This commit is contained in:
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2020/02/18"
|
||||
maturity = "production"
|
||||
updated_date = "2021/03/03"
|
||||
updated_date = "2021/07/13"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -16,7 +16,7 @@ false_positives = [
|
||||
suspicious or malicious activity.
|
||||
""",
|
||||
]
|
||||
index = ["apm-*-transaction*"]
|
||||
index = ["apm-*-transaction*", "traces-apm*"]
|
||||
language = "kuery"
|
||||
license = "Elastic License v2"
|
||||
name = "Web Application Suspicious Activity: POST Request Declined"
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2020/02/18"
|
||||
maturity = "production"
|
||||
updated_date = "2021/03/03"
|
||||
updated_date = "2021/07/13"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -16,7 +16,7 @@ false_positives = [
|
||||
suspicious or malicious activity.
|
||||
""",
|
||||
]
|
||||
index = ["apm-*-transaction*"]
|
||||
index = ["apm-*-transaction*", "traces-apm*"]
|
||||
language = "kuery"
|
||||
license = "Elastic License v2"
|
||||
name = "Web Application Suspicious Activity: Unauthorized Method"
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2020/02/18"
|
||||
maturity = "production"
|
||||
updated_date = "2021/03/03"
|
||||
updated_date = "2021/07/13"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -13,7 +13,7 @@ false_positives = [
|
||||
unexpected, the user unauthorized, or the request unusual, these may indicate suspicious or malicious activity.
|
||||
""",
|
||||
]
|
||||
index = ["apm-*-transaction*"]
|
||||
index = ["apm-*-transaction*", "traces-apm*"]
|
||||
language = "kuery"
|
||||
license = "Elastic License v2"
|
||||
name = "Web Application Suspicious Activity: No User Agent"
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2020/02/18"
|
||||
maturity = "production"
|
||||
updated_date = "2021/03/03"
|
||||
updated_date = "2021/07/13"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -16,7 +16,7 @@ false_positives = [
|
||||
suspicious or malicious activity.
|
||||
""",
|
||||
]
|
||||
index = ["apm-*-transaction*"]
|
||||
index = ["apm-*-transaction*", "traces-apm*"]
|
||||
language = "kuery"
|
||||
license = "Elastic License v2"
|
||||
name = "Web Application Suspicious Activity: sqlmap User Agent"
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
[metadata]
|
||||
creation_date = "2020/07/08"
|
||||
maturity = "production"
|
||||
updated_date = "2021/03/03"
|
||||
updated_date = "2021/07/13"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -9,7 +9,7 @@ description = """
|
||||
Generates a detection alert for each external alert written to the configured indices. Enabling this rule allows you to
|
||||
immediately begin investigating external alerts in the app.
|
||||
"""
|
||||
index = ["apm-*-transaction*", "auditbeat-*", "filebeat-*", "logs-*", "packetbeat-*", "winlogbeat-*"]
|
||||
index = ["apm-*-transaction*", "traces-apm*", "auditbeat-*", "filebeat-*", "logs-*", "packetbeat-*", "winlogbeat-*"]
|
||||
language = "kuery"
|
||||
license = "Elastic License v2"
|
||||
max_signals = 10000
|
||||
|
||||
@@ -205,11 +205,12 @@ class TestRuleTags(BaseRuleTest):
|
||||
def test_required_tags(self):
|
||||
"""Test that expected tags are present within rules."""
|
||||
# indexes considered; only those with obvious relationships included
|
||||
# 'apm-*-transaction*', 'auditbeat-*', 'endgame-*', 'filebeat-*', 'logs-*', 'logs-aws*',
|
||||
# 'apm-*-transaction*', 'traces-apm*', 'auditbeat-*', 'endgame-*', 'filebeat-*', 'logs-*', 'logs-aws*',
|
||||
# 'logs-endpoint.alerts-*', 'logs-endpoint.events.*', 'logs-okta*', 'packetbeat-*', 'winlogbeat-*'
|
||||
|
||||
required_tags_map = {
|
||||
'apm-*-transaction*': {'all': ['APM']},
|
||||
'traces-apm*': {'all': ['APM']},
|
||||
'auditbeat-*': {'any': ['Windows', 'macOS', 'Linux']},
|
||||
'endgame-*': {'all': ['Elastic Endgame']},
|
||||
'logs-aws*': {'all': ['AWS']},
|
||||
|
||||
Reference in New Issue
Block a user