Skip to content

Latest commit

 

History

History

behavior

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Elastic Security Malicious Behavior Protection Rules

Prebuilt high signal EQL rules that runs on the endpoint to disrupt malicious behavior, this layer of prevention equips Elastic Agent to protect Linux, Windows, and macOS hosts from a broad range of attack techniques with a major focus on the following tactics :

Prevention is achieved by pairing post-execution analytics with response actions to kill a specific process or a full process tree tailored to stop the adversary at the initial stages of the attack. Each protection rule is mapped to the most relevant MITRE ATT&CK tactic, technique and subtechnique.

The true positive rate that we aim to maintain is at least 70%, thus we prioritize analytics logic precision to reduce detection scope via prevention.

Another example of our commitment to openness in security is our existing public Detection Rules repository where we share EQL rules that run on the SIEM side, and that have a broader detection logic which make them more suitable for detection and hunting.

Latest Release

artifact version hash
production-rules-linux-v1 1.0.74 83e0acc86460c1ad4caf0d6a8e346469b2c89bd090eb6ae019c5afbebe7e8bce
production-rules-macos-v1 1.0.74 2810dcad0ca2c7a8b9acb344abebd345e3f0a97e573a3c8494eb0912ef19d59c
production-rules-windows-v1 1.0.74 92d31e7cd14109e7fc950c85f82b09156374924287c12d1754c8a9b3223a9e23

Rules Summary per Tactic

Note: No rule updates have been made between versions ('1.0.74', '1.0.73') by OS/MITRE Tactic.

Note: Latest Total Production Rules by OS/MITRE Tactic.

Tactic Windows Linux macOS Total by Tactic
Collection 11 0 5 16
Command and Control 31 7 27 65
Credential Access 42 3 24 69
Defense Evasion 251 24 48 323
Discovery 8 1 4 13
Execution 62 22 70 154
Exfiltration 0 0 1 1
Impact 18 2 2 22
Initial Access 52 2 2 56
Lateral Movement 8 1 1 10
Persistence 55 24 19 98
Privilege Escalation 60 8 8 76
Total by OS 598 94 211 903

The Zen of Security Rules

We incorporate the Zen of Security Rules into all of our rule development and planning. We strive to follow these principles to ensure practical rule design for resiliency at scale.