Skip to content
6 changes: 3 additions & 3 deletions packages/problemchild/_dev/build/docs/README.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
# Living off the Land Attack Detection

The Living off the Land Attack (LotL) Detection package contains a supervised machine learning model, called [ProblemChild and associated assets](https://www.elastic.co/blog/problemchild-generate-alerts-to-detect-living-off-the-land-attacks), which are used to detect living off the land (LotL) activity in your environment.
The Living off the Land Attack (LotL) Detection package contains a supervised machine learning model, called [ProblemChild and associated assets](https://www.elastic.co/security-labs/detecting-living-off-the-land-attacks-with-new-elastic-integration), which are used to detect living off the land (LotL) activity in your environment.
This package requires a Platinum subscription. Please ensure that you have a Trial or Platinum level subscription installed on your cluster before proceeding. This package is licensed under Elastic License v 1.0.

## Configuration

To download the assets, click **Settings** > **Install Living off the Land Attack Detection assets**.

Follow these instructions to ingest data with the ingest pipeline and enrich your indices with inference data. Then use these detection rules and anomaly detection jobs to detect LotL attacks. For more detailed information refer to [this](https://www.elastic.co/blog/problemchild-generate-alerts-to-detect-living-off-the-land-attacks) blog.
Follow these instructions to ingest data with the ingest pipeline and enrich your indices with inference data. Then use these detection rules and anomaly detection jobs to detect LotL attacks. For more detailed information refer to [this](https://www.elastic.co/security-labs/detecting-living-off-the-land-attacks-with-new-elastic-integration) blog.

### (Required) Set up the ingest pipeline

Expand Down Expand Up @@ -54,4 +54,4 @@ Detects potential LotL activity by identifying malicious processes.
| Suspicious Windows Process Cluster Spawned by a User | A machine learning job combination has detected a set of one or more suspicious Windows processes with unusually high scores for malicious probability. These process(es) have been classified as malicious in several ways. The process(es) were predicted to be malicious by the ProblemChild supervised ML model. If the anomaly contains a cluster of suspicious processes, each process has the same user name, and the aggregate score of the event cluster was calculated to be unusually high by an unsupervised ML model. Such a cluster often contains suspicious or malicious activity, possibly involving LOLbins, that may be resistant to detection using conventional search rules. |

## Licensing
Usage in production requires that you have a license key that permits use of machine learning features.
Usage in production requires that you have a license key that permits use of machine learning features.
5 changes: 5 additions & 0 deletions packages/problemchild/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "1.1.1"
changes:
- description: Update blog post link and minor bug fixes
type: bugfix
link: https://github.com/elastic/integrations/pull/7618
- version: "1.1.0"
changes:
- description: Ensure event.kind is correctly set for pipeline errors.
Expand Down
6 changes: 3 additions & 3 deletions packages/problemchild/docs/README.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
# Living off the Land Attack Detection

The Living off the Land Attack (LotL) Detection package contains a supervised machine learning model, called [ProblemChild and associated assets](https://www.elastic.co/blog/problemchild-generate-alerts-to-detect-living-off-the-land-attacks), which are used to detect living off the land (LotL) activity in your environment.
The Living off the Land Attack (LotL) Detection package contains a supervised machine learning model, called [ProblemChild and associated assets](https://www.elastic.co/security-labs/detecting-living-off-the-land-attacks-with-new-elastic-integration), which are used to detect living off the land (LotL) activity in your environment.
This package requires a Platinum subscription. Please ensure that you have a Trial or Platinum level subscription installed on your cluster before proceeding. This package is licensed under Elastic License v 1.0.

## Configuration

To download the assets, click **Settings** > **Install Living off the Land Attack Detection assets**.

Follow these instructions to ingest data with the ingest pipeline and enrich your indices with inference data. Then use these detection rules and anomaly detection jobs to detect LotL attacks. For more detailed information refer to [this](https://www.elastic.co/blog/problemchild-generate-alerts-to-detect-living-off-the-land-attacks) blog.
Follow these instructions to ingest data with the ingest pipeline and enrich your indices with inference data. Then use these detection rules and anomaly detection jobs to detect LotL attacks. For more detailed information refer to [this](https://www.elastic.co/security-labs/detecting-living-off-the-land-attacks-with-new-elastic-integration) blog.

### (Required) Set up the ingest pipeline

Expand Down Expand Up @@ -54,4 +54,4 @@ Detects potential LotL activity by identifying malicious processes.
| Suspicious Windows Process Cluster Spawned by a User | A machine learning job combination has detected a set of one or more suspicious Windows processes with unusually high scores for malicious probability. These process(es) have been classified as malicious in several ways. The process(es) were predicted to be malicious by the ProblemChild supervised ML model. If the anomaly contains a cluster of suspicious processes, each process has the same user name, and the aggregate score of the event cluster was calculated to be unusually high by an unsupervised ML model. Such a cluster often contains suspicious or malicious activity, possibly involving LOLbins, that may be resistant to detection using conventional search rules. |

## Licensing
Usage in production requires that you have a license key that permits use of machine learning features.
Usage in production requires that you have a license key that permits use of machine learning features.
Original file line number Diff line number Diff line change
Expand Up @@ -351,7 +351,7 @@ processors:
}
if:
ctx.containsKey('problemchild') && ctx['problemchild'].containsKey('prediction')
&& ctx['problemchild']['prediction'] == 0
&& ctx['problemchild']['prediction'] == '0'
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ajosh0504 does this look good? The rest of these changes are good to me

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep this looks good!

params:
blocklist:
- dump
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
"from": "now-9m",
"index": [
"endgame-*",
"logs-endpoint.events.process.*",
"logs-endpoint.events.process-*",
"winlogbeat-*"
],
"language": "kuery",
Expand All @@ -30,4 +30,4 @@
},
"id": "34184d4e-ef61-477b-8d76-5c93448c29bf",
"type": "security-rule"
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
"from": "now-9m",
"index": [
"endgame-*",
"logs-endpoint.events.process.*",
"logs-endpoint.events.process-*",
"winlogbeat-*"
],
"language": "kuery",
Expand All @@ -30,4 +30,4 @@
},
"id": "9a2e372a-cbeb-4ad6-a288-017ef086324c",
"type": "security-rule"
}
}
2 changes: 1 addition & 1 deletion packages/problemchild/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: 1.0.0
name: problemchild
title: "Living off the Land Attack Detection"
version: 1.1.0
version: 1.1.1
license: basic
description: "ML solution package to detect Living off the Land (LotL) attacks in your environment. Requires a Platinum subscription."
type: integration
Expand Down