Detects when multiple hosts are using the same agent ID. This could occur in the event of an agent being taken over and used to inject illegitimate documents into an instance as an attempt to spoof events in order to masquerade actual activity to evade detection.
Rule type: threshold
Risk score: 73
Runs every: 5 minutes
Maximum alerts per execution: 100
- Threat Detection
- Defense Evasion
Added (Elastic Stack release): 7.14.0
Rule authors: Elastic
Rule license: Elastic License v2
This is meant to run only on datasources using agents v7.14+ since versions prior to that will be missing the necessary field, resulting in false positives.