Skip to content

Commit ef2e45d

Browse files
Fixes URLs in OOTB security jobs and updates job IDs (#2563) (#2564)
(cherry picked from commit 0d20ee9) Co-authored-by: István Zoltán Szabó <[email protected]>
1 parent 5b4ef3e commit ef2e45d

File tree

1 file changed

+56
-83
lines changed

1 file changed

+56
-83
lines changed

docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc

Lines changed: 56 additions & 83 deletions
Original file line numberDiff line numberDiff line change
@@ -389,9 +389,13 @@ they are listed for each job.
389389
[[security-integrations-jobs]]
390390
== Security: Elastic Integrations
391391

392-
https://docs.elastic.co/integrations[Elastic Integrations] are a streamlined way to add Elastic assets to your environment, such as data ingestion, {transforms}, and in this case, {ml} capabilities for Security.
392+
https://docs.elastic.co/integrations[Elastic Integrations] are a streamlined way
393+
to add Elastic assets to your environment, such as data ingestion, {transforms},
394+
and in this case, {ml} capabilities for Security.
393395

394-
The following Integrations use {ml} to analyze patterns of user and entity behavior, and help detect and alert when there is related suspicious activity in your environment.
396+
The following Integrations use {ml} to analyze patterns of user and entity
397+
behavior, and help detect and alert when there is related suspicious activity in
398+
your environment.
395399

396400
* https://docs.elastic.co/integrations/ded[Data Exfiltration Detection]
397401
* https://docs.elastic.co/integrations/dga[Domain Generation Algorithm Detection]
@@ -402,63 +406,59 @@ The following Integrations use {ml} to analyze patterns of user and entity behav
402406

403407
*Domain Generation Algorithm (DGA) Detection*
404408

405-
{ml-cap} solution package to detect domain generation algorithm (DGA) activity in your network data. Refer to the {subscriptions}[subscription page] to learn more about the required subscription.
409+
{ml-cap} solution package to detect domain generation algorithm (DGA) activity
410+
in your network data. Refer to the {subscriptions}[subscription page] to learn
411+
more about the required subscription.
406412

407413
To download, refer to the https://docs.elastic.co/integrations/dga[documentation].
408414

409415
|===
410-
|Name |Description |Job |Datafeed
416+
|Name |Description
411417

412418
|dga_high_sum_probability
413419
|Detect domain generation algorithm (DGA) activity in your network data.
414-
|https://github.com/elastic/integrations/blob/{branch}/packages/dga/kibana/ml_module/dga-ml.json#L23[image:images/link.svg[A link icon]]
415-
|https://github.com/elastic/integrations/blob/{branch}/packages/dga/kibana/ml_module/dga-ml.json#L58[image:images/link.svg[A link icon]]
416420

417421
|===
418422

423+
The job configurations and datafeeds can be found
424+
https://github.com/elastic/integrations/blob/main/packages/dga/kibana/ml_module/dga-ml.json[here].
425+
419426
// LotL
420427

421428
*Living off the Land Attack (LotL) Detection*
422429

423-
{ml-cap} solution package to detect Living off the Land (LotL) attacks in your environment. Refer to the {subscriptions}[subscription page] to learn more about the required subscription. (Also known as ProblemChild).
430+
{ml-cap} solution package to detect Living off the Land (LotL) attacks in your
431+
environment. Refer to the {subscriptions}[subscription page] to learn more about
432+
the required subscription. (Also known as ProblemChild).
424433

425434
To download, refer to the https://docs.elastic.co/integrations/problemchild[documentation].
426435

427436
|===
428-
|Name |Description |Job |Datafeed
437+
|Name |Description
429438

430439
|problem_child_rare_process_by_host
431-
|Looks for a process that has been classified as malicious on a host that does not commonly manifest malicious process activity (experimental).
432-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L29[image:images/link.svg[A link icon]]
433-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
440+
|Looks for a process that has been classified as malicious on a host that does not commonly manifest malicious process activity.
434441

435442
|problem_child_high_sum_by_host
436-
|Looks for a set of one or more malicious child processes on a single host (experimental).
437-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L64[image:images/link.svg[A link icon]]
438-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
443+
|Looks for a set of one or more malicious child processes on a single host.
439444

440445
|problem_child_rare_process_by_user
441-
|Looks for a process that has been classified as malicious where the user context is unusual and does not commonly manifest malicious process activity (experimental).
442-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L106[image:images/link.svg[A link icon]]
443-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
446+
|Looks for a process that has been classified as malicious where the user context is unusual and does not commonly manifest malicious process activity.
444447

445448
|problem_child_rare_process_by_parent
446-
|Looks for rare malicious child processes spawned by a parent process (experimental).
447-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L141[image:images/link.svg[A link icon]]
448-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
449+
|Looks for rare malicious child processes spawned by a parent process.
449450

450451
|problem_child_high_sum_by_user
451-
|Looks for a set of one or more malicious processes, started by the same user (experimental).
452-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L177[image:images/link.svg[A link icon]]
453-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
452+
|Looks for a set of one or more malicious processes, started by the same user.
454453

455454
|problem_child_high_sum_by_parent
456-
|Looks for a set of one or more malicious child processes spawned by the same parent process (experimental).
457-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L219[image:images/link.svg[A link icon]]
458-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
455+
|Looks for a set of one or more malicious child processes spawned by the same parent process.
459456

460457
|===
461458

459+
The job configurations and datafeeds can be found
460+
https://github.com/elastic/integrations/blob/main/packages/problemchild/kibana/ml_module/problemchild-ml.json[here].
461+
462462
// ded
463463

464464
*Data Exfiltration Detection (DED)*
@@ -468,111 +468,84 @@ To download, refer to the https://docs.elastic.co/integrations/problemchild[docu
468468
To download, refer to the https://docs.elastic.co/integrations/ded[documentation].
469469

470470
|===
471-
|Name |Description |Job |Datafeed
471+
|Name |Description
472472

473-
|high-sent-bytes-destination-geo-country_iso_code
473+
|ded_high_sent_bytes_destination_geo_country_iso_code
474474
|Detects data exfiltration to an unusual geo-location (by country iso code).
475-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L44[image:images/link.svg[A link icon]]
476-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
477475

478-
|high-sent-bytes-destination-ip
476+
|ded_high_sent_bytes_destination_ip
479477
|Detects data exfiltration to an unusual geo-location (by IP address).
480-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L83[image:images/link.svg[A link icon]]
481-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
482478

483-
|high-sent-bytes-destination-port
479+
|ded_high_sent_bytes_destination_port
484480
|Detects data exfiltration to an unusual destination port.
485-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L119[image:images/link.svg[A link icon]]
486-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
487481

488-
|high-sent-bytes-destination-region_name
482+
|ded_high_sent_bytes_destination_region_name
489483
|Detects data exfiltration to an unusual geo-location (by region name).
490-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L156[image:images/link.svg[A link icon]]
491-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
492484

493-
|high-bytes-written-to-external-device
485+
|ded_high_bytes_written_to_external_device
494486
|Detects data exfiltration activity by identifying high bytes written to an external device.
495-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L194[image:images/link.svg[A link icon]]
496-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
497487

498-
|rare-process-writing-to-external-device
488+
|ded_rare_process_writing_to_external_device
499489
|Detects data exfiltration activity by identifying a file write started by a rare process to an external device.
500-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L231[image:images/link.svg[A link icon]]
501-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
502490

503-
|high-bytes-written-to-external-device-airdrop
491+
|ded_high_bytes_written_to_external_device_airdrop
504492
|Detects data exfiltration activity by identifying high bytes written to an external device via Airdrop.
505-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L268[image:images/link.svg[A link icon]]
506-
|https://github.com/elastic/integrations/blob/{branch}/packages/ded/kibana/ml_module/ded-ml.json#L304[image:images/link.svg[A link icon]]
507493

508494
|===
509495

496+
The job configurations and datafeeds can be found
497+
https://github.com/elastic/integrations/blob/main/packages/ded/kibana/ml_module/ded-ml.json[here].
498+
510499
// lmd
511500

512501
*Lateral Movement Detection (LMD)*
513502

514-
{ml-cap} package to detect lateral movement based on file transfer activity and Windows RDP events. Refer to the {subscriptions}[subscription page] to learn more about the required subscription.
503+
{ml-cap} package to detect lateral movement based on file transfer activity and
504+
Windows RDP events. Refer to the {subscriptions}[subscription page] to learn
505+
more about the required subscription.
515506

516507
To download, refer to the https://docs.elastic.co/integrations/lmd[documentation].
517508

518509
|===
519-
|Name |Description |Job |Datafeed
510+
|Name |Description
520511

521-
|high-count-remote-file-transfer
512+
|lmd_high_count_remote_file_transfer
522513
|Detects unusually high file transfers to a remote host in the network.
523-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L24[image:images/link.svg[A link icon]]
524-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
525514

526-
|high-file-size-remote-file-transfer
515+
|lmd_high_file_size_remote_file_transfer
527516
|Detects unusually high size of files shared with a remote host in the network.
528-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L58[image:images/link.svg[A link icon]]
529-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
530517

531-
|rare-file-extension-remote-transfer
518+
|lmd_rare_file_extension_remote_transfer
532519
|Detects data exfiltration to an unusual destination port.
533-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L92[image:images/link.svg[A link icon]]
534-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
535520

536-
|rare-file-path-remote-transfer
521+
|lmd_rare_file_path_remote_transfer
537522
|Detects unusual folders and directories on which a file is transferred.
538-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L126[image:images/link.svg[A link icon]]
539-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
540523

541-
|high-mean-rdp-session-duration
524+
|lmd_high_mean_rdp_session_duration
542525
|Detects unusually high mean of RDP session duration.
543-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L160[image:images/link.svg[A link icon]]
544-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
545526

546-
|high-var-rdp-session-duration
527+
|lmd_high_var_rdp_session_duration
547528
|Detects unusually high variance in RDP session duration.
548-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L202[image:images/link.svg[A link icon]]
549-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
550529

551-
|high-sum-rdp-number-of-processes
530+
|lmd_high_sum_rdp_number_of_processes
552531
|Detects unusually high number of processes started in a single RDP session.
553-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L244[image:images/link.svg[A link icon]]
554-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
555532

556-
|unusual-time-weekday-rdp-session-start
533+
|lmd_unusual_time_weekday_rdp_session_start
557534
|Detects an RDP session started at an usual time or weekday.
558-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L286[image:images/link.svg[A link icon]]
559-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
560535

561-
|high-rdp-distinct-count-source-ip-for-destination
536+
|lmd_high_rdp_distinct_count_source_ip_for_destination
562537
|Detects a high count of source IPs making an RDP connection with a single destination IP.
563-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L326[image:images/link.svg[A link icon]]
564-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
565538

566-
|high-rdp-distinct-count-destination-ip-for-source
539+
|lmd_high_rdp_distinct_count_destination_ip_for_source
567540
|Detects a high count of destination IPs establishing an RDP connection with a single source IP.
568-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L360[image:images/link.svg[A link icon]]
569-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
570541

571-
|high-mean-rdp-process-args
542+
|lmd_high_mean_rdp_process_args
572543
|Detects unusually high number of process arguments in an RDP session.
573-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L394[image:images/link.svg[A link icon]]
574-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
575544

576545
|===
546+
547+
The job configurations and datafeeds can be found
548+
https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json[here].
549+
577550
// end::security-windows-jobs[]
578551
// end::siem-jobs[]

0 commit comments

Comments
 (0)