-
Notifications
You must be signed in to change notification settings - Fork 445
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Standardize Ingested Data for Response Actions #12563
Comments
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
Hey @paul-tavares , could you please provide additional technical information to @kcreddy in this ticket? |
Hey @paul-tavares, In addition to the above info, I would like to get clarity on the following: Crowdstrike has
So is the requirement to create another data-stream for |
@paul-tavares, looking for some clarifications:
List of hosts:
List of action statuses:
|
HI all. Apologies for the delayed response. Before I answer the questions posted, let me just detail what we need and the pain points we have encountered after having worked with SentinelOne, Microsoft Defender and Crowdstrike integration data (note: I will not be able to comment much on the Crowdstrike data, but @tomsonpl can if needed). So overall, in order for us to efficiently support the ability for Kibana users to send actions against hosts from these 3rd party EDR system we need the following information on the data that is ingested into Elasticsearch: Detection Engine (alerts):
It would be great if overall the information I detailed above could be stored in a single, common area in the document that is ingested into elastic, but as long as this information is available somewhere in the document we can still retrieve it. Supporting Response ActionsIn order to better support response actions, it would be ideal (if possible) to also ingest the following type of data if it is available from the 3rd party system:
To the specific questions asked above
➡ This is correct. We should create a new datastream and start to pull in the list of Machines from Microsoft and keeping them updated (I'm assuming based on their
➡ Yes please. this would be great. these would need to kept up to date as the records in Microsoft are updated until the action is "complete".
➡ @tomsonpl can probably help here, as he was given access to a customer's environment and may be able to pull in API info. along with some data examples for you.
➡ I seem to remember that S1 does not really have a single API that provides a list of action take against a host along with its statuses. I also remember that they don't log the action all to a single location - example: isolation is only logged in the activity log, while running scripts are logged in task list. BTW: we have access to a SentinelOne env. if you need to login and take a look around. They have API docs there along with an API console. ![]() Let me know if you need access and I'll see if I can set it up for you. |
Standardize Ingested Data for Response Actions
Description
To improve bidirectional response actions, we need consistent data ingestion from CrowdStrike, SentinelOne, and Microsoft Defender for Endpoint. This includes host listings, machine action tracking, and essential identifiers.
Requirements
Ensure all three integrations provide:
agent.id
- Some systems (e.g,. SentinelOne) have multiple “agent”/“Host” ID, the one needed to be captured is the ID that in turn is used with the external system’s API.host.os.type
Impact
Next Steps
The text was updated successfully, but these errors were encountered: