Skip to content

Commit 7bcf6b5

Browse files
authored
[pad] Update ML jobs description and groups for Privileged Access Detection (#14268)
1 parent 37f9385 commit 7bcf6b5

File tree

3 files changed

+49
-23
lines changed

3 files changed

+49
-23
lines changed

packages/pad/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,8 @@
1+
- version: "0.6.0"
2+
changes:
3+
- description: Update ML jobs description and groups
4+
type: enhancement
5+
link: https://github.com/elastic/integrations/pull/14268
16
- version: "0.5.0"
27
changes:
38
- description: Fix bug in the dashboard

packages/pad/kibana/ml_module/pad-ml.json

Lines changed: 43 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,8 @@
8080
"config": {
8181
"groups": [
8282
"security",
83-
"pad"
83+
"pad",
84+
"windows"
8485
],
8586
"description": "Detects unusually high special logon events initiated by a user.",
8687
"analysis_config": {
@@ -117,7 +118,8 @@
117118
"config": {
118119
"groups": [
119120
"security",
120-
"pad"
121+
"pad",
122+
"windows"
121123
],
122124
"description": "Detects unusually high special privilege use events initiated by a user.",
123125
"analysis_config": {
@@ -153,7 +155,8 @@
153155
"config": {
154156
"groups": [
155157
"security",
156-
"pad"
158+
"pad",
159+
"windows"
157160
],
158161
"description": "Detects unusually high security group management events initiated by a user.",
159162
"analysis_config": {
@@ -189,7 +192,8 @@
189192
"config": {
190193
"groups": [
191194
"security",
192-
"pad"
195+
"pad",
196+
"windows"
193197
],
194198
"description": "Detects unusually high security user account management events initiated by a user.",
195199
"analysis_config": {
@@ -224,7 +228,8 @@
224228
"config": {
225229
"groups": [
226230
"security",
227-
"pad"
231+
"pad",
232+
"windows"
228233
],
229234
"description": "Detects an unusual privilege type assigned to a user.",
230235
"analysis_config": {
@@ -259,7 +264,8 @@
259264
"config": {
260265
"groups": [
261266
"security",
262-
"pad"
267+
"pad",
268+
"windows"
263269
],
264270
"description": "Detects an unusual group name accessed by a user.",
265271
"analysis_config": {
@@ -295,7 +301,8 @@
295301
"config": {
296302
"groups": [
297303
"security",
298-
"pad"
304+
"pad",
305+
"windows"
299306
],
300307
"description": "Detects an unusual device accessed by a user.",
301308
"analysis_config": {
@@ -331,7 +338,8 @@
331338
"config": {
332339
"groups": [
333340
"security",
334-
"pad"
341+
"pad",
342+
"windows"
335343
],
336344
"description": "Detects an unusual source IP address accessed by a user.",
337345
"analysis_config": {
@@ -367,7 +375,8 @@
367375
"config": {
368376
"groups": [
369377
"security",
370-
"pad"
378+
"pad",
379+
"windows"
371380
],
372381
"description": "Detects an unusual region name for a user.",
373382
"analysis_config": {
@@ -404,7 +413,8 @@
404413
"config": {
405414
"groups": [
406415
"security",
407-
"pad"
416+
"pad",
417+
"linux"
408418
],
409419
"description": "Detects a spike in privileged commands executed by a user.",
410420
"analysis_config": {
@@ -438,7 +448,8 @@
438448
"config": {
439449
"groups": [
440450
"security",
441-
"pad"
451+
"pad",
452+
"linux"
442453
],
443454
"description": "Detects a rare process executed by a user.",
444455
"analysis_config": {
@@ -472,9 +483,10 @@
472483
"config": {
473484
"groups": [
474485
"security",
475-
"pad"
486+
"pad",
487+
"linux"
476488
],
477-
"description": "Detects process command lines executed by a user with an abnormally high median entropy value",
489+
"description": "Detects process command lines executed by a user with an abnormally high median entropy value. This job requires some manual setup before it can run successfully, specifically adding custom field mappings for data coming from an ingest pipeline. Instructions for these steps are available in the package overview.",
478490
"analysis_config": {
479491
"bucket_span": "30m",
480492
"detectors": [
@@ -506,7 +518,8 @@
506518
"config": {
507519
"groups": [
508520
"security",
509-
"pad"
521+
"pad",
522+
"okta"
510523
],
511524
"description": "Detects spike in group membership change events by a user.",
512525
"analysis_config": {
@@ -542,7 +555,8 @@
542555
"config": {
543556
"groups": [
544557
"security",
545-
"pad"
558+
"pad",
559+
"okta"
546560
],
547561
"description": "Detects spike in user lifecycle management change events by a user.",
548562
"analysis_config": {
@@ -578,7 +592,8 @@
578592
"config": {
579593
"groups": [
580594
"security",
581-
"pad"
595+
"pad",
596+
"okta"
582597
],
583598
"description": "Detects spike in group privilege change events by a user.",
584599
"analysis_config": {
@@ -616,7 +631,8 @@
616631
"config": {
617632
"groups": [
618633
"security",
619-
"pad"
634+
"pad",
635+
"okta"
620636
],
621637
"description": "Detects spike in group application assignment change events by a user.",
622638
"analysis_config": {
@@ -651,7 +667,8 @@
651667
"config": {
652668
"groups": [
653669
"security",
654-
"pad"
670+
"pad",
671+
"okta"
655672
],
656673
"description": "Detects spike in group lifecycle change events by a user.",
657674
"analysis_config": {
@@ -686,7 +703,8 @@
686703
"config": {
687704
"groups": [
688705
"security",
689-
"pad"
706+
"pad",
707+
"okta"
690708
],
691709
"description": "Detects an unusual sum of active sessions started by a user.",
692710
"analysis_config": {
@@ -720,7 +738,8 @@
720738
"config": {
721739
"groups": [
722740
"security",
723-
"pad"
741+
"pad",
742+
"okta"
724743
],
725744
"description": "Detects an unusual source IP address accessed by a user.",
726745
"analysis_config": {
@@ -755,7 +774,8 @@
755774
"config": {
756775
"groups": [
757776
"security",
758-
"pad"
777+
"pad",
778+
"okta"
759779
],
760780
"description": "Detects an unusual region name for a user.",
761781
"analysis_config": {
@@ -791,7 +811,8 @@
791811
"config": {
792812
"groups": [
793813
"security",
794-
"pad"
814+
"pad",
815+
"okta"
795816
],
796817
"description": "Detects an unusual host name for a user.",
797818
"analysis_config": {

packages/pad/manifest.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
format_version: 3.0.0
22
name: pad
33
title: "Privileged Access Detection"
4-
version: 0.5.0
4+
version: 0.6.0
55
source:
66
license: "Elastic-2.0"
77
description: "ML package to detect anomalous privileged access activity in Windows, Linux and Okta logs"

0 commit comments

Comments
 (0)