Newly Observed Palo Alto Network Alert

This rule detects Palo Alto Network alerts that are observed for the first time in the previous 5 days of alert history. Analysts can use this to prioritize triage and response.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2026/01/21"
 3integration = ["panw"]
 4maturity = "production"
 5updated_date = "2026/01/21"
 6
 7[rule]
 8author = ["Elastic"]
 9description = """
10This rule detects Palo Alto Network alerts that are observed for the first time in the previous 5 days of alert history.
11Analysts can use this to prioritize triage and response.
12"""
13from = "now-7205m"
14interval = "5m"
15language = "esql"
16license = "Elastic License v2"
17name = "Newly Observed Palo Alto Network Alert"
18risk_score = 99
19rule_id = "283683eb-f2ce-40a5-be16-fa931cb5f504"
20severity = "critical"
21tags = ["Use Case: Threat Detection", "Rule Type: Higher-Order Rule", "Resources: Investigation Guide", "Domain: Network", "Data Source: PAN-OS"]
22timestamp_override = "event.ingested"
23type = "esql"
24
25query = '''
26FROM logs-panw.panos-*, filebeat-* metadata _id
27
28// exclude Informational and Low severity levels (4 and 5)
29| where event.dataset == "panw.panos" and TO_INTEGER(event.severity) <= 3 and event.action != "flood_detected"
30
31| STATS Esql.alerts_count = count(*),
32        Esql.first_time_seen = MIN(@timestamp),
33        Esql.distinct_count_src_ip = COUNT_DISTINCT(source.ip),
34        Esql.distinct_count_dst_ip = COUNT_DISTINCT(destination.ip),
35        src_ip = VALUES(source.ip),
36        dst_ip = VALUES(destination.ip),
37        url_dom = VALUES(url.domain),
38        url_path = VALUES(url.path) by rule.name, event.action, event.type, event.kind, event.severity
39
40// first time seen is within 10m of the rule execution time within last 5 days
41| eval Esql.recent = DATE_DIFF("minute", Esql.first_time_seen, now())
42| where Esql.recent <= 10 and Esql.alerts_count <= 5 and Esql.distinct_count_src_ip <= 2 and Esql.distinct_count_dst_ip <= 2
43
44// move dynamic fields to ECS quivalent for rule exceptions
45| eval source.ip = MV_FIRST(src_ip),
46       destination.ip = MV_FIRST(dst_ip),
47       url.domain = MV_FIRST(url_dom),
48       url.path = MV_FIRST(url_path)
49| keep rule.name, event.*, Esql.*, source.ip, destination.ip, url.domain, url.path
50'''
51note = """## Triage and analysis
52
53### Investigating Newly Observed Palo Alto Network Alert
54
55This rule surfaces newly observed, low-frequency high severity Palo Alto Network alert within the last 5 days.
56
57Because the alert has not been seen previously for this rule and host, it should be prioritized for validation to determine
58whether it represents a true compromise or rare benign activity.
59
60### Investigation Steps
61
62- Identify the source address, affected host and review the associated rule name to understand the behavior that triggered the alert.
63- Validate the source address under which the activity occurred and assess whether it aligns with normal behavior.
64- Refer to the specific alert details like event.original to get more context.
65
66### False Positive Considerations
67
68- Vulnerability scanners and pentesting.
69- Administrative scripts or automation tools can trigger detections when first introduced.
70- Development or testing environments may produce one-off behaviors that resemble malicious techniques.
71
72### Response and Remediation
73
74- If the activity is confirmed malicious, isolate the affected host to prevent further execution or lateral movement.
75- Terminate malicious processes and remove any dropped files or persistence mechanisms.
76- Collect forensic artifacts to understand initial access and execution flow.
77- Patch or remediate any vulnerabilities or misconfigurations that enabled the behavior.
78- If benign, document the finding and consider tuning or exception handling to reduce future noise.
79- Continue monitoring the host and environment for recurrence of the behavior or related alerts."""
80references = ["https://www.elastic.co/docs/reference/integrations/panw"]

Triage and analysis

Investigating Newly Observed Palo Alto Network Alert

This rule surfaces newly observed, low-frequency high severity Palo Alto Network alert within the last 5 days.

Because the alert has not been seen previously for this rule and host, it should be prioritized for validation to determine whether it represents a true compromise or rare benign activity.

Investigation Steps

  • Identify the source address, affected host and review the associated rule name to understand the behavior that triggered the alert.
  • Validate the source address under which the activity occurred and assess whether it aligns with normal behavior.
  • Refer to the specific alert details like event.original to get more context.

False Positive Considerations

  • Vulnerability scanners and pentesting.
  • Administrative scripts or automation tools can trigger detections when first introduced.
  • Development or testing environments may produce one-off behaviors that resemble malicious techniques.

Response and Remediation

  • If the activity is confirmed malicious, isolate the affected host to prevent further execution or lateral movement.
  • Terminate malicious processes and remove any dropped files or persistence mechanisms.
  • Collect forensic artifacts to understand initial access and execution flow.
  • Patch or remediate any vulnerabilities or misconfigurations that enabled the behavior.
  • If benign, document the finding and consider tuning or exception handling to reduce future noise.
  • Continue monitoring the host and environment for recurrence of the behavior or related alerts.

References

Related rules

to-top