Skip to content

Commit 25c8211

Browse files
committed
[SIEM][detection engine] Limit network rules to filebeat source semantics (#57130)
* limit network rules to filebeat source semantics * Bump version number for network rules to ensure updates in post 7.6.0
1 parent 6967e1e commit 25c8211

21 files changed

Lines changed: 42 additions & 105 deletions

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/network_dns_directly_to_the_internet.json

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,7 @@
44
"Exclude DNS servers from this rule as this is expected behavior. Endpoints usually query local DNS servers defined in their DHCP scopes, but this may be overridden if a user configures their endpoint to use a remote DNS server. This is uncommon in managed enterprise networks because it could break intranet name resolution when split horizon DNS is utilized. Some consumer VPN services and browser plug-ins may send DNS traffic to remote Internet destinations. In that case, such devices or networks can be excluded from this rule when this is expected behavior."
55
],
66
"index": [
7-
"auditbeat-*",
8-
"filebeat-*",
9-
"packetbeat-*",
10-
"winlogbeat-*"
7+
"filebeat-*"
118
],
129
"language": "kuery",
1310
"max_signals": 100,
@@ -42,5 +39,5 @@
4239
}
4340
],
4441
"type": "query",
45-
"version": 1
42+
"version": 2
4643
}

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/network_ftp_file_transfer_protocol_activity_to_the_internet.json

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,7 @@
44
"FTP servers should be excluded from this rule as this is expected behavior. Some business workflows may use FTP for data exchange. These workflows often have expected characteristics such as users, sources, and destinations. FTP activity involving an unusual source or destination may be more suspicious. FTP activity involving a production server that has no known associated FTP workflow or business requirement is often suspicious."
55
],
66
"index": [
7-
"auditbeat-*",
8-
"filebeat-*",
9-
"packetbeat-*",
10-
"winlogbeat-*"
7+
"filebeat-*"
118
],
129
"language": "kuery",
1310
"max_signals": 100,
@@ -53,5 +50,5 @@
5350
}
5451
],
5552
"type": "query",
56-
"version": 1
53+
"version": 2
5754
}

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/network_irc_internet_relay_chat_protocol_activity_to_the_internet.json

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,7 @@
44
"IRC activity may be normal behavior for developers and engineers but is unusual for non-engineering end users. IRC activity involving an unusual source or destination may be more suspicious. IRC activity involving a production server is often suspicious. Because these ports are in the ephemeral range, this rule may false under certain conditions, such as when a NAT-ed web server replies to a client which has used a port in the range by coincidence. In this case, these servers can be excluded. Some legacy applications may use these ports, but this is very uncommon and usually only appears in local traffic using private IPs, which does not match this rule's conditions."
55
],
66
"index": [
7-
"auditbeat-*",
8-
"filebeat-*",
9-
"packetbeat-*",
10-
"winlogbeat-*"
7+
"filebeat-*"
118
],
129
"language": "kuery",
1310
"max_signals": 100,
@@ -53,5 +50,5 @@
5350
}
5451
],
5552
"type": "query",
56-
"version": 1
53+
"version": 2
5754
}

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/network_nat_traversal_port_activity.json

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,7 @@
44
"Some networks may utilize these protocols but usage that is unfamiliar to local network administrators can be unexpected and suspicious. Because this port is in the ephemeral range, this rule may false under certain conditions, such as when an application server with a public IP address replies to a client which has used a UDP port in the range by coincidence. This is uncommon but such servers can be excluded."
55
],
66
"index": [
7-
"auditbeat-*",
8-
"filebeat-*",
9-
"packetbeat-*",
10-
"winlogbeat-*"
7+
"filebeat-*"
118
],
129
"language": "kuery",
1310
"max_signals": 100,
@@ -38,5 +35,5 @@
3835
}
3936
],
4037
"type": "query",
41-
"version": 1
38+
"version": 2
4239
}

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/network_port_26_activity.json

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,7 @@
44
"Servers that process email traffic may cause false positives and should be excluded from this rule as this is expected behavior."
55
],
66
"index": [
7-
"auditbeat-*",
8-
"filebeat-*",
9-
"packetbeat-*",
10-
"winlogbeat-*"
7+
"filebeat-*"
118
],
129
"language": "kuery",
1310
"max_signals": 100,
@@ -57,5 +54,5 @@
5754
}
5855
],
5956
"type": "query",
60-
"version": 1
57+
"version": 2
6158
}

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/network_port_8000_activity_to_the_internet.json

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,7 @@
44
"Because this port is in the ephemeral range, this rule may false under certain conditions, such as when a NATed web server replies to a client which has used a port in the range by coincidence. In this case, such servers can be excluded. Some applications may use this port but this is very uncommon and usually appears in local traffic using private IPs, which this rule does not match. Some cloud environments, particularly development environments, may use this port when VPNs or direct connects are not in use and cloud instances are accessed across the Internet."
55
],
66
"index": [
7-
"auditbeat-*",
8-
"filebeat-*",
9-
"packetbeat-*",
10-
"winlogbeat-*"
7+
"filebeat-*"
118
],
129
"language": "kuery",
1310
"max_signals": 100,
@@ -38,5 +35,5 @@
3835
}
3936
],
4037
"type": "query",
41-
"version": 1
38+
"version": 2
4239
}

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/network_pptp_point_to_point_tunneling_protocol_activity.json

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,7 @@
44
"Some networks may utilize PPTP protocols but this is uncommon as more modern VPN technologies are available. Usage that is unfamiliar to local network administrators can be unexpected and suspicious. Torrenting applications may use this port. Because this port is in the ephemeral range, this rule may false under certain conditions, such as when an application server replies to a client that used this port by coincidence. This is uncommon but such servers can be excluded."
55
],
66
"index": [
7-
"auditbeat-*",
8-
"filebeat-*",
9-
"packetbeat-*",
10-
"winlogbeat-*"
7+
"filebeat-*"
118
],
129
"language": "kuery",
1310
"max_signals": 100,
@@ -38,5 +35,5 @@
3835
}
3936
],
4037
"type": "query",
41-
"version": 1
38+
"version": 2
4239
}

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/network_proxy_port_activity_to_the_internet.json

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,7 @@
44
"Some proxied applications may use these ports but this usually occurs in local traffic using private IPs\n which this rule does not match. Proxies are widely used as a security technology but in enterprise environments\n this is usually local traffic which this rule does not match. Internet proxy services using these ports can be\n white-listed if desired. Some screen recording applications may use these ports. Proxy port activity involving\n an unusual source or destination may be more suspicious. Some cloud environments may use this port when VPNs or\n direct connects are not in use and cloud instances are accessed across the Internet. Because these ports are in\n the ephemeral range, this rule may false under certain conditions such as when a NATed web server replies to a\n client which has used a port in the range by coincidence. In this case, such servers can be excluded if desired."
55
],
66
"index": [
7-
"auditbeat-*",
8-
"filebeat-*",
9-
"packetbeat-*",
10-
"winlogbeat-*"
7+
"filebeat-*"
118
],
129
"language": "kuery",
1310
"max_signals": 100,
@@ -38,5 +35,5 @@
3835
}
3936
],
4037
"type": "query",
41-
"version": 1
38+
"version": 2
4239
}

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/network_rdp_remote_desktop_protocol_from_the_internet.json

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,7 @@
44
" Some network security policies allow RDP directly from the Internet but usage that is unfamiliar to\n server or network owners can be unexpected and suspicious. RDP services may be exposed directly to the\n Internet in some networks such as cloud environments. In such cases, only RDP gateways, bastions or jump\n servers may be expected expose RDP directly to the Internet and can be exempted from this rule. RDP may\n be required by some work-flows such as remote access and support for specialized software products and\n servers. Such work-flows are usually known and not unexpected."
55
],
66
"index": [
7-
"auditbeat-*",
8-
"filebeat-*",
9-
"packetbeat-*",
10-
"winlogbeat-*"
7+
"filebeat-*"
118
],
129
"language": "kuery",
1310
"max_signals": 100,
@@ -68,5 +65,5 @@
6865
}
6966
],
7067
"type": "query",
71-
"version": 1
68+
"version": 2
7269
}

x-pack/legacy/plugins/siem/server/lib/detection_engine/rules/prepackaged_rules/network_rdp_remote_desktop_protocol_to_the_internet.json

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,7 @@
44
"RDP connections may be made directly to Internet destinations in order to access\n Windows cloud server instances but such connections are usually made only by engineers.\n In such cases, only RDP gateways, bastions or jump servers may be expected Internet\n destinations and can be exempted from this rule. RDP may be required by some work-flows\n such as remote access and support for specialized software products and servers. Such\n work-flows are usually known and not unexpected. Usage that is unfamiliar to server or\n network owners can be unexpected and suspicious."
55
],
66
"index": [
7-
"auditbeat-*",
8-
"filebeat-*",
9-
"packetbeat-*",
10-
"winlogbeat-*"
7+
"filebeat-*"
118
],
129
"language": "kuery",
1310
"max_signals": 100,
@@ -53,5 +50,5 @@
5350
}
5451
],
5552
"type": "query",
56-
"version": 1
53+
"version": 2
5754
}

0 commit comments

Comments
 (0)