Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Enhancement] Modify message Description to include Alert rule names #2447

Open
raqueltabuyo opened this issue Feb 13, 2025 · 0 comments
Open
Labels
enhancement New feature or request

Comments

@raqueltabuyo
Copy link

raqueltabuyo commented Feb 13, 2025

Modify message Description to include Alert rule names

Summary

The ECS message field description should be updated to clarify that it is not only for syslog-style logs but should also contain the name of the corresponding security rule, alert, or incident when applicable.

Motivation

Currently, the message field description primarily focuses on log events, describing it as the log message optimized for viewing. However, in security contexts, this field plays a critical role in surfacing key alerting information. Security detections, alerts, and incidents should populate message with their corresponding rule name, alert title, or incident name to provide better visibility in Elastic Security.

This enhancement will ensure a more consistent and meaningful use of the message field across security event sources.

Detailed Design

  • Field Name: message
  • Example Values:
    • "Malicious PowerShell Execution - Suspicious Encoded Command"
    • "Phishing Email Detected: Suspicious Domain in URL"
    • "SentinelOne: Ransomware Activity Detected"
    • "Office365 DLP Alert: Confidential Data Shared Externally"
  • Suggested Data Type: match_only_text
  • Example Events Mapped to the Proposed Use Case:
    • Security detections in SIEM/XDR platforms
    • EDR and NDR alerts
    • Compliance violations and policy enforcement alerts

Proposed Updated Description:

For log events, the message field contains the log message, optimized for viewing in a log viewer.

For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event.

In security and detection events, message should contain the name of the corresponding security rule, alert, or incident to enhance visibility and investigation efficiency.

If multiple messages exist, they can be combined into one message.

Type: match_only_text
Example: "Phishing Email Detected: Suspicious Domain in URL"

@raqueltabuyo raqueltabuyo added the enhancement New feature or request label Feb 13, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant