAdd.flyoutTitle": "アラートの作成",
@@ -20280,7 +20276,6 @@
"xpack.triggersActionsUI.sections.alertAdd.loadingAlertVisualizationDescription": "アラートビジュアライゼーションを読み込み中...",
"xpack.triggersActionsUI.sections.alertAdd.operationName": "作成",
"xpack.triggersActionsUI.sections.alertAdd.previewAlertVisualizationDescription": "プレビューを生成するための式を完成します。",
- "xpack.triggersActionsUI.sections.alertAdd.saveButtonLabel": "保存",
"xpack.triggersActionsUI.sections.alertAdd.saveErrorNotificationText": "アラートを作成できません。",
"xpack.triggersActionsUI.sections.alertAdd.saveSuccessNotificationText": "「{alertName}」 を保存しました",
"xpack.triggersActionsUI.sections.alertAdd.selectIndex": "インデックスを選択してください",
diff --git a/x-pack/plugins/translations/translations/zh-CN.json b/x-pack/plugins/translations/translations/zh-CN.json
index 229938a3c1d08..d631fd525a945 100644
--- a/x-pack/plugins/translations/translations/zh-CN.json
+++ b/x-pack/plugins/translations/translations/zh-CN.json
@@ -8577,9 +8577,6 @@
"xpack.indexLifecycleMgmt.editPolicy.lifecyclePoliciesLoadingFailedTitle": "无法加载现有生命周期策略",
"xpack.indexLifecycleMgmt.editPolicy.lifecyclePoliciesReloadButton": "重试",
"xpack.indexLifecycleMgmt.editPolicy.lifecyclePolicyDescriptionText": "使用索引策略自动化索引生命周期的四个阶段,从频繁地写入到索引到删除索引。",
- "xpack.indexLifecycleMgmt.editPolicy.maximumAgeMissingError": "最大存在时间必填。",
- "xpack.indexLifecycleMgmt.editPolicy.maximumDocumentsMissingError": "最大文档数必填。",
- "xpack.indexLifecycleMgmt.editPolicy.maximumIndexSizeMissingError": "最大索引大小必填。",
"xpack.indexLifecycleMgmt.editPolicy.nameLabel": "名称",
"xpack.indexLifecycleMgmt.editPolicy.nodeAllocation.customOption.description": "使用节点属性控制分片分配。{learnMoreLink}。",
"xpack.indexLifecycleMgmt.editPolicy.nodeAllocation.doNotModifyAllocationOption": "不要修改分配配置",
@@ -20292,7 +20289,6 @@
"xpack.triggersActionsUI.sections.addModalConnectorForm.saveButtonLabel": "保存",
"xpack.triggersActionsUI.sections.addModalConnectorForm.updateSuccessNotificationText": "已创建“{connectorName}”",
"xpack.triggersActionsUI.sections.alertAdd.betaBadgeTooltipContent": "{pluginName} 为公测版,可能会进行更改。设计和代码相对于正式发行版功能还不够成熟,将按原样提供,且不提供任何保证。公测版功能不受正式发行版功能支持 SLA 的约束。",
- "xpack.triggersActionsUI.sections.alertAdd.cancelButtonLabel": "取消",
"xpack.triggersActionsUI.sections.alertAdd.conditionPrompt": "定义条件",
"xpack.triggersActionsUI.sections.alertAdd.errorLoadingAlertVisualizationTitle": "无法加载告警可视化",
"xpack.triggersActionsUI.sections.alertAdd.flyoutTitle": "创建告警",
@@ -20300,7 +20296,6 @@
"xpack.triggersActionsUI.sections.alertAdd.loadingAlertVisualizationDescription": "正在加载告警可视化……",
"xpack.triggersActionsUI.sections.alertAdd.operationName": "创建",
"xpack.triggersActionsUI.sections.alertAdd.previewAlertVisualizationDescription": "完成表达式以生成预览。",
- "xpack.triggersActionsUI.sections.alertAdd.saveButtonLabel": "保存",
"xpack.triggersActionsUI.sections.alertAdd.saveErrorNotificationText": "无法创建告警。",
"xpack.triggersActionsUI.sections.alertAdd.saveSuccessNotificationText": "已保存“{alertName}”",
"xpack.triggersActionsUI.sections.alertAdd.selectIndex": "选择索引",
diff --git a/x-pack/plugins/triggers_actions_ui/public/application/boot.tsx b/x-pack/plugins/triggers_actions_ui/public/application/boot.tsx
index c157f923e4447..80f9ac532d1c9 100644
--- a/x-pack/plugins/triggers_actions_ui/public/application/boot.tsx
+++ b/x-pack/plugins/triggers_actions_ui/public/application/boot.tsx
@@ -28,5 +28,7 @@ export const boot = (bootDeps: BootDeps) => {
,
element
);
- return () => unmountComponentAtNode(element);
+ return () => {
+ unmountComponentAtNode(element);
+ };
};
diff --git a/x-pack/plugins/triggers_actions_ui/public/application/components/health_check.test.tsx b/x-pack/plugins/triggers_actions_ui/public/application/components/health_check.test.tsx
index 1d908920db8b0..a7de73c9aab29 100644
--- a/x-pack/plugins/triggers_actions_ui/public/application/components/health_check.test.tsx
+++ b/x-pack/plugins/triggers_actions_ui/public/application/components/health_check.test.tsx
@@ -10,6 +10,7 @@ import { HealthCheck } from './health_check';
import { act } from 'react-dom/test-utils';
import { httpServiceMock } from '../../../../../../src/core/public/mocks';
+import { HealthContextProvider } from '../context/health_context';
const docLinks = { ELASTIC_WEBSITE_URL: 'elastic.co/', DOC_LINK_VERSION: 'current' };
@@ -20,9 +21,11 @@ describe('health check', () => {
http.get.mockImplementationOnce(() => new Promise(() => {}));
const { queryByText, container } = render(
-
- {'shouldnt render'}
-
+
+
+ {'shouldnt render'}
+
+
);
await act(async () => {
// wait for useEffect to run
@@ -32,13 +35,33 @@ describe('health check', () => {
expect(queryByText('shouldnt render')).not.toBeInTheDocument();
});
+ it('renders children immediately if waitForCheck is false', async () => {
+ http.get.mockImplementationOnce(() => new Promise(() => {}));
+
+ const { queryByText, container } = render(
+
+
+ {'should render'}
+
+
+ );
+ await act(async () => {
+ // wait for useEffect to run
+ });
+
+ expect(container.getElementsByClassName('euiLoadingSpinner').length).toBe(0);
+ expect(queryByText('should render')).toBeInTheDocument();
+ });
+
it('renders children if keys are enabled', async () => {
http.get.mockResolvedValue({ isSufficientlySecure: true, hasPermanentEncryptionKey: true });
const { queryByText } = render(
-
- {'should render'}
-
+
+
+ {'should render'}
+
+
);
await act(async () => {
// wait for useEffect to run
@@ -53,9 +76,11 @@ describe('health check', () => {
}));
const { queryAllByText } = render(
-
- {'should render'}
-
+
+
+ {'should render'}
+
+
);
await act(async () => {
// wait for useEffect to run
@@ -81,9 +106,11 @@ describe('health check', () => {
}));
const { queryByText, queryByRole } = render(
-
- {'should render'}
-
+
+
+ {'should render'}
+
+
);
await act(async () => {
// wait for useEffect to run
@@ -108,9 +135,11 @@ describe('health check', () => {
}));
const { queryByText } = render(
-
- {'should render'}
-
+
+
+ {'should render'}
+
+
);
await act(async () => {
// wait for useEffect to run
diff --git a/x-pack/plugins/triggers_actions_ui/public/application/components/health_check.tsx b/x-pack/plugins/triggers_actions_ui/public/application/components/health_check.tsx
index 009f582424765..c4d0b4976266e 100644
--- a/x-pack/plugins/triggers_actions_ui/public/application/components/health_check.tsx
+++ b/x-pack/plugins/triggers_actions_ui/public/application/components/health_check.tsx
@@ -18,33 +18,39 @@ import { EuiEmptyPrompt, EuiCode } from '@elastic/eui';
import { AlertingFrameworkHealth } from '../../types';
import { health } from '../lib/alert_api';
import './health_check.scss';
+import { useHealthContext } from '../context/health_context';
interface Props {
docLinks: Pick;
http: HttpSetup;
inFlyout?: boolean;
+ waitForCheck: boolean;
}
export const HealthCheck: React.FunctionComponent = ({
docLinks,
http,
children,
+ waitForCheck,
inFlyout = false,
}) => {
+ const { setLoadingHealthCheck } = useHealthContext();
const [alertingHealth, setAlertingHealth] = React.useState