Loading

Security anomaly detection configurations

These anomaly detection jobs automatically detect file system and network anomalies on your hosts. They appear in the Anomaly Detection interface of the Elastic Security app in Kibana when you have data that matches their configuration. For more information, refer to Anomaly detection with machine learning.

Note

With version 9.4, Elastic Stack adds support for Entity Unique IDs (EUIDs) in Entity Analytics, and ML jobs from this version onward are built to utilize them.

  • The impacted ML jobs will include an "euid" suffix in their names, as outlined below for each module.
  • Previously installed ML jobs and detection rules will continue to run, allowing time to transition to the new EUID based assets.
  • We recommend installing the new ML jobs first and verifying that they are properly set up, collecting data, and generating anomalies before upgrading to the latest detection rules included in 9.4.

Detect anomalous activity in your ECS-compatible authentication logs.

In the Machine Learning app, these configurations are available only when data exists that matches the query specified in the manifest file. In the Elastic Security app, it looks in the data view specified in the securitySolution:defaultIndex advanced setting for data that matches the query.

By default, when you create these job in the Elastic Security app, it uses a data view that applies to multiple indices. To get the same results if you use the Machine Learning app, create a similar data view then select it in the job wizard.

Name Description Job (JSON) Datafeed Supported Integrations Supported OS
auth_high_count_logon_events_euid Looks for an unusually large spike in successful authentication events. This can be due to password spraying, user enumeration, or brute force activity. code code System, Elastic Defend, Winlogbeat, Windows windows
auth_high_count_logon_events_for_a_source_ip_euid Looks for an unusually large spike in successful authentication events from a particular source IP address. This can be due to password spraying, user enumeration or brute force activity. code code System, Elastic Defend, Winlogbeat, Windows windows
auth_high_count_logon_fails_euid Looks for an unusually large spike in authentication failure events. This can be due to password spraying, user enumeration, or brute force activity and may be a precursor to account takeover or credentialed access. code code System, Elastic Defend, Auditd Manager windows, linux
auth_rare_hour_for_a_user_euid Looks for a user logging in at a time of day that is unusual for the user. This can be due to credentialed access through a compromised account when the user and the threat actor are in different time zones. In addition, unauthorized user activity often takes place during non-business hours. code code System, Elastic Defend, Auditd Manager windows, linux
auth_rare_source_ip_for_a_user_euid Looks for a user logging in from an IP address that is unusual for the user. This can be due to credentialed access through a compromised account when the user and the threat actor are in different locations. An unusual source IP address for a username could also be due to lateral movement when a compromised account is used to pivot between hosts. code code System, Elastic Defend, Auditd Manager windows, linux
auth_rare_user_euid Looks for an unusual user name in the authentication logs. An unusual user name is one way of detecting credentialed access by means of a new or dormant user account. A user account that is normally inactive, because the user has left the organization, which becomes active, may be due to credentialed access using a compromised account password. Threat actors will sometimes also create new users as a means of persisting in a compromised web application. code code System, Elastic Defend, Auditd Manager windows, linux
suspicious_login_activity_euid Detect unusually high number of authentication attempts. code code System, Elastic Defend, Auditd Manager windows, linux

Detect suspicious activity recorded in your Azure Activity Logs.

In the Machine Learning app, these configurations are available only when data exists that matches the query specified in the manifest file. In the Elastic Security app, it looks in the data view specified in the securitySolution:defaultIndex advanced setting for data that matches the query.

Name Description Job (JSON) Datafeed Supported Integrations
azure_activitylogs_high_distinct_count_event_action_fail_euid Looks for a spike in the rate of an error message, which might indicate an impending service failure or potentially be byproducts of attempted or successful persistence, privilege escalation, defense evasion, discovery, lateral movement, or collection activity by a threat actor. code code Azure Activity Logs
azure_activitylogs_rare_event_action_on_failure_euid Looks for unusual Azure activity event actions on failure. Rare and unusual errors might simply indicate an impending service failure but they can also be byproducts of attempted or successful persistence, privilege escalation, defense evasion, discovery, lateral movement, or collection activity by a threat actor. code code Azure Activity Logs
azure_activitylogs_rare_event_action_for_a_city_euid Looks for Azure activity event actions that, while not inherently suspicious or atypical, are sourcing from a geolocation (city) that is unexpected. This can be the result of compromised credentials or keys. code code Azure Activity Logs
azure_activitylogs_rare_event_action_for_a_country_euid Looks for Azure activity event actions that, while not inherently suspicious or atypical, are sourcing from a geolocation (country) that is unexpected. This can be the result of compromised credentials or keys. code code Azure Activity Logs
azure_activitylogs_rare_event_action_for_a_username_euid Looks for Azure activity event actions that, while not inherently suspicious or atypical, are sourcing from a unique user identifier context that does not normally call the method. This can be the result of compromised credentials or keys as someone uses a valid account to persist, move laterally, or exfil data. code code Azure Activity Logs

Detect suspicious activity recorded in your CloudTrail logs.

In the Machine Learning app, these configurations are available only when data exists that matches the query specified in the manifest file. In the Elastic Security app, it looks in the data view specified in the securitySolution:defaultIndex advanced setting for data that matches the query.

Name Description Job (JSON) Datafeed Supported Integrations
high_distinct_count_error_message Looks for a spike in the rate of an error message which may simply indicate an impending service failure but these can also be byproducts of attempted or successful persistence, privilege escalation, defense evasion, discovery, lateral movement, or collection activity by a threat actor. code code AWS
rare_error_code Looks for unusual errors. Rare and unusual errors may simply indicate an impending service failure but they can also be byproducts of attempted or successful persistence, privilege escalation, defense evasion, discovery, lateral movement, or collection activity by a threat actor. code code AWS
rare_method_for_a_city Looks for AWS API calls that, while not inherently suspicious or abnormal, are sourcing from a geolocation (city) that is unusual. This can be the result of compromised credentials or keys. code code AWS
rare_method_for_a_country Looks for AWS API calls that, while not inherently suspicious or abnormal, are sourcing from a geolocation (country) that is unusual. This can be the result of compromised credentials or keys. code code AWS
rare_method_for_a_username_euid Looks for AWS API calls that, while not inherently suspicious or atypical, are sourcing from a unique user identifier context that does not normally call the method. This can be the result of compromised credentials or keys as someone uses a valid account to persist, move laterally, or exfil data. code code AWS

Detect suspicious activity recorded in your GCP Audit logs.

In the Machine Learning app, these configurations are available only when data exists that matches the query specified in the manifest file. In the Elastic Security app, it looks in the data view specified in the securitySolution:defaultIndex advanced setting for data that matches the query.

Name Description Job (JSON) Datafeed Supported Integrations
gcp_audit_high_distinct_count_error_message Looks for a spike in the rate of an action where the event outcome is a failure. Spikes might indicate an impending service failure but could also be byproducts of attempted or successful persistence, privilege escalation, defense evasion, discovery, lateral movement, or collection activity by a threat actor. code code GCP Audit
gcp_audit_rare_error_code Looks for unusual errors. Rare and unusual errors might indicate an impending service failure but they can also be byproducts of attempted or successful persistence, privilege escalation, defense evasion, discovery, lateral movement, or collection activity by a threat actor. code code GCP Audit
gcp_audit_rare_method_for_a_city Looks for GCP actions that, while not inherently suspicious or atypical, are sourcing from a geolocation (city) that is unexpected. This can be the result of compromised credentials or keys. code code GCP Audit
gcp_audit_rare_method_for_a_country Looks for GCP actions calls that, while not inherently suspicious or aytpical, are sourcing from a geolocation (country) that is unexpected. This can be the result of compromised credentials or keys. code code GCP Audit
gcp_audit_rare_method_for_a_client_user_email Looks for GCP actions that, while not inherently suspicious or atypical, are sourcing from a user context that does not normally call the method. This can be the result of compromised credentials or keys as someone uses a valid account to persist, move laterally, or exfil data. code code GCP Audit

Anomaly detection jobs for host-based threat hunting and detection.

In the Machine Learning app, these configurations are available only when data exists that matches the query specified in the manifest file. In the Elastic Security app, it looks in the data view specified in the securitySolution:defaultIndex advanced setting for data that matches the query.

To access the host traffic anomalies dashboard in Kibana, go to: Security -> Dashboards -> Host Traffic Anomalies.

Name Description Job (JSON) Datafeed Supported Integrations Supported OS
high_count_events_for_a_host_name_euid Detects sudden spikes in traffic associated with a unique host identifier. This can be due to a range of security issues, such as a compromised system, DDoS attacks, malware infections, privilege escalation, or data exfiltration. code code Windows, Elastic Defend, Network Packet Capture, Auditd Manager, System windows, linux, macOS
low_count_events_for_a_host_name_euid Detects sudden drops in traffic associated with a unique host identifier. This can be due to a range of security issues, such as a compromised system, a failed service, or a network misconfiguration. code code Windows, Elastic Defend, Network Packet Capture, Auditd Manager, System windows, linux, macOS

Anomaly detection jobs for Linux host-based threat hunting and detection.

In the Machine Learning app, these configurations are available only when data exists that matches the query specified in the manifest file. In the Elastic Security app, it looks in the data view specified in the securitySolution:defaultIndex advanced setting for data that matches the query.

Name Description Job (JSON) Datafeed Supported Integrations Supported OS
v3_linux_anomalous_network_activity_euid Looks for unusual processes using the network which could indicate command-and-control, lateral movement, persistence, or data exfiltration activity. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_anomalous_network_port_activity_euid Looks for unusual destination port activity that could indicate command-and-control, persistence mechanism, or data exfiltration activity. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_anomalous_process_all_hosts_euid Looks for processes that are unusual to all Linux hosts. Such unusual processes may indicate unauthorized software, malware, or persistence mechanisms. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_anomalous_user_name_euid Rare and unusual unique user identifiers that are not normally active may indicate unauthorized changes or activity by an unauthorized user which may be credentialed access or lateral movement. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_network_configuration_discovery_euid Looks for commands related to system network configuration discovery from an unusual unique user identifier context. This can be due to uncommon troubleshooting activity or due to a compromised account. A compromised account may be used by a threat actor to engage in system network configuration discovery to increase their understanding of connected networks and hosts. This information may be used to shape follow-up behaviors such as lateral movement or additional discovery. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_network_connection_discovery_euid Looks for commands related to system network connection discovery from an unusual unique user identifier context. This can be due to uncommon troubleshooting activity or due to a compromised account. A compromised account may be used by a threat actor to engage in system network connection discovery to increase their understanding of connected services and systems. This information may be used to shape follow-up behaviors such as lateral movement or additional discovery. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_rare_metadata_process_euid Looks for anomalous access to the metadata service by an unusual process. The metadata service may be targeted in order to harvest credentials or user data scripts containing secrets. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_rare_metadata_user_euid Looks for anomalous access to the metadata service by an unusual unique user identifier. The metadata service may be targeted in order to harvest credentials or user data scripts containing secrets. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_rare_sudo_user_euid Looks for sudo activity from an unusual unique user identifier context. Unusual user context changes can be due to privilege escalation. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_rare_user_compiler_euid Looks for compiler activity by a unique user identifier context which does not normally run compilers. This can be ad-hoc software changes or unauthorized software deployment. This can also be due to local privilege elevation through locally run exploits or malware activity. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_system_information_discovery_euid Looks for commands related to system information discovery from an unusual unique user identifier context. This can be due to uncommon troubleshooting activity or due to a compromised account. A compromised account may be used to engage in system information discovery to gather detailed information about system configuration and software versions. This may be a precursor to the selection of a persistence mechanism or a method of privilege elevation. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_system_process_discovery_euid Looks for commands related to system process discovery from an unusual unique user identifier context. This can be due to uncommon troubleshooting activity or due to a compromised account. A compromised account may be used to engage in system process discovery to increase their understanding of software applications running on a target host or network. This may be a precursor to the selection of a persistence mechanism or a method of privilege elevation. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_linux_system_user_discovery_euid Looks for commands related to system user or owner discovery from an unusual unique user identifier context. This can be due to uncommon troubleshooting activity or due to a compromised account. A compromised account may be used to engage in system owner or user discovery to identify currently active or primary users of a system. This may be a precursor to additional discovery, credential dumping, or privilege elevation activity. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux
v3_rare_process_by_host_linux_euid Looks for processes that are unusual to a particular Linux unique host identifier. Such unusual processes may indicate unauthorized software, malware, or persistence mechanisms. code code Elastic Defend, Network Packet Capture, Auditd Manager, Packetbeat linux

Detect anomalous network activity in your ECS-compatible network logs.

In the Machine Learning app, these configurations are available only when data exists that matches the query specified in the manifest file. In the Elastic Security app, it looks in the data view specified in the securitySolution:defaultIndex advanced setting for data that matches the query.

By default, when you create these jobs in the Elastic Security app, it uses a data view that applies to multiple indices. To get the same results if you use the Machine Learning app, create a similar data view then select it in the job wizard.

Name Description Job (JSON) Datafeed Supported Integrations Supported OS
high_count_by_destination_country Looks for an unusually large spike in network activity to one destination country in the network logs. This could be due to unusually large amounts of reconnaissance or enumeration traffic. Data exfiltration activity may also produce such a surge in traffic to a destination country which does not normally appear in network traffic or business work-flows. Malware instances and persistence mechanisms may communicate with command-and-control (C2) infrastructure in their country of origin, which may be an unusual destination country for the source network. code code Elastic Defend, Network Packet Capture, Packetbeat windows, linux, macOS
high_count_network_denies Looks for an unusually large spike in network traffic that was denied by network ACLs or firewall rules. Such a burst of denied traffic is usually either 1) a misconfigured application or firewall or 2) suspicious or malicious activity. Unsuccessful attempts at network transit, in order to connect to command-and-control (C2), or engage in data exfiltration, may produce a burst of failed connections. This could also be due to unusually large amounts of reconnaissance or enumeration traffic. Denial-of-service attacks or traffic floods may also produce such a surge in traffic. code code Elastic Defend, Network Packet Capture, Packetbeat windows, linux, macOS
high_count_network_events Looks for an unusually large spike in network traffic. Such a burst of traffic, if not caused by a surge in business activity, can be due to suspicious or malicious activity. Large-scale data exfiltration may produce a burst of network traffic; this could also be due to unusually large amounts of reconnaissance or enumeration traffic. Denial-of-service attacks or traffic floods may also produce such a surge in traffic. code code Elastic Defend, Network Packet Capture, Packetbeat windows, linux, macOS
rare_destination_country Looks for an unusual destination country name in the network logs. This can be due to initial access, persistence, command-and-control, or exfiltration activity. For example, when a user clicks on a link in a phishing email or opens a malicious document, a request may be sent to download and run a payload from a server in a country which does not normally appear in network traffic or business work-flows. Malware instances and persistence mechanisms may communicate with command-and-control (C2) infrastructure in their country of origin, which may be an unusual destination country for the source network. code code Elastic Defend, Network Packet Capture, Packetbeat windows, linux, macOS

Detect suspicious network activity in Packetbeat data.

In the Machine Learning app, these configurations are available only when data exists that matches the query specified in the manifest file. In the Elastic Security app, it looks in the data view specified in the securitySolution:defaultIndex advanced setting for data that matches the query.

Name Description Job (JSON) Datafeed Supported Integrations Supported OS
packetbeat_dns_tunneling_euid Looks for unusual DNS activity that could indicate command-and-control or data exfiltration activity. code code Network Packet Capture, Packetbeat windows, linux
packetbeat_rare_dns_question_euid Looks for unusual DNS activity that could indicate command-and-control activity. code code Network Packet Capture, Packetbeat windows, linux
packetbeat_rare_server_domain_euid Looks for unusual HTTP or TLS destination domain activity that could indicate execution, persistence, command-and-control or data exfiltration activity. code code Network Packet Capture, Packetbeat windows, linux
packetbeat_rare_urls_euid Looks for unusual web browsing URL activity that could indicate execution, persistence, command-and-control or data exfiltration activity. code code Network Packet Capture, Packetbeat windows, linux
packetbeat_rare_user_agent_euid Looks for unusual HTTP user agent activity that could indicate execution, persistence, command-and-control or data exfiltration activity. code code Network Packet Capture, Packetbeat windows, linux

Anomaly detection jobs for Windows host-based threat hunting and detection.

In the Machine Learning app, these configurations are available only when data exists that matches the query specified in the manifest file. In the Elastic Security app, it looks in the data view specified in the securitySolution:defaultIndex advanced setting for data that matches the query.

If there are additional requirements such as installing the Windows System Monitor (Sysmon) or auditing process creation in the Windows security event log, they are listed for each job.

Name Description Job (JSON) Datafeed Supported Integrations Supported OS
v3_rare_process_by_host_windows_euid Looks for processes that are unusual to a particular Windows unique host identifier. Such unusual processes may indicate unauthorized software, malware, or persistence mechanisms. code code Elastic Defend, Windows, Winlogbeat windows
v3_windows_anomalous_network_activity_euid Looks for unusual processes using the network which could indicate command-and-control, lateral movement, persistence, or data exfiltration activity. code code Elastic Defend, Windows, Winlogbeat windows
v3_windows_anomalous_path_activity_euid Looks for activity in unusual paths that may indicate execution of malware or persistence mechanisms. Windows payloads often execute from user profile paths. code code Elastic Defend, Windows, Winlogbeat windows
v3_windows_anomalous_process_all_hosts_euid Looks for processes that are unusual to all Windows hosts. Such unusual processes may indicate execution of unauthorized software, malware, or persistence mechanisms. code code Elastic Defend, Windows, Winlogbeat windows
v3_windows_anomalous_process_creation_euid Looks for unusual process relationships which may indicate execution of malware or persistence mechanisms. code code Elastic Defend, Windows, Winlogbeat windows
v3_windows_anomalous_script_euid Looks for unusual powershell scripts that may indicate execution of malware, or persistence mechanisms. code code Windows, Winlogbeat windows
v3_windows_anomalous_service_euid Looks for rare and unusual Windows service names which may indicate execution of unauthorized services, malware, or persistence mechanisms. code code Windows, Winlogbeat windows
v3_windows_anomalous_user_name_euid Rare and unusual users that are not normally active may indicate unauthorized changes or activity by an unauthorized user which may be credentialed access or lateral movement. code code Elastic Defend, Windows, Winlogbeat windows
v3_windows_rare_metadata_process_euid Looks for anomalous access to the metadata service by an unusual process. The metadata service may be targeted in order to harvest credentials or user data scripts containing secrets. code code Elastic Defend, Windows, Winlogbeat windows
v3_windows_rare_metadata_user_euid Looks for anomalous access to the metadata service by an unusual user. The metadata service may be targeted in order to harvest credentials or user data scripts containing secrets. code code Elastic Defend, Windows, Winlogbeat windows
v3_windows_rare_user_runas_event_euid Unusual user context switches can be due to privilege escalation. code code Elastic Defend, Windows, Winlogbeat windows
v3_windows_rare_user_type10_remote_login_euid Unusual RDP (remote desktop protocol) user logins can indicate account takeover or credentialed access. code code Windows, Winlogbeat windows
v3_windows_rare_script_euid Looks for rare powershell scripts that may indicate execution of malware, or persistence mechanisms using hash. code code Windows, Winlogbeat windows

Elastic Integrations are a streamlined way to add Elastic assets to your environment, such as data ingestion, transforms, and in this case, machine learning capabilities for Security.

The following Integrations use machine learning to analyze patterns of user and entity behavior, and help detect and alert when there is related suspicious activity in your environment.

Domain Generation Algorithm (DGA) Detection

Machine learning solution package to detect domain generation algorithm (DGA) activity in your network data. Refer to the subscription page to learn more about the required subscription.

To download, refer to the documentation.

Name Description Supported Integrations Supported OS
dga_high_sum_probability_euid Detect domain generation algorithm (DGA) activity in your network data. Elastic Defend, Network Packet Capture, Packetbeat windows, linux

The job configurations and datafeeds can be found here.

Living off the Land Attack (LotL) Detection

Machine learning solution package to detect Living off the Land (LotL) attacks in your environment. Refer to the subscription page to learn more about the required subscription. (Also known as ProblemChild).

To download, refer to the documentation.

Name Description Supported Integrations Supported OS
problem_child_rare_process_by_host_euid Looks for a process that has been classified as malicious on a host that does not commonly manifest malicious process activity. Elastic Defend, Windows windows
problem_child_high_sum_by_host_euid Looks for a set of one or more malicious child processes on a single host. Elastic Defend, Windows windows
problem_child_rare_process_by_user_euid Looks for a process that has been classified as malicious where the user context is unusual and does not commonly manifest malicious process activity. Elastic Defend, Windows windows
problem_child_rare_process_by_parent_euid Looks for rare malicious child processes spawned by a parent process. Elastic Defend, Windows windows
problem_child_high_sum_by_user_euid Looks for a set of one or more malicious processes, started by the same user. Elastic Defend, Windows windows
problem_child_high_sum_by_parent_euid Looks for a set of one or more malicious child processes spawned by the same parent process. Elastic Defend, Windows windows

The job configurations and datafeeds can be found here.

Data Exfiltration Detection (DED)

Machine learning package to detect data exfiltration in your network and file data. Refer to the subscription page to learn more about the required subscription.

To download, refer to the documentation.

Name Description Supported Integrations Supported OS
ded_high_sent_bytes_destination_geo_country_iso_code_euid Detects data exfiltration to an unusual geo-location (by country iso code). Elastic Defend, Network Packet Capture, Packetbeat windows, linux
ded_high_sent_bytes_destination_ip_euid Detects data exfiltration to an unusual geo-location (by IP address). Elastic Defend, Network Packet Capture, Packetbeat windows, linux
ded_high_sent_bytes_destination_port_euid Detects data exfiltration to an unusual destination port. Elastic Defend, Network Packet Capture, Packetbeat windows, linux
ded_high_sent_bytes_destination_region_name_euid Detects data exfiltration to an unusual geo-location (by region name). Elastic Defend, Network Packet Capture, Packetbeat windows, linux
ded_high_bytes_written_to_external_device_euid Detects data exfiltration activity by identifying high bytes written to an external device. Elastic Defend windows
ded_rare_process_writing_to_external_device_euid Detects data exfiltration activity by identifying a file write started by a rare process to an external device. Elastic Defend windows
ded_high_bytes_written_to_external_device_airdrop_euid Detects data exfiltration activity by identifying high bytes written to an external device using Airdrop. Elastic Defend macOS

The job configurations and datafeeds can be found here.

Lateral Movement Detection (LMD)

Machine learning package to detect lateral movement based on file transfer activity and Windows RDP events. Refer to the subscription page to learn more about the required subscription.

To download, refer to the documentation.

Name Description Supported Integrations Supported OS
lmd_high_count_remote_file_transfer_euid Detects unusually high file transfers to a remote host in the network. Elastic Defend windows, linux
lmd_high_file_size_remote_file_transfer_euid Detects unusually high size of files shared with a remote host in the network. Elastic Defend windows, linux
lmd_rare_file_extension_remote_transfer_euid Detects data exfiltration to an unusual destination port. Elastic Defend windows, linux
lmd_rare_file_path_remote_transfer_euid Detects unusual folders and directories on which a file is transferred. Elastic Defend windows, linux
lmd_high_mean_rdp_session_duration_euid Detects unusually high mean of RDP session duration. Elastic Defend windows
lmd_high_var_rdp_session_duration_euid Detects unusually high variance in RDP session duration. Elastic Defend windows
lmd_high_sum_rdp_number_of_processes_euid Detects unusually high number of processes started in a single RDP session. Elastic Defend windows
lmd_unusual_time_weekday_rdp_session_start_euid Detects an RDP session started at an usual time or weekday. Elastic Defend windows
lmd_high_rdp_distinct_count_source_ip_for_destination_euid Detects a high count of source IPs making an RDP connection with a single destination IP. Elastic Defend windows
lmd_high_rdp_distinct_count_destination_ip_for_source_euid Detects a high count of destination IPs establishing an RDP connection with a single source IP. Elastic Defend windows
lmd_high_mean_rdp_process_args_euid Detects unusually high number of process arguments in an RDP session. Elastic Defend windows

The job configurations and datafeeds can be found here.

Privileged Access Detection (PAD)

Machine learning package to detect anomalous privileged access activity in Windows, Linux and Okta logs. Refer to the subscription page to learn more about the required subscription.

To download, refer to the documentation.

Name Description Supported Integrations Supported OS
pad_windows_high_count_special_logon_events_euid Detects unusually high special logon events initiated by a user. Elastic Defend windows
pad_windows_high_count_special_privilege_use_events_euid Detects unusually high special privilege use events initiated by a user. Elastic Defend windows
pad_windows_high_count_group_management_events_euid Detects unusually high security group management events initiated by a user. Elastic Defend windows
pad_windows_high_count_user_account_management_events_euid Detects unusually high security user account management events initiated by a user. Elastic Defend windows
pad_windows_rare_privilege_assigned_to_user_euid Detects an unusual privilege type assigned to a user. Elastic Defend windows
pad_windows_rare_group_name_by_user_euid Detects an unusual group name accessed by a user. Elastic Defend windows
pad_windows_rare_device_by_user_euid Detects an unusual device accessed by a user. Elastic Defend windows
pad_windows_rare_source_ip_by_user_euid Detects an unusual source IP address accessed by a user. Elastic Defend windows
pad_windows_rare_region_name_by_user_euid Detects an unusual region name for a user. Elastic Defend windows
pad_linux_high_count_privileged_process_events_by_user_euid Detects a spike in privileged commands executed by a user. Elastic Defend linux
pad_linux_rare_process_executed_by_user_euid Detects a rare process executed by a user. Elastic Defend linux
pad_linux_high_median_process_command_line_entropy_by_user_euid Detects process command lines executed by a user with an abnormally high median entropy value. Okta
pad_okta_spike_in_group_membership_changes_euid Detects spike in group membership change events by a user. Okta
pad_okta_spike_in_user_lifecycle_management_changes_euid Detects spike in user lifecycle management change events by a user. Okta
pad_okta_spike_in_group_privilege_changes_euid Detects spike in group privilege change events by a user. Okta
pad_okta_spike_in_group_application_assignment_change_euid Detects spike in group application assignment change events by a user. Okta
pad_okta_spike_in_group_lifecycle_changes_euid Detects spike in group lifecycle change events by a user. Okta
pad_okta_high_sum_concurrent_sessions_by_user_euid Detects an unusual sum of active sessions started by a user. Okta
pad_okta_rare_source_ip_by_user_euid Detects an unusual source IP address accessed by a user. Okta
pad_okta_rare_region_name_by_user_euid Detects an unusual region name for a user. Okta
pad_okta_rare_host_name_by_user_euid Detects an unusual host name for a user. Okta

The job configurations and datafeeds can be found here.