-
Notifications
You must be signed in to change notification settings - Fork 453
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Office 365] - Improve ECS utilization #4319
Comments
This issue doesn't have a |
I so much agree with you on this! However it would help a lot if you could add an example event for each of the problems. |
Pinging @elastic/security-external-integrations (Team:Security-External Integrations) |
I second this fully. The 365 audit data to ECS field extractions should really be improved as currently it is very hard to work with and customisations have to be made in order for the Elastic Alerts and data to be usable by Security Analysts working in the SIEM. |
Another issue to focus on as we work through O365 improvements: |
Additional feedback: Using the standard o365 integration audit logs, the field o365.audit.Data contains json data that is pertinent to the event. The issue is that this field is mapped as a keyword and is not further processed. This field needs to be flattened and the json object should also be ingested into individual fields. This will allow for the better alert analysis required by humans. Suggested mappings:
|
@defendable-forfot, @WildDogOne & @khalavak, If you can provide example data for the For example, the data I've seen shows I haven't been able to find documentation of the various
If documentation of these individual alert or investigation fields does exist, any tips would be much appreciated. |
Below I have attempted to restate and respond to each of @defendable-forfot's suggestions. Many of the suggestions relate to undocumented fields or values that may vary between environments and for which sample data is not currently available. The relevant upstream documentation is Office 365 Management Activity API schema. For the In this round of improvements I intend to:
The original suggestions refer to Filebeat's Office 365 module but I will attempt to apply them to the preferred, Agent-based Microsoft 365 Elastic Integration. Wherever the suggestions don't seem to apply, the change to the Agent-based implemenation may explain the mismatch. Responses to each suggestion are inline in > bold. Miscellaneous suggestionsA suggestion about
|
Hey @chrisberkhout - do you think we can close this issue on the back of the v2.1.0 update to O365, or are there still some outstanding items to address? |
I think this is done for now. We can revisit it in the future if we get more feedback and data.
|
We are ingesting O365 data into our Elasticsearch for search, detection in Elastic Security and visualiation through Kibana. However, we have noticed a few areas for improvement within the module. What is most interesting with this module is how data is ingested. The most interesting data related to the events seem to be all placed within the o365.audit.Data field. This makes search and extraction of data from the log source difficult. Ideally the parsing should be done directly in the Filebeat module. We believe there is data within the field that can be used to populate other, more relevant, ECS fields.
Note: we are running filebeat version 8.1.3, but have noticed that none of the newer releases solves our issues.
Additionally, we believe the ECS specification should be improved with the introduction of a new field within the Related fields section. Certain third-party data sources, the O365 module included, send events where multiple URLs are present. An optimal solution would be to add this data to a related.domain or related.url field, none of which currently exist.
This is a copy of https://discuss.elastic.co/t/office-365-filebeat-module-improve-ecs-utilization/315126, as I was recommended to post this as a GitHub issue instead.
The text was updated successfully, but these errors were encountered: