Detects events which have a mismatch on the expected event agent ID. The status "agent_id_mismatch" occurs when the expected agent ID associated with the API key does not match the actual agent ID in an event. This could indicate attempts to spoof events in order to masquerade actual activity to evade detection.
Rule type: query
Risk score: 73
Runs every: 5 minutes
Maximum alerts per execution: 100
- Threat Detection
- Defense Evasion
Added (Elastic Stack release): 7.14.0
Rule authors: Elastic
Rule license: Elastic License v2
This is meant to run only on datasources using agents v7.14+ since versions prior to that will be missing the necessary field, resulting in false positives.