Tag
Multiple Rare Elastic Defend Behavior Rules Triggered on Single Host
2 rules 8 TTPsThis rule identifies hosts triggering multiple distinct, globally rare Elastic Defend behavior rules, increasing the likelihood of detecting compromised hosts while reducing false positives.
Multiple Alerts in Different ATT&CK Tactics by Host
3 rules 3 TTPsThis rule uses alert data to identify hosts with multiple alerts across different ATT&CK tactics, indicating a higher likelihood of compromise and enabling analysts to prioritize triage and response based on accumulated risk score.
Multiple Alerts Involving a User Detection
2 rules 3 TTPsThis rule identifies when multiple different alerts involving the same user are triggered, which could indicate a compromised user account and requires further investigation.
Newly Observed High Severity Detection Alert in Elastic SIEM
3 rulesThis rule detects newly observed, low-frequency, high-severity Elastic SIEM detection alerts affecting a single agent, helping prioritize triage and response by highlighting alerts tied to specific detection rules that have not been seen previously for the host.
Multiple Alerts in Same ATT&CK Tactic by Host
2 rules 4 TTPsThis rule correlates multiple security alerts associated with the same ATT&CK tactic on a single host within a defined time window, helping to identify hosts exhibiting concentrated malicious behavior indicative of an active intrusion or post-compromise activity, focusing on Credential Access, Defense Evasion, Execution, and Command and Control tactics.