You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc
+56-83Lines changed: 56 additions & 83 deletions
Original file line number
Diff line number
Diff line change
@@ -389,9 +389,13 @@ they are listed for each job.
389
389
[[security-integrations-jobs]]
390
390
== Security: Elastic Integrations
391
391
392
-
https://docs.elastic.co/integrations[Elastic Integrations] are a streamlined way to add Elastic assets to your environment, such as data ingestion, {transforms}, and in this case, {ml} capabilities for Security.
392
+
https://docs.elastic.co/integrations[Elastic Integrations] are a streamlined way
393
+
to add Elastic assets to your environment, such as data ingestion, {transforms},
394
+
and in this case, {ml} capabilities for Security.
393
395
394
-
The following Integrations use {ml} to analyze patterns of user and entity behavior, and help detect and alert when there is related suspicious activity in your environment.
396
+
The following Integrations use {ml} to analyze patterns of user and entity
397
+
behavior, and help detect and alert when there is related suspicious activity in
@@ -402,63 +406,59 @@ The following Integrations use {ml} to analyze patterns of user and entity behav
402
406
403
407
*Domain Generation Algorithm (DGA) Detection*
404
408
405
-
{ml-cap} solution package to detect domain generation algorithm (DGA) activity in your network data. Refer to the {subscriptions}[subscription page] to learn more about the required subscription.
409
+
{ml-cap} solution package to detect domain generation algorithm (DGA) activity
410
+
in your network data. Refer to the {subscriptions}[subscription page] to learn
411
+
more about the required subscription.
406
412
407
413
To download, refer to the https://docs.elastic.co/integrations/dga[documentation].
408
414
409
415
|===
410
-
|Name |Description |Job |Datafeed
416
+
|Name |Description
411
417
412
418
|dga_high_sum_probability
413
419
|Detect domain generation algorithm (DGA) activity in your network data.
414
-
|https://github.com/elastic/integrations/blob/{branch}/packages/dga/kibana/ml_module/dga-ml.json#L23[image:images/link.svg[A link icon]]
415
-
|https://github.com/elastic/integrations/blob/{branch}/packages/dga/kibana/ml_module/dga-ml.json#L58[image:images/link.svg[A link icon]]
{ml-cap} solution package to detect Living off the Land (LotL) attacks in your environment. Refer to the {subscriptions}[subscription page] to learn more about the required subscription. (Also known as ProblemChild).
430
+
{ml-cap} solution package to detect Living off the Land (LotL) attacks in your
431
+
environment. Refer to the {subscriptions}[subscription page] to learn more about
432
+
the required subscription. (Also known as ProblemChild).
424
433
425
434
To download, refer to the https://docs.elastic.co/integrations/problemchild[documentation].
426
435
427
436
|===
428
-
|Name |Description |Job |Datafeed
437
+
|Name |Description
429
438
430
439
|problem_child_rare_process_by_host
431
-
|Looks for a process that has been classified as malicious on a host that does not commonly manifest malicious process activity (experimental).
432
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L29[image:images/link.svg[A link icon]]
433
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
440
+
|Looks for a process that has been classified as malicious on a host that does not commonly manifest malicious process activity.
434
441
435
442
|problem_child_high_sum_by_host
436
-
|Looks for a set of one or more malicious child processes on a single host (experimental).
437
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L64[image:images/link.svg[A link icon]]
438
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
443
+
|Looks for a set of one or more malicious child processes on a single host.
439
444
440
445
|problem_child_rare_process_by_user
441
-
|Looks for a process that has been classified as malicious where the user context is unusual and does not commonly manifest malicious process activity (experimental).
442
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L106[image:images/link.svg[A link icon]]
443
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
446
+
|Looks for a process that has been classified as malicious where the user context is unusual and does not commonly manifest malicious process activity.
444
447
445
448
|problem_child_rare_process_by_parent
446
-
|Looks for rare malicious child processes spawned by a parent process (experimental).
447
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L141[image:images/link.svg[A link icon]]
448
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
449
+
|Looks for rare malicious child processes spawned by a parent process.
449
450
450
451
|problem_child_high_sum_by_user
451
-
|Looks for a set of one or more malicious processes, started by the same user (experimental).
452
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L177[image:images/link.svg[A link icon]]
453
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
452
+
|Looks for a set of one or more malicious processes, started by the same user.
454
453
455
454
|problem_child_high_sum_by_parent
456
-
|Looks for a set of one or more malicious child processes spawned by the same parent process (experimental).
457
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#L219[image:images/link.svg[A link icon]]
458
-
|https://github.com/elastic/integrations/blob/{branch}/packages/problemchild/kibana/ml_module/problemchild-ml.json#262[image:images/link.svg[A link icon]]
455
+
|Looks for a set of one or more malicious child processes spawned by the same parent process.
{ml-cap} package to detect lateral movement based on file transfer activity and Windows RDP events. Refer to the {subscriptions}[subscription page] to learn more about the required subscription.
503
+
{ml-cap} package to detect lateral movement based on file transfer activity and
504
+
Windows RDP events. Refer to the {subscriptions}[subscription page] to learn
505
+
more about the required subscription.
515
506
516
507
To download, refer to the https://docs.elastic.co/integrations/lmd[documentation].
517
508
518
509
|===
519
-
|Name |Description |Job |Datafeed
510
+
|Name |Description
520
511
521
-
|high-count-remote-file-transfer
512
+
|lmd_high_count_remote_file_transfer
522
513
|Detects unusually high file transfers to a remote host in the network.
523
-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L24[image:images/link.svg[A link icon]]
524
-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
525
514
526
-
|high-file-size-remote-file-transfer
515
+
|lmd_high_file_size_remote_file_transfer
527
516
|Detects unusually high size of files shared with a remote host in the network.
528
-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L58[image:images/link.svg[A link icon]]
529
-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
530
517
531
-
|rare-file-extension-remote-transfer
518
+
|lmd_rare_file_extension_remote_transfer
532
519
|Detects data exfiltration to an unusual destination port.
533
-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L92[image:images/link.svg[A link icon]]
534
-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
535
520
536
-
|rare-file-path-remote-transfer
521
+
|lmd_rare_file_path_remote_transfer
537
522
|Detects unusual folders and directories on which a file is transferred.
538
-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L126[image:images/link.svg[A link icon]]
539
-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
540
523
541
-
|high-mean-rdp-session-duration
524
+
|lmd_high_mean_rdp_session_duration
542
525
|Detects unusually high mean of RDP session duration.
543
-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L160[image:images/link.svg[A link icon]]
544
-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
545
526
546
-
|high-var-rdp-session-duration
527
+
|lmd_high_var_rdp_session_duration
547
528
|Detects unusually high variance in RDP session duration.
548
-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L202[image:images/link.svg[A link icon]]
549
-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
550
529
551
-
|high-sum-rdp-number-of-processes
530
+
|lmd_high_sum_rdp_number_of_processes
552
531
|Detects unusually high number of processes started in a single RDP session.
553
-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L244[image:images/link.svg[A link icon]]
554
-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
555
532
556
-
|unusual-time-weekday-rdp-session-start
533
+
|lmd_unusual_time_weekday_rdp_session_start
557
534
|Detects an RDP session started at an usual time or weekday.
558
-
|https://github.com/elastic/integrations/blob/main/packages/lmd/kibana/ml_module/lmd-ml.json#L286[image:images/link.svg[A link icon]]
559
-
|https://github.com/elastic/integrations/blob/{branch}/packages/lmd/kibana/ml_module/lmd-ml.json#L436[image:images/link.svg[A link icon]]
0 commit comments