Skip to content
Threat Feed

Tag

Higher-Order-Rule

5 briefs RSS
critical advisory

Multiple Rare Elastic Defend Behavior Rules Triggered on Single Host

This rule identifies hosts triggering multiple distinct, globally rare Elastic Defend behavior rules, increasing the likelihood of detecting compromised hosts while reducing false positives.

threat-detection higher-order-rule elastic-defend
2r 8t
high advisory

Multiple Alerts in Different ATT&CK Tactics by Host

This rule uses alert data to identify hosts with multiple alerts across different ATT&CK tactics, indicating a higher likelihood of compromise and enabling analysts to prioritize triage and response based on accumulated risk score.

threat-detection higher-order-rule
3r 3t
high advisory

Multiple Alerts Involving a User Detection

This rule identifies when multiple different alerts involving the same user are triggered, which could indicate a compromised user account and requires further investigation.

Elastic Security threat-detection higher-order-rule
2r 3t
high advisory

Newly Observed High Severity Detection Alert in Elastic SIEM

This rule detects newly observed, low-frequency, high-severity Elastic SIEM detection alerts affecting a single agent, helping prioritize triage and response by highlighting alerts tied to specific detection rules that have not been seen previously for the host.

SIEM threat-detection higher-order-rule elastic-siem
3r
high advisory

Multiple Alerts in Same ATT&CK Tactic by Host

This rule correlates multiple security alerts associated with the same ATT&CK tactic on a single host within a defined time window, helping to identify hosts exhibiting concentrated malicious behavior indicative of an active intrusion or post-compromise activity, focusing on Credential Access, Defense Evasion, Execution, and Command and Control tactics.

Elastic Security threat-detection higher-order-rule attack
2r 4t