Dear Elastic Community,
I have set-up my ElasticStack with having WinLogbeat and Packetbeat running through my logstash. I custmoized my Sysmon (winlogbeat) dashboard and I used some default templates for Packetbeat one.
Now I would like to add some alerts to my ES. My goal is to get as close as possible to SIEM with my ES. Now that I have some data and visuals flowing on my Kibana, I am missing some alerts that would stand out.
I would like to have some icon notification either in Dashboards or in Discover tab, that would notify me that this is is a possible incident / threat (for e.g. a red triangle (if severity is high) next to some output data).
Of course I tried browsing for it and I ran into ElastAlert. I tried that one, but if I understood it correct, it would notify me only on my e-mail (if I configured the rule so) whether a hit would be made. I am seeking for a solution that can do that too + can be displayed on my Kibana Dashboard.
EXAMPLE:
WinLogbeat detects a cmd.exe execution. I define that as a threat. Now once logstash forwards that to ElasticSearch, I want that Kibana displays that index as an alert (red triangle next to logdata, red text,..whatever, something to stand out among all those other logs).
Is there any other idea on how to implement such a thing?
Thanks