Skip to content

Commit da96b50

Browse files
Add package ml jobs (#2496) (#2520)
* Add dga and lotl. Todo: datafeeds * Add ded and lmd draft * Add lmd descriptions * Add package descriptions and subsections * Update introduction * Add datafeeds * Fix typo * Update headers and address review feedback * Update docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc Co-authored-by: István Zoltán Szabó <[email protected]> * Update docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc Co-authored-by: István Zoltán Szabó <[email protected]> * Update docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc Co-authored-by: István Zoltán Szabó <[email protected]> * Update docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc Co-authored-by: István Zoltán Szabó <[email protected]> * Update docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc Co-authored-by: István Zoltán Szabó <[email protected]> * Batch address feedback * Batch address feedback --------- Co-authored-by: István Zoltán Szabó <[email protected]> Co-authored-by: Janeen Mikell Roberts <[email protected]> (cherry picked from commit 2d89bdd) Co-authored-by: Susan <[email protected]>
1 parent c814d5b commit da96b50

File tree

1 file changed

+191
-0
lines changed

1 file changed

+191
-0
lines changed

docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc

Lines changed: 191 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -382,6 +382,197 @@ they are listed for each job.
382382
|https://github.com/elastic/kibana/blob/{branch}/x-pack/plugins/ml/server/models/data_recognizer/modules/security_windows/ml/v3_windows_rare_user_type10_remote_login.json[image:images/link.svg[A link icon]]
383383
|https://github.com/elastic/kibana/blob/{branch}/x-pack/plugins/ml/server/models/data_recognizer/modules/security_windows/ml/datafeed_v3_windows_rare_user_type10_remote_login.json[image:images/link.svg[A link icon]]
384384

385+
|===
386+
// end::security-windows-jobs[]
387+
388+
[discrete]
389+
[[security-integrations-jobs]]
390+
== Security: Elastic Integrations
391+
392+
https://docs.elastic.co/integrations[Elastic Integrations] are a streamlined way to add Elastic assets to your environment, such as data ingestion, {transforms}, and in this case, {ml} capabilities for Security.
393+
394+
The following Integrations use {ml} to analyze patterns of user and entity behavior, and help detect and alert when there is related suspicious activity in your environment.
395+
396+
* https://docs.elastic.co/integrations/ded[Data Exfiltration Detection]
397+
* https://docs.elastic.co/integrations/dga[Domain Generation Algorithm Detection]
398+
* https://docs.elastic.co/integrations/lmd[Lateral Movement Detection]
399+
* https://docs.elastic.co/integrations/problemchild[Living off the Land Attack Detection]
400+
401+
// dga
402+
403+
*Domain Generation Algorithm (DGA) Detection*
404+
405+
{ml-cap} solution package to detect domain generation algorithm (DGA) activity in your network data. Refer to the {subscriptions}[subscription page] to learn more about the required subscription.
406+
407+
To download, refer to the https://docs.elastic.co/integrations/dga[documentation].
408+
409+
|===
410+
|Name |Description |Job |Datafeed
411+
412+
|dga_high_sum_probability
413+
|Detect domain generation algorithm (DGA) activity in your network data.
414+
|https://github.com/elastic/integrations/blob/{branch}/packages/dga/kibana/ml_module/dga-ml.json#L23[image:images/link.svg[A link icon]]
415+
|https://github.com/elastic/integrations/blob/{branch}/packages/dga/kibana/ml_module/dga-ml.json#L58[image:images/link.svg[A link icon]]
416+
417+
|===
418+
419+
// LotL
420+
421+
*Living off the Land Attack (LotL) Detection*
422+
423+
{ml-cap} solution package to detect Living off the Land (LotL) attacks in your environment. Refer to the {subscriptions}[subscription page] to learn more about the required subscription. (Also known as ProblemChild).
424+
425+
To download, refer to the https://docs.elastic.co/integrations/problemchild[documentation].
426+
427+
|===
428+
|Name |Description |Job |Datafeed
429+
430+
|problem_child_rare_process_by_host
431+
|Looks for a process that has been classified as malicious on a host that does not commonly manifest malicious process activity (experimental).
432+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L29[image:images/link.svg[A link icon]]
433+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
434+
435+
|problem_child_high_sum_by_host
436+
|Looks for a set of one or more malicious child processes on a single host (experimental).
437+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L64[image:images/link.svg[A link icon]]
438+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
439+
440+
|problem_child_rare_process_by_user
441+
|Looks for a process that has been classified as malicious where the user context is unusual and does not commonly manifest malicious process activity (experimental).
442+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L106[image:images/link.svg[A link icon]]
443+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
444+
445+
|problem_child_rare_process_by_parent
446+
|Looks for rare malicious child processes spawned by a parent process (experimental).
447+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L141[image:images/link.svg[A link icon]]
448+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
449+
450+
|problem_child_high_sum_by_user
451+
|Looks for a set of one or more malicious processes, started by the same user (experimental).
452+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L177[image:images/link.svg[A link icon]]
453+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
454+
455+
|problem_child_high_sum_by_parent
456+
|Looks for a set of one or more malicious child processes spawned by the same parent process (experimental).
457+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L219[image:images/link.svg[A link icon]]
458+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
459+
460+
|===
461+
462+
// ded
463+
464+
*Data Exfiltration Detection (DED)*
465+
466+
{ml-cap} package to detect data exfiltration in your network and file data. Refer to the {subscriptions}[subscription page] to learn more about the required subscription.
467+
468+
To download, refer to the https://docs.elastic.co/integrations/ded[documentation].
469+
470+
|===
471+
|Name |Description |Job |Datafeed
472+
473+
|high-sent-bytes-destination-geo-country_iso_code
474+
|Detects data exfiltration to an unusual geo-location (by country iso code).
475+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L44[image:images/link.svg[A link icon]]
476+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
477+
478+
|high-sent-bytes-destination-ip
479+
|Detects data exfiltration to an unusual geo-location (by IP address).
480+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L83[image:images/link.svg[A link icon]]
481+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
482+
483+
|high-sent-bytes-destination-port
484+
|Detects data exfiltration to an unusual destination port.
485+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L119[image:images/link.svg[A link icon]]
486+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
487+
488+
|high-sent-bytes-destination-region_name
489+
|Detects data exfiltration to an unusual geo-location (by region name).
490+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L156[image:images/link.svg[A link icon]]
491+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
492+
493+
|high-bytes-written-to-external-device
494+
|Detects data exfiltration activity by identifying high bytes written to an external device.
495+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L194[image:images/link.svg[A link icon]]
496+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
497+
498+
|rare-process-writing-to-external-device
499+
|Detects data exfiltration activity by identifying a file write started by a rare process to an external device.
500+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L231[image:images/link.svg[A link icon]]
501+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
502+
503+
|high-bytes-written-to-external-device-airdrop
504+
|Detects data exfiltration activity by identifying high bytes written to an external device via Airdrop.
505+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L268[image:images/link.svg[A link icon]]
506+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
507+
508+
|===
509+
510+
// lmd
511+
512+
*Lateral Movement Detection (LMD)*
513+
514+
{ml-cap} package to detect lateral movement based on file transfer activity and Windows RDP events. Refer to the {subscriptions}[subscription page] to learn more about the required subscription.
515+
516+
To download, refer to the https://docs.elastic.co/integrations/lmd[documentation].
517+
518+
|===
519+
|Name |Description |Job |Datafeed
520+
521+
|high-count-remote-file-transfer
522+
|Detects unusually high file transfers to a remote host in the network.
523+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L24[image:images/link.svg[A link icon]]
524+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
525+
526+
|high-file-size-remote-file-transfer
527+
|Detects unusually high size of files shared with a remote host in the network.
528+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L58[image:images/link.svg[A link icon]]
529+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
530+
531+
|rare-file-extension-remote-transfer
532+
|Detects data exfiltration to an unusual destination port.
533+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L92[image:images/link.svg[A link icon]]
534+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
535+
536+
|rare-file-path-remote-transfer
537+
|Detects unusual folders and directories on which a file is transferred.
538+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L126[image:images/link.svg[A link icon]]
539+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
540+
541+
|high-mean-rdp-session-duration
542+
|Detects unusually high mean of RDP session duration.
543+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L160[image:images/link.svg[A link icon]]
544+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
545+
546+
|high-var-rdp-session-duration
547+
|Detects unusually high variance in RDP session duration.
548+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L202[image:images/link.svg[A link icon]]
549+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
550+
551+
|high-sum-rdp-number-of-processes
552+
|Detects unusually high number of processes started in a single RDP session.
553+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L244[image:images/link.svg[A link icon]]
554+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
555+
556+
|unusual-time-weekday-rdp-session-start
557+
|Detects an RDP session started at an usual time or weekday.
558+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L286[image:images/link.svg[A link icon]]
559+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
560+
561+
|high-rdp-distinct-count-source-ip-for-destination
562+
|Detects a high count of source IPs making an RDP connection with a single destination IP.
563+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L326[image:images/link.svg[A link icon]]
564+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
565+
566+
|high-rdp-distinct-count-destination-ip-for-source
567+
|Detects a high count of destination IPs establishing an RDP connection with a single source IP.
568+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L360[image:images/link.svg[A link icon]]
569+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
570+
571+
|high-mean-rdp-process-args
572+
|Detects unusually high number of process arguments in an RDP session.
573+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L394[image:images/link.svg[A link icon]]
574+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
575+
385576
|===
386577
// end::security-windows-jobs[]
387578
// end::siem-jobs[]

0 commit comments

Comments
 (0)