- 03 Feb 2025
- DarkLight
Session 3: Security CTRL - SIEM (Elastic SIEM) Walk Through
- Updated on 03 Feb 2025
- DarkLight
SEIM Overview
SIEM is an acronym for Security information and event management and a general term for tools that aggregate security related logs and information into a format that’s easily searchable and automatically generates alerts.
Elastic is an extremely flexible tool with a wide variety of configuration options. SIEM specifically can be tuned in wide variety of ways however the exact details will largely depend on the needs of individual clients. Expedient provides a default configuration and this walk through demonstrates a number of additional features that are client managed. See the following KB page for details of what is and is not managed by Expedient with this product.
Like all Elastic based products the policy that is set on each agent determines what data is available for the SIEM module to search. Make sure all of your agents that you want reporting in SIEM are configured with a SIEM profile. See the first walk through video for additional details.
Rules (Detection Rules (SIEM))
Detection rules are the heart of SIEM. Elastic works by searching all the data that it ingests. Rules are how you choose exactly what to search for.
Rules are found under the Security section in the hamburger menu
Expedient will install a default set of rules however there are additional rules available under the “Add Elastic Rules”
Not all rules will work as the necessary data isn’t ingested by Expedient by default. For instance there are rules for Okta authentication but the Okta integration necessary to run the rules doesn’t fall under Expedient’s management scope.
To see the details of a specific rule or to tweak its settings you can click on the name.
For instance the “Potential PrintNightmare Exploit Registry Modification” rule searches for registry changes related to the exploit. It provides reference URLs that show the details of the exploit being referenced
Rules need to be manually enabled by toggling the button in the upper right of the page. Expedient doesn’t know which rules will make sense in your environment so it’s up to each client to enable rules.
Rules can also be edited to add an action if any results are detected. Actions are integrations to various notification services.
The simplest example is the email integration. By default it is configured to use Expedient’s 810 Mail Relay. We do not current support other mail relays.
To configure an email alert for a specific rule you have to specify and email address to send to as well s the subject and contents of the message. Both the subject and the message support variables such as date and time that can be added from the blue plus symbol button.
Rules can be enabled individually or in bulk
By default rules are not enabled besides endpoint protection if the client is subscribed to Endpoint protection. Each rule that is enabled is another search against the data Elastic ingests. There is potential to create performance problems if too many rules are enabled.
To enable multiple rules at once select the check box next to the rule name and select enable from the bulk options menu
It’s also possible to configure actions for multiple rules at once to send alerts whenever those rules are triggered.
Dashboards
Configuring alerts for email, teams, Slack or some other platform can get cumbersome and there are certainly rules that you don’t necessarily need to be notified about every time an alert comes in. This is where dashboards come in.
For instance the Overview dashboard shows which rules are currently running, any alerts that have come in, as well as general events that are being logged. In this screenshot there is one rule that detects whenever services are stopped on Windows servers that is currently creating a large volume of alerts.
Elastic creates default dashboards based on common needs but custom dashboards can also be created by clients if there are specific alerts you want to see the details of. Custom dashboards are not managed by Expedient.
Additional documentation on Elastic’s default dashboards is available from Elastic.
Cases & Timelines
Cases and Timelines are features in Elastic that are not managed by Expedient but are extremely useful for aggregating potentially related alerts. Both allow you to aggregate alerts into a single location while including all the original details of the alerts and keeping the data easily filterable.
For additional information check out Elastic’s Docs pages on Timelines and Cases.