open-menu
closeme
Elastic Security External Alerts
calendar
Aug 5, 2025
·
Data Source: Elastic Security
Use Case: Threat Detection
Resources: Investigation Guide
Promotion: External Alerts
·
Share on:
twitter
facebook
linkedin
copy
CrowdStrike External Alerts
calendar
Aug 4, 2025
·
Data Source: CrowdStrike
Use Case: Threat Detection
Resources: Investigation Guide
Promotion: External Alerts
·
Share on:
twitter
facebook
linkedin
copy
Google SecOps External Alerts
calendar
Aug 4, 2025
·
Data Source: Google SecOps
Use Case: Threat Detection
Resources: Investigation Guide
Promotion: External Alerts
·
Share on:
twitter
facebook
linkedin
copy
Microsoft Sentinel External Alerts
calendar
Aug 4, 2025
·
Data Source: Microsoft Sentinel
Use Case: Threat Detection
Resources: Investigation Guide
Promotion: External Alerts
·
Share on:
twitter
facebook
linkedin
copy
SentinelOne Alert External Alerts
calendar
Aug 4, 2025
·
Data Source: SentinelOne
Use Case: Threat Detection
Resources: Investigation Guide
Promotion: External Alerts
·
Share on:
twitter
facebook
linkedin
copy
SentinelOne Threat External Alerts
calendar
Aug 4, 2025
·
Data Source: SentinelOne
Use Case: Threat Detection
Resources: Investigation Guide
Promotion: External Alerts
·
Share on:
twitter
facebook
linkedin
copy
Splunk External Alerts
calendar
Aug 4, 2025
·
Data Source: Splunk
Use Case: Threat Detection
Resources: Investigation Guide
Promotion: External Alerts
·
Share on:
twitter
facebook
linkedin
copy
Adversary Behavior - Detected - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Credential Dumping - Detected - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Use Case: Threat Detection
Tactic: Credential Access
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Credential Dumping - Prevented - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Use Case: Threat Detection
Tactic: Credential Access
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Credential Manipulation - Detected - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Use Case: Threat Detection
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Credential Manipulation - Prevented - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Use Case: Threat Detection
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Exploit - Detected - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Use Case: Threat Detection
Tactic: Execution
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Exploit - Prevented - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Use Case: Threat Detection
Tactic: Execution
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
External Alerts
calendar
Mar 27, 2025
·
OS: Windows
Data Source: APM
OS: macOS
OS: Linux
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Malware - Detected - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Malware - Prevented - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Permission Theft - Detected - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Use Case: Threat Detection
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Permission Theft - Prevented - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Use Case: Threat Detection
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Process Injection - Detected - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Use Case: Threat Detection
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Process Injection - Prevented - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Use Case: Threat Detection
Tactic: Privilege Escalation
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Ransomware - Detected - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Ransomware - Prevented - Elastic Endgame
calendar
Mar 27, 2025
·
Data Source: Elastic Endgame
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
to-top