Open
Description
Link to Rule
Rule Tuning Type
False Positives - Reducing benign events mistakenly identified as threats.
Description
On my Windows 11, I get false positives for the rule "Suspicious Endpoint Security Parent Process" when parent process C:\Windows\System32\SecurityHealth\10.0.27777.1008-0\SecurityHealthHost.exe
starts C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe
.
There is a builtin exception in the rule defintion, but it seems another SecurityHealthHost.exe
?:\\Windows\\System32\\SecurityHealth\\*\\SecurityHealthHost.exe
should be added it seems?
Example Data
Sanitized alert:
{
"alert": {
"rule_name": "Suspicious Endpoint Security Parent Process",
"rule_id": "b41a13c6-ba45-4bab-a534-df53d0cfed6a",
"severity": "medium",
"risk_score": 47,
"timestamp": "2025-05-16T05:46:45.566Z",
"reason": "process event with process elastic-endpoint.exe, parent process SecurityHealthHost.exe"
},
"process": {
"name": "elastic-endpoint.exe",
"executable": "C:\\Program Files\\Elastic\\Endpoint\\elastic-endpoint.exe",
"args": [
"C:\\Program Files\\Elastic\\Endpoint\\elastic-endpoint.exe",
"/launch",
"/av"
],
"command_line": "\"C:\\Program Files\\Elastic\\Endpoint\\elastic-endpoint.exe\" /launch /av",
"pid": 16100,
"code_signature": {
"subject_name": "Elasticsearch, Inc.",
"trusted": true
}
},
"parent_process": {
"name": "SecurityHealthHost.exe",
"executable": "C:\\Windows\\System32\\SecurityHealth\\10.0.27777.1008-0\\SecurityHealthHost.exe",
"command_line": "\\\\?\\C:\\Windows\\System32\\SecurityHealth\\10.0.27777.1008-0\\SecurityHealthHost.exe {GUID} -Embedding",
"pid": 16056,
"code_signature": {
"subject_name": "Microsoft Windows",
"trusted": true
}
},
"host": {
"os": "Windows 11 Pro 23H2 (10.0.22631.5335)",
"hostname": "host123.example.local"
},
"user": {
"name": "analyst_user"
},
"agent": {
"id": "f55431af-4658-40c3-968d-390a008d989b",
"version": "9.0.1",
"type": "endpoint"
},
"event": {
"action": "start",
"module": "endpoint",
"category": ["process"],
"kind": "signal",
"dataset": "endpoint.events.process",
"id": "O0PEbmhugbsqw+kV++++5el3"
}
}