This rule uses alert data to determine when multiple alerts in different phases of an attack involving the same host are triggered. Analysts can use this to prioritize triage and response, as these hosts are more likely to be compromised.
Rule type: threshold
Risk score: 73
Runs every: 1 hour
Searches indices from: now-24h (Date Math format, see also
Additional look-back time)
Maximum alerts per execution: 100
- Threat Detection
- Higher-Order Rules
Added (Elastic Stack release): 8.6.0
Rule authors: Elastic
Rule license: Elastic License v2
False positives can occur because the rules may be mapped to a few MITRE ATT&CK tactics. Use the attached Timeline to determine which detections were triggered on the host.
signal.rule.name:* and kibana.alert.rule.threat.tactic.id:*
Intro to Kibana
ELK for Logs & Metrics