You are looking at preliminary documentation for a future release.
Not what you want? See the
current release documentation.
Multiple Alerts in Different ATT&CK Tactics on a Single Hostedit
This rule uses alert data to determine when multiple alerts in different phases of an attack involving the same host are triggered. Analysts can use this to prioritize triage and response, as these hosts are more likely to be compromised.
Rule type: threshold
Rule indices:
- .alerts-*
Severity: high
Risk score: 73
Runs every: 1 hour
Searches indices from: now-24h (Date Math format, see also Additional look-back time
)
Maximum alerts per execution: 100
Tags:
- Elastic
- Threat Detection
- Higher-Order Rules
Version: 1
Added (Elastic Stack release): 8.6.0
Rule authors: Elastic
Rule license: Elastic License v2
Potential false positivesedit
False positives can occur because the rules may be mapped to a few MITRE ATT&CK tactics. Use the attached Timeline to determine which detections were triggered on the host.
Rule queryedit
signal.rule.name:* and kibana.alert.rule.threat.tactic.id:*