[Security Content] Small tweaks on the setup guides (#3308)

* [Security Content] Small tweaks on the setup guides

* Additional Fixes

* Avoid touching deprecated rules
This commit is contained in:
Jonhnathan
2024-03-11 09:09:40 -03:00
committed by GitHub
parent edf4da8526
commit 458e67918a
477 changed files with 576 additions and 871 deletions
@@ -62,7 +62,6 @@ Initiate the incident response process based on the outcome of the triage.
- Investiagte if any IPR data was accessed during the data crawling and take appropriate actions.
- Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector.
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
"""
references = [
"https://gtfobins.github.io/gtfobins/apt/",
@@ -93,7 +92,7 @@ references = [
]
risk_score = 47
rule_id = "52376a86-ee86-4967-97ae-1a05f55816f0"
setup = """
setup = """## Setup
This rule requires data coming in from Elastic Defend.
@@ -126,7 +125,6 @@ Session View uses process data collected by the Elastic Defend integration, but
- If you want to include file and network alerts in Session View, check the boxes for “Network and File events”.
- If you want to enable terminal output capture, turn on the “Capture terminal output” toggle.
For more information about the additional fields collected when this setting is enabled and the usage of Session View for Analysis refer to the [helper guide](https://www.elastic.co/guide/en/security/current/session-view.html).
"""
severity = "medium"
tags = ["Domain: Endpoint", "OS: Linux", "Use Case: Threat Detection", "Tactic: Execution", "Data Source: Elastic Endgame", "Data Source: Elastic Defend"]