Description
FYI: this bug is SDH-linked.
Summary
One user reported that the Cobalt Strike Command and Control Beacon rule generates alerts based on source events from the elastic-cloud-logs-*
index in their ESS environment.
This rule has only the following index patterns that don't match elastic-cloud-logs-*
: [packetbeat-*
, auditbeat-*
, filebeat-*
, logs-network_traffic.*
]. Despite that, it looks like somehow in ESS Cloud logs-network_traffic.*
or filebeat-*
index patterns match concrete indices of elastic-cloud-logs-*
, presumably via aliases. Specifically, in the user's environment they see alerts generated from source events from indices like this one:
"signal.ancestors.index": [
".ds-elastic-cloud-logs-8-2023.10.17-000376"
],
Suggestion
In Security UI, when users create a custom rule, by default we explicitly exclude elastic-cloud-logs-*
indices by adding -*elastic-cloud-logs-*
to the list of index patterns:

Probably we should add -*elastic-cloud-logs-*
to:
- either just all our prebuilt rules
- or to prebuilt rules having any index patterns containing
logs-
orfilebeat-
?