Update multiple detection rules Deprecated

PUT /api/detection_engine/rules/_bulk_update

Update multiple detection rules using the rule_id or id field. The original rules are replaced, and all unspecified fields are deleted.

This API is deprecated and will be removed in Kibana v9.0.


When used with API key authentication, the user's key gets assigned to the affected rules. If the user's key gets deleted or the user becomes inactive, the rules will stop running.

If the API key that is used for authorization has different privileges than the key that created or most recently updated the rule, the rule behavior might change.

application/json

Body object Required

A JSON array where each element includes the id or rule_id field of the rule you want to update and the fields you want to be specified in this rule.

All unspecified fields are deleted. You cannot modify the id or rule_id values.

Any of:

Responses

  • 200 application/json

    Indicates a successful call.

    One of:
PUT /api/detection_engine/rules/_bulk_update
curl \
 --request PUT 'https://localhost:5601/api/detection_engine/rules/_bulk_update' \
 --header "Authorization: $API_KEY" \
 --header "Content-Type: application/json" \
 --data '[{"id":"7d2f5ed8-6c05-44ab-81ce-9160ae147057","name":"Updated Google Workspace Suspended User Account Renewed","tags":["new_tag"],"type":"query","severity":"low","risk_score":21,"description":"Detects when a previously suspended user's account is renewed in Google Workspace. An adversary may renew a suspended user account to maintain access to the Google Workspace organization with a valid account."},{"id":"43b2dc3b-4f21-4a10-95e2-0dbc19e6e974","name":"Updated AWS Redshift Cluster Creation","tags":["new_tag"],"type":"query","severity":"low","risk_score":21,"description":"Identifies the creation of an Amazon Redshift cluster. Unexpected creation of this cluster by a non-administrative user may indicate a permission or role issue with current users. If unexpected, the resource may not properly be configured and could introduce security vulnerabilities."}]'
Request example
[
  {
    "id": "7d2f5ed8-6c05-44ab-81ce-9160ae147057",
    "name": "Updated Google Workspace Suspended User Account Renewed",
    "tags": [
      "new_tag"
    ],
    "type": "query",
    "severity": "low",
    "risk_score": 21,
    "description": "Detects when a previously suspended user's account is renewed in Google Workspace. An adversary may renew a suspended user account to maintain access to the Google Workspace organization with a valid account."
  },
  {
    "id": "43b2dc3b-4f21-4a10-95e2-0dbc19e6e974",
    "name": "Updated AWS Redshift Cluster Creation",
    "tags": [
      "new_tag"
    ],
    "type": "query",
    "severity": "low",
    "risk_score": 21,
    "description": "Identifies the creation of an Amazon Redshift cluster. Unexpected creation of this cluster by a non-administrative user may indicate a permission or role issue with current users. If unexpected, the resource may not properly be configured and could introduce security vulnerabilities."
  }
]