Skip to content

Commit 5653190

Browse files
authored
[Rule Tuning] Remove hardcoded logic from description (#4503)
1 parent 06002cd commit 5653190

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

rules/network/discovery_potential_network_sweep_detected.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,16 @@
22
creation_date = "2023/05/17"
33
integration = ["network_traffic", "panw"]
44
maturity = "production"
5-
updated_date = "2025/02/04"
5+
updated_date = "2025/02/28"
66

77
[rule]
88
author = ["Elastic"]
99
description = """
1010
This rule identifies a potential network sweep. A network sweep is a method used by attackers to scan a target network,
1111
identifying active hosts, open ports, and available services to gather information on vulnerabilities and weaknesses.
1212
This reconnaissance helps them plan subsequent attacks and exploit potential entry points for unauthorized access, data
13-
theft, or other malicious activities. This rule proposes threshold logic to check for connection attempts from one
14-
source host to 100 or more destination hosts on commonly used network services.
13+
theft, or other malicious activities. This rule defines a threshold-based approach to detect multiple connection
14+
attempts from a single host to numerous destination hosts over commonly used network services.
1515
"""
1616
from = "now-9m"
1717
index = ["packetbeat-*", "filebeat-*", "logs-network_traffic.*", "logs-panw.panos*"]

rules/network/discovery_potential_port_scan_detected.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/05/17"
33
integration = ["network_traffic", "panw"]
44
maturity = "production"
5-
updated_date = "2025/02/04"
5+
updated_date = "2025/02/28"
66

77
[rule]
88
author = ["Elastic"]
@@ -11,8 +11,8 @@ This rule identifies a potential port scan. A port scan is a method utilized by
1111
target system or network for open ports, allowing them to identify available services and potential vulnerabilities. By
1212
mapping out the open ports, attackers can gather critical information to plan and execute targeted attacks, gaining
1313
unauthorized access, compromising security, and potentially leading to data breaches, unauthorized control, or further
14-
exploitation of the targeted system or network. This rule proposes threshold logic to check for connection attempts from
15-
one source host to 250 or more destination ports.
14+
exploitation of the targeted system or network. This rule defines a threshold-based approach to detect connection
15+
attempts from a single source to a wide range of destination ports.
1616
"""
1717
from = "now-9m"
1818
index = ["logs-network_traffic.*", "packetbeat-*", "filebeat-*", "logs-panw.panos*"]

rules/network/discovery_potential_syn_port_scan_detected.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/05/17"
33
integration = ["network_traffic", "panw"]
44
maturity = "production"
5-
updated_date = "2025/02/04"
5+
updated_date = "2025/02/28"
66

77
[rule]
88
author = ["Elastic"]
@@ -11,8 +11,8 @@ This rule identifies a potential SYN-Based port scan. A SYN port scan is a techn
1111
target network for open ports by sending SYN packets to multiple ports and observing the response. Attackers use this
1212
method to identify potential entry points or services that may be vulnerable to exploitation, allowing them to launch
1313
targeted attacks or gain unauthorized access to the system or network, compromising its security and potentially leading
14-
to data breaches or further malicious activities. This rule proposes threshold logic to check for connection attempts
15-
from one source host to 250 or more destination ports using 2 or less packets per port.
14+
to data breaches or further malicious activities. This rule defines a threshold-based approach to detect connection
15+
attempts from a single source to a large number of unique destination ports, while limiting the number of packets per port.
1616
"""
1717
from = "now-9m"
1818
index = ["logs-network_traffic.*", "packetbeat-*", "filebeat-*", "logs-panw.panos*"]

0 commit comments

Comments
 (0)