You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Add dga and lotl. Todo: datafeeds
* Add ded and lmd draft
* Add lmd descriptions
* Add package descriptions and subsections
* Update introduction
* Add datafeeds
* Fix typo
* Update headers and address review feedback
* Update docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc
Co-authored-by: István Zoltán Szabó <[email protected]>
* Update docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc
Co-authored-by: István Zoltán Szabó <[email protected]>
* Update docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc
Co-authored-by: István Zoltán Szabó <[email protected]>
* Update docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc
Co-authored-by: István Zoltán Szabó <[email protected]>
* Update docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc
Co-authored-by: István Zoltán Szabó <[email protected]>
* Batch address feedback
* Batch address feedback
---------
Co-authored-by: István Zoltán Szabó <[email protected]>
Co-authored-by: Janeen Mikell Roberts <[email protected]>
(cherry picked from commit 2d89bdd)
Co-authored-by: Susan <[email protected]>
Copy file name to clipboardExpand all lines: docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc
+191Lines changed: 191 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -382,6 +382,197 @@ they are listed for each job.
382
382
|https://github.com/elastic/kibana/blob/{branch}/x-pack/plugins/ml/server/models/data_recognizer/modules/security_windows/ml/v3_windows_rare_user_type10_remote_login.json[image:images/link.svg[A link icon]]
383
383
|https://github.com/elastic/kibana/blob/{branch}/x-pack/plugins/ml/server/models/data_recognizer/modules/security_windows/ml/datafeed_v3_windows_rare_user_type10_remote_login.json[image:images/link.svg[A link icon]]
384
384
385
+
|===
386
+
// end::security-windows-jobs[]
387
+
388
+
[discrete]
389
+
[[security-integrations-jobs]]
390
+
== Security: Elastic Integrations
391
+
392
+
https://docs.elastic.co/integrations[Elastic Integrations] are a streamlined way to add Elastic assets to your environment, such as data ingestion, {transforms}, and in this case, {ml} capabilities for Security.
393
+
394
+
The following Integrations use {ml} to analyze patterns of user and entity behavior, and help detect and alert when there is related suspicious activity in your environment.
* https://docs.elastic.co/integrations/lmd[Lateral Movement Detection]
399
+
* https://docs.elastic.co/integrations/problemchild[Living off the Land Attack Detection]
400
+
401
+
// dga
402
+
403
+
*Domain Generation Algorithm (DGA) Detection*
404
+
405
+
{ml-cap} solution package to detect domain generation algorithm (DGA) activity in your network data. Refer to the {subscriptions}[subscription page] to learn more about the required subscription.
406
+
407
+
To download, refer to the https://docs.elastic.co/integrations/dga[documentation].
408
+
409
+
|===
410
+
|Name |Description |Job |Datafeed
411
+
412
+
|dga_high_sum_probability
413
+
|Detect domain generation algorithm (DGA) activity in your network data.
414
+
|https://github.com/elastic/integrations/blob/{branch}/packages/dga/kibana/ml_module/dga-ml.json#L23[image:images/link.svg[A link icon]]
415
+
|https://github.com/elastic/integrations/blob/{branch}/packages/dga/kibana/ml_module/dga-ml.json#L58[image:images/link.svg[A link icon]]
416
+
417
+
|===
418
+
419
+
// LotL
420
+
421
+
*Living off the Land Attack (LotL) Detection*
422
+
423
+
{ml-cap} solution package to detect Living off the Land (LotL) attacks in your environment. Refer to the {subscriptions}[subscription page] to learn more about the required subscription. (Also known as ProblemChild).
424
+
425
+
To download, refer to the https://docs.elastic.co/integrations/problemchild[documentation].
426
+
427
+
|===
428
+
|Name |Description |Job |Datafeed
429
+
430
+
|problem_child_rare_process_by_host
431
+
|Looks for a process that has been classified as malicious on a host that does not commonly manifest malicious process activity (experimental).
432
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L29[image:images/link.svg[A link icon]]
433
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
434
+
435
+
|problem_child_high_sum_by_host
436
+
|Looks for a set of one or more malicious child processes on a single host (experimental).
437
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L64[image:images/link.svg[A link icon]]
438
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
439
+
440
+
|problem_child_rare_process_by_user
441
+
|Looks for a process that has been classified as malicious where the user context is unusual and does not commonly manifest malicious process activity (experimental).
442
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L106[image:images/link.svg[A link icon]]
443
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
444
+
445
+
|problem_child_rare_process_by_parent
446
+
|Looks for rare malicious child processes spawned by a parent process (experimental).
447
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L141[image:images/link.svg[A link icon]]
448
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
449
+
450
+
|problem_child_high_sum_by_user
451
+
|Looks for a set of one or more malicious processes, started by the same user (experimental).
452
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L177[image:images/link.svg[A link icon]]
453
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
454
+
455
+
|problem_child_high_sum_by_parent
456
+
|Looks for a set of one or more malicious child processes spawned by the same parent process (experimental).
457
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L219[image:images/link.svg[A link icon]]
458
+
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
459
+
460
+
|===
461
+
462
+
// ded
463
+
464
+
*Data Exfiltration Detection (DED)*
465
+
466
+
{ml-cap} package to detect data exfiltration in your network and file data. Refer to the {subscriptions}[subscription page] to learn more about the required subscription.
467
+
468
+
To download, refer to the https://docs.elastic.co/integrations/ded[documentation].
469
+
470
+
|===
471
+
|Name |Description |Job |Datafeed
472
+
473
+
|high-sent-bytes-destination-geo-country_iso_code
474
+
|Detects data exfiltration to an unusual geo-location (by country iso code).
475
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L44[image:images/link.svg[A link icon]]
476
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
477
+
478
+
|high-sent-bytes-destination-ip
479
+
|Detects data exfiltration to an unusual geo-location (by IP address).
480
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L83[image:images/link.svg[A link icon]]
481
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
482
+
483
+
|high-sent-bytes-destination-port
484
+
|Detects data exfiltration to an unusual destination port.
485
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L119[image:images/link.svg[A link icon]]
486
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
487
+
488
+
|high-sent-bytes-destination-region_name
489
+
|Detects data exfiltration to an unusual geo-location (by region name).
490
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L156[image:images/link.svg[A link icon]]
491
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
492
+
493
+
|high-bytes-written-to-external-device
494
+
|Detects data exfiltration activity by identifying high bytes written to an external device.
495
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L194[image:images/link.svg[A link icon]]
496
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
497
+
498
+
|rare-process-writing-to-external-device
499
+
|Detects data exfiltration activity by identifying a file write started by a rare process to an external device.
500
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L231[image:images/link.svg[A link icon]]
501
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
502
+
503
+
|high-bytes-written-to-external-device-airdrop
504
+
|Detects data exfiltration activity by identifying high bytes written to an external device via Airdrop.
505
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L268[image:images/link.svg[A link icon]]
506
+
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
507
+
508
+
|===
509
+
510
+
// lmd
511
+
512
+
*Lateral Movement Detection (LMD)*
513
+
514
+
{ml-cap} package to detect lateral movement based on file transfer activity and Windows RDP events. Refer to the {subscriptions}[subscription page] to learn more about the required subscription.
515
+
516
+
To download, refer to the https://docs.elastic.co/integrations/lmd[documentation].
517
+
518
+
|===
519
+
|Name |Description |Job |Datafeed
520
+
521
+
|high-count-remote-file-transfer
522
+
|Detects unusually high file transfers to a remote host in the network.
523
+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L24[image:images/link.svg[A link icon]]
524
+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
525
+
526
+
|high-file-size-remote-file-transfer
527
+
|Detects unusually high size of files shared with a remote host in the network.
528
+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L58[image:images/link.svg[A link icon]]
529
+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
530
+
531
+
|rare-file-extension-remote-transfer
532
+
|Detects data exfiltration to an unusual destination port.
533
+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L92[image:images/link.svg[A link icon]]
534
+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
535
+
536
+
|rare-file-path-remote-transfer
537
+
|Detects unusual folders and directories on which a file is transferred.
538
+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L126[image:images/link.svg[A link icon]]
539
+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
540
+
541
+
|high-mean-rdp-session-duration
542
+
|Detects unusually high mean of RDP session duration.
543
+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L160[image:images/link.svg[A link icon]]
544
+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
545
+
546
+
|high-var-rdp-session-duration
547
+
|Detects unusually high variance in RDP session duration.
548
+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L202[image:images/link.svg[A link icon]]
549
+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
550
+
551
+
|high-sum-rdp-number-of-processes
552
+
|Detects unusually high number of processes started in a single RDP session.
553
+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L244[image:images/link.svg[A link icon]]
554
+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
555
+
556
+
|unusual-time-weekday-rdp-session-start
557
+
|Detects an RDP session started at an usual time or weekday.
558
+
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L286[image:images/link.svg[A link icon]]
559
+
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
0 commit comments