[Security Solution] [CTI] Indicator Match "field matching" logic ignored when a saved query is used in rule configuration #107986
Labels
bug
Fixes for quality problems that affect the customer experience
impact:high
Addressing this issue will have a high level of impact on the quality/strength of our product.
Team: CTI
Team:Detections and Resp
Security Detection Response Team
Team: SecuritySolution
Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.
Describe the bug:
When an Indicator Match rule is configured with a saved query (i.e. a
saved_id
), the field matching logic (i.e.field.x matches field.y
) is not taken in account when processing the rule. This leads to unexpected alerts being generated.Kibana/Elasticsearch Stack version:
7.14
Steps to reproduce:
Create an Indicator Match rule with the following configuration:
Using Kibana -> Dev Tools, create
test-filebeat
andtest-indicator-index
indices as shown belowDev Tools commands
Using Kibana -> Dev Tools, index some test documents into the
test-filebeat
andtest-indicator-index
indices as shown belowDev Tools commands
Activate the rule. Notice that no alerts are generated as expected.
Edit the rule. Under the
Custom query
section, click on the saved query icon and then click onSave current query
. Finally save the changes to the rule configuration.Deactive/Activate the rule to force it to execute again. Notice that an alert is created unexpectedly. The generated alert has no Threat Intel data.
The text was updated successfully, but these errors were encountered: