Credential Dumping - Detected - Elastic Endpoint Security

edit

Credential Dumping - Detected - Elastic Endpoint Security

edit

Elastic Endpoint Security detected Credential Dumping. Click the Elastic Endpoint Security icon in the event.module column or the link in the rule.reference column for additional information.

Rule type: query

Rule indices:

  • endgame-*

Severity: high

Risk score: 73

Runs every: 10 minutes

Searches indices from: now-15m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

Tags:

  • Elastic
  • Endpoint

Version: 3 (version history)

Added (Elastic Stack release): 7.6.0

Last modified (Elastic Stack release): 7.9.0

Rule authors: Elastic

Rule license: Elastic License

Rule query

edit
event.kind:alert and event.module:endgame and
endgame.metadata.type:detection and (event.action:cred_theft_event or
endgame.event_subtype_full:cred_theft_event)

Rule version history

edit
Version 3 (7.9.0 release)
  • Rule name changed from: Credential Dumping - Detected - Elastic Endpoint
Version 2 (7.7.0 release)
  • Updated query, changed from:

    event.kind:alert and event.module:endgame and
    event.action:cred_theft_event and endgame.metadata.type:detection