Loading

Install Elastic prebuilt rules

Elastic provides hundreds of prebuilt detection rules that cover common attack techniques across multiple platforms. This page explains how to install and enable prebuilt rules so they start generating alerts.

Air-gapped environments

For deployments without internet access, refer to Prebuilt rules in air-gapped environments.

Your subscription determines which prebuilt rule features are available:

Capability Elastic Stack Basic–Platinum Elastic Stack Enterprise Serverless Essentials Serverless Complete
Install and enable rules
View prerequisites and tags
Add exceptions
Configure rule actions
Update rules (accept Elastic version)
Duplicate and customize
Edit prebuilt rules directly
Review field-level update changes
Resolve update conflicts
Revert to Elastic version ✓ (9.1+)

With over 1,000 prebuilt rules available, enabling them all at once can lead to alert fatigue. Use this framework to start with a manageable set of high-value rules, then expand coverage over time.

  1. Confirm what data you have

    Rules can only fire if the telemetry they need is actually flowing into your environment. Before enabling any rules, list every data source currently indexed, not what you plan to add later.

    In the Rules table, filter by the Data Source tag matching each of your active integrations. This instantly cuts the rule list down to only what's executable in your environment.

    Tip

    Reading rule logic backwards to understand which fields the rule queries is one of the fastest ways to learn which log fields matter for detection.

  2. Exclude building block rules

    Building block rules (BBRs) feed signals into higher-order correlation rules. They are not meant to appear in your alert queue for triage. Enabling them early is the most common cause of alert floods for new deployments.

    In the Rules table, look for rules tagged as Rule Type: BBR and exclude them from your first wave. Focus on standard query, threshold, and EQL rules that produce direct alerts.

    Tip

    BBRs still have value. They elevate risk scores and feed correlation rules. Return to them once your baseline detection is stable.

  3. Filter to Critical and High severity only

    Elastic's severity ratings reflect the team's confidence that a match indicates genuinely suspicious or malicious behavior. Filter the rules list to show only Critical and High severity rules. Medium and Low severity rules are often useful but produce more noise. Leave them for later once you have a tuning workflow established.

    Tip

    For most environments, this combination brings the list from 1,000+ rules down to a manageable 30–80. That's a set you can actually review and understand before enabling.

  4. Pick 2–3 MITRE tactics relevant to your environment

    Don't try to cover the full MITRE ATT&CK matrix from day one. Anchor your first wave around the techniques that matter most given your environment, data sources, and any past incidents. Common starting choices include Execution, Persistence, Credential Access, Initial Access, and Defense Evasion.

    Use the MITRE ATT&CK coverage view to visualize where your enabled rules provide coverage and where gaps remain.

    Tip

    If you've had a past incident, those tactics and techniques are almost always worth enabling first. They reflect real attacker behavior in your specific environment.

After your initial rules have been running for at least two weeks and you have a tuning workflow established, consider these additional actions. They can be done in any order.

The core principle

A rule you understand, have data for, and have tuned is worth far more than 100 rules enabled blindly. Start narrow, run for two weeks, tune what fires, then expand. Alert fatigue from over-enablement is harder to recover from than starting small.

Most prebuilt rules don't start running by default. Use Install and enable to start rules immediately, or install first and enable later.

  1. Find Detection rules (SIEM) in the navigation menu or by using the global search field, then go to the Rules table.

    The badge next to Add Elastic rules shows the number of prebuilt rules available for installation.

    The Add Elastic Rules page
  2. Select Add Elastic rules.

    Tip

    To examine the details of a rule before you install it, select the rule name. This opens the rule details flyout.

  3. Do one of the following:

    • Install all available rules: Select Install all at the top of the page. This installs the rules but doesn't enable them—you still need to enable them manually.
    • Install a single rule: In the rules table, either select Install to install a rule without enabling it, or select , then Install and enable to start running the rule once it's installed.
    • Install multiple rules: Select the rules, and then at the top of the page either select Install x selected rule(s) to install without enabling the rules, or select > Install and enable to install and start running the rules.
    Tip

    Use the search bar and Tags filter to find the rules you want to install. For example, filter by OS: Windows if your environment only includes Windows endpoints. For more on tag categories, refer to Prebuilt rule tags.

    The Add Elastic Rules page
  4. For any rules you haven't already enabled, go back to the Rules page, search or filter for the rules you want to run, and do either of the following:

    • Enable a single rule: Turn on the rule's Enabled switch.
    • Enable multiple rules: Select the rules, then select Bulk actions > Enable.

Once you enable a rule, it starts running on its configured schedule. To confirm that it's running successfully, check its Last response status in the rules table, or open the rule's details page and check the Execution results tab.

Endpoint protection rules

Some prebuilt rules serve special purposes: Endpoint protection rules generate alerts from Elastic Defend's threat monitoring and prevention, while the External Alerts rule creates alerts for incoming third-party system alerts (for example, Suricata alerts).

After installing prebuilt rules:

  • Keep rules current: Elastic regularly updates prebuilt rules to detect new threats. Refer to Update Elastic prebuilt rules to learn how to apply updates.
  • Customize rules: Adapt prebuilt rules to your environment by editing them directly (Enterprise) or duplicating and modifying copies. Refer to Customize Elastic prebuilt rules.
  • Build custom rules: Create detection logic tailored to your infrastructure. Refer to Author rules.