open-menu
closeme
Elastic Defend Alert from GenAI Utility or Descendant
calendar
Mar 9, 2026
·
Domain: Endpoint
Domain: LLM
Use Case: Threat Detection
Tactic: Initial Access
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Data Source: Elastic Defend
·
Share on:
twitter
facebook
linkedin
copy
Multiple Alerts on a Host Exhibiting CPU Spike
calendar
Feb 27, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Domain: Endpoint
Tactic: Impact
·
Share on:
twitter
facebook
linkedin
copy
Okta Alerts Following Unusual Proxy Authentication
calendar
Feb 26, 2026
·
Domain: Identity
Domain: Cloud
Use Case: Identity and Access Audit
Use Case: Threat Detection
Data Source: Okta
Data Source: Okta System Logs
Tactic: Initial Access
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
FortiGate SSL VPN Login Followed by SIEM Alert by User
calendar
Feb 23, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Tactic: Initial Access
Data Source: Fortinet
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Newly Observed FortiGate Alert
calendar
Feb 23, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Domain: Network
Data Source: Fortinet
·
Share on:
twitter
facebook
linkedin
copy
Newly Observed High Severity Suricata Alert
calendar
Feb 23, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Domain: Network
Data Source: Suricata
·
Share on:
twitter
facebook
linkedin
copy
LLM-Based Attack Chain Triage by Host
calendar
Feb 20, 2026
·
Domain: Endpoint
Domain: LLM
Use Case: Threat Detection
Data Source: Elastic Defend
Resources: Investigation Guide
Rule Type: Higher-Order Rule
·
Share on:
twitter
facebook
linkedin
copy
LLM-Based Compromised User Triage by User
calendar
Feb 20, 2026
·
Domain: Identity
Domain: LLM
Use Case: Threat Detection
Use Case: Identity and Access Audit
Resources: Investigation Guide
Rule Type: Higher-Order Rule
·
Share on:
twitter
facebook
linkedin
copy
Okta Successful Login After Credential Attack
calendar
Feb 20, 2026
·
Domain: Identity
Use Case: Identity and Access Audit
Use Case: Threat Detection
Data Source: Okta
Data Source: Okta System Logs
Tactic: Credential Access
Tactic: Initial Access
Resources: Investigation Guide
Rule Type: Higher-Order Rule
·
Share on:
twitter
facebook
linkedin
copy
Correlated Alerts on Similar User Identities
calendar
Feb 20, 2026
·
Domain: Identity
Domain: LLM
Use Case: Threat Detection
Use Case: Identity and Access Audit
Resources: Investigation Guide
Rule Type: Higher-Order Rule
·
Share on:
twitter
facebook
linkedin
copy
Multiple Rare Elastic Defend Behavior Rules by Host
calendar
Feb 20, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Data Source: Elastic Defend
·
Share on:
twitter
facebook
linkedin
copy
Alerts From Multiple Integrations by Destination Address
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Alerts From Multiple Integrations by Source Address
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Alerts From Multiple Integrations by User Name
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Alerts in Different ATT&CK Tactics by Host
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Detection Alert on a Process Exhibiting CPU Spike
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Domain: Endpoint
Tactic: Impact
·
Share on:
twitter
facebook
linkedin
copy
Lateral Movement Alerts from a Newly Observed Source Address
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Tactic: Lateral Movement
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Lateral Movement Alerts from a Newly Observed User
calendar
Feb 18, 2026
·
OS: Windows
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Tactic: Lateral Movement
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Multiple Alerts in Same ATT&CK Tactic by Host
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Multiple Alerts Involving a User
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Multiple External EDR Alerts by Host
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Domain: Endpoint
·
Share on:
twitter
facebook
linkedin
copy
Multiple Machine Learning Alerts by Influencer Field
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Rule Type: Machine Learning
·
Share on:
twitter
facebook
linkedin
copy
Newly Observed High Severity Detection Alert
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Suspected Lateral Movement from Compromised Host
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Elastic Defend and Network Security Alerts Correlation
calendar
Feb 18, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Data Source: Elastic Defend
Data Source: Fortinet
Data Source: PAN-OS
·
Share on:
twitter
facebook
linkedin
copy
Elastic Defend Alert Followed by Telemetry Loss
calendar
Feb 13, 2026
·
Domain: Endpoint
Data Source: Elastic Defend
Use Case: Threat Detection
Tactic: Defense Evasion
Tactic: Execution
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Potential Malicious PowerShell Based on Alert Correlation
calendar
Feb 11, 2026
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Execution
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Multiple Vulnerabilities by Asset via Wiz
calendar
Jan 26, 2026
·
Use Case: Vulnerability
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Data Source: Wiz
·
Share on:
twitter
facebook
linkedin
copy
Newly Observed Elastic Defend Behavior Alert
calendar
Jan 26, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Data Source: Elastic Defend
·
Share on:
twitter
facebook
linkedin
copy
Newly Observed Palo Alto Network Alert
calendar
Jan 23, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Domain: Network
Data Source: PAN-OS
·
Share on:
twitter
facebook
linkedin
copy
Unusual Discovery Signal Alert with Unusual Process Command Line
calendar
Jan 16, 2026
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Discovery
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Unusual Discovery Signal Alert with Unusual Process Executable
calendar
Jan 16, 2026
·
Domain: Endpoint
OS: Windows
Use Case: Threat Detection
Tactic: Discovery
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Multiple Elastic Defend Alerts from a Single Process Tree
calendar
Jan 2, 2026
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Data Source: Elastic Defend
·
Share on:
twitter
facebook
linkedin
copy
Elastic Defend and Email Alerts Correlation
calendar
Dec 15, 2025
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Data Source: Elastic Defend
Data Source: Check Point Harmony Email & Collaboration
Domain: Email
Domain: Endpoint
·
Share on:
twitter
facebook
linkedin
copy
M365 or Entra ID Identity Sign-in from a Suspicious Source
calendar
Dec 10, 2025
·
Domain: Cloud
Domain: SaaS
Data Source: Azure
Data Source: Entra ID
Data Source: Entra ID Sign-in Logs
Data Source: Microsoft 365
Data Source: Microsoft 365 Audit Logs
Use Case: Identity and Access Audit
Use Case: Threat Detection
Tactic: Initial Access
Resources: Investigation Guide
Rule Type: Higher-Order Rule
·
Share on:
twitter
facebook
linkedin
copy
Multiple Elastic Defend Alerts by Agent
calendar
Nov 24, 2025
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
Data Source: Elastic Defend
·
Share on:
twitter
facebook
linkedin
copy
Potential Widespread Malware Infection Across Multiple Hosts
calendar
Aug 5, 2025
·
Domain: Endpoint
Data Source: Elastic Defend
Use Case: Threat Detection
Tactic: Execution
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Stolen Credentials Used to Login to Okta Account After MFA Reset
calendar
Jul 7, 2025
·
Tactic: Persistence
Use Case: Identity and Access Audit
Data Source: Okta
Data Source: Elastic Defend
Rule Type: Higher-Order Rule
Domain: Endpoint
Domain: Cloud
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Multiple Alerts in Different ATT&CK Tactics on a Single Host
calendar
Jun 27, 2025
·
Use Case: Threat Detection
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
GitHub UEBA - Multiple Alerts from a GitHub Account
calendar
Mar 20, 2025
·
Domain: Cloud
Use Case: Threat Detection
Use Case: UEBA
Tactic: Execution
Rule Type: Higher-Order Rule
Data Source: Github
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
Potential Buffer Overflow Attack Detected
calendar
Jan 22, 2025
·
Domain: Endpoint
OS: Linux
Use Case: Threat Detection
Tactic: Privilege Escalation
Tactic: Initial Access
Use Case: Vulnerability
Rule Type: Higher-Order Rule
Resources: Investigation Guide
·
Share on:
twitter
facebook
linkedin
copy
to-top