Home / Companies / Elastic / Blog / Post Details
Content Deep Dive

Elastic SIEM detection engine with pre-built rules and analytics.

Blog post from Elastic

Post Details
Company
Date Published
Author
Devin Hurley • Frank Hassanabad • Elastic Security Intelligence & Analytics Team
Word Count
1,634
Language
English
Hacker News Points
-
Summary

The Elastic Security platform, formerly known as Elastic SIEM, has introduced a modern detection engine as part of Elastic Security 7.6, offering a unified SIEM rule experience for security operations centers (SOCs). This detection engine leverages Elasticsearch analytics and runs on Kibana's distributed execution platform, enabling the creation and management of signals, which are documents generated when rule conditions are met. These signals help practitioners manage security alerts efficiently, allowing them to analyze and close signals after investigation. The platform supports a streamlined workflow for rule creation, offering prebuilt rules and customizable settings, including integration with MITRE ATT&CK tactics. The detection engine is scalable, utilizing Kibana's Alerting framework and task manager to balance tasks across instances, and includes mechanisms to prevent duplicate signals. Users can engage with the Elastic community to provide feedback and influence future developments, such as incorporating machine learning and advanced queries.