Elastic Inferred Detection Coverage
954 inferred rule mappings across 46 events and 2 providers, covering 398 unique Elastic detection rules.
Most Elastic detection rules don't explicitly filter by Windows event ID. Instead, they query using EQL event categories (like process where or file where) or match on fields that only appear in specific event types. This embeds the connection between a rule and the Windows events it operates on in the query logic rather than stating it directly.
To surface these relationships, this analysis parses each rule's query into an abstract syntax tree and extracts the EQL categories and field names it references. Where a category or field maps to a known set of Windows events, the mappings below link the rule to those events — answering the question: if I collect this Windows event, which Elastic rules could use it as a data source?
For rules that do explicitly reference event IDs, see the Elastic Detection Rules Reference.
Confidence levels
- Medium: Rule uses an EQL category (e.g.,
process where,file where) that maps to this event type. The rule fires if this event is collected, though other data sources may also satisfy it. - Low: Rule references fields that appear in only a few different events. The rule may use this event, but the mapping is less certain.
Rules group by inference method so you can see exactly which EQL category or field name links each rule to the event.
Microsoft-Windows-Security-Auditing (32 events, 264 rules) #
Channel: Security Event ID 4610: An authentication package has been loaded by the Local Security Authority. (4 low)
AuthenticationPackageNamelow confidence — 4 rulesChannel: Security Event ID 4611: A trusted logon process has been registered with the Local Security Authority. (4 low)
LogonProcessNamelow confidence — 4 rulesChannel: Security Event ID 4624: An account was successfully logged on. (6 medium, 2 low)
authentication wheremedium confidence — 6 rulesLogonProcessNamelow confidence — 2 rulesChannel: Security Event ID 4625: An account failed to log on. (7 medium)
authentication wheremedium confidence — 7 rulesChannel: Security Event ID 4634: An account was logged off. (10 medium)
authentication wheremedium confidence — 10 rulesChannel: Security Event ID 4647: User initiated logoff. (10 medium)
authentication wheremedium confidence — 10 rulesChannel: Security Event ID 4648: A logon was attempted using explicit credentials. (10 medium)
authentication wheremedium confidence — 10 rulesChannel: Security Event ID 4649: A replay attack was detected. (4 low)
LogonProcessNamelow confidence — 4 rulesChannel: Security Event ID 4657: A registry value was modified. (3 low)
OperationTypelow confidence — 3 rulesChannel: Security Event ID 4659: A handle to an object was requested with intent to delete. (2 low)
AccessListlow confidence — 2 rulesChannel: Security Event ID 4661: A handle to an object was requested. (4 low)
Propertieslow confidence — 4 rulesChannel: Security Event ID 4663: An attempt was made to access an object. (2 low)
AccessListlow confidence — 2 rulesChannel: Security Event ID 4688: A new process has been created. (133 medium)
process where → start medium confidence — 133 rulesShow all 133 rules (118 more)
Channel: Security Event ID 4691: Indirect access to an object was requested. (2 low)
AccessListlow confidence — 2 rulesChannel: Security Event ID 4700: A scheduled task was enabled. (4 low)
RpcCallClientLocalitylow confidence — 1 ruleTaskNamelow confidence — 2 rulesParentProcessIdlow confidence — 1 ruleChannel: Security Event ID 4701: A scheduled task was disabled. (4 low)
RpcCallClientLocalitylow confidence — 1 ruleTaskNamelow confidence — 2 rulesParentProcessIdlow confidence — 1 ruleChannel: Security Event ID 4720: A user account was created. (1 low)
AllowedToDelegateTolow confidence — 1 ruleChannel: Security Event ID 4741: A computer account was created. (1 low)
AllowedToDelegateTolow confidence — 1 ruleChannel: Security Event ID 4742: A computer account was changed. (1 low)
AllowedToDelegateTolow confidence — 1 ruleChannel: Security Event ID 4798: A user's local group membership was enumerated. (1 low)
CallerProcessNamelow confidence — 1 ruleChannel: Security Event ID 4799: A security-enabled local group membership was enumerated. (1 low)
CallerProcessNamelow confidence — 1 ruleChannel: Security Event ID 5050: An attempt to programmatically disable the Windows Firewall using a call to INetFwProfile.FirewallEnabled(FALSE) interface was rejected. (1 low)
CallerProcessNamelow confidence — 1 ruleChannel: Security Event ID 5136: A directory service object was modified. (3 low)
ObjectDNlow confidence — 3 rulesChannel: Security Event ID 5137: A directory service object was created. (2 low)
ObjectDNlow confidence — 2 rulesChannel: Security Event ID 5140: A network share object was accessed. (2 low)
AccessListlow confidence — 2 rulesChannel: Security Event ID 5141: A directory service object was deleted. (5 low)
ObjectDNlow confidence — 5 rulesChannel: Security Event ID 5142: A network share object was added. (2 low)
ShareNamelow confidence — 2 rulesChannel: Security Event ID 5143: A network share object was modified. (2 low)
ShareNamelow confidence — 2 rulesChannel: Security Event ID 5144: A network share object was deleted. (2 low)
ShareNamelow confidence — 2 rulesChannel: Security Event ID 5169: A directory service object was modified. (14 low)
ObjectDNlow confidence — 4 rulesAttributeLDAPDisplayNamelow confidence — 7 rulesOperationTypelow confidence — 3 rulesChannel: Security Event ID 5170: A directory service object was modified during a background cleanup task. (14 low)
ObjectDNlow confidence — 4 rulesAttributeLDAPDisplayNamelow confidence — 7 rulesOperationTypelow confidence — 3 rulesChannel: Security Event ID 5380: Vault Find Credential. (1 low)
SchemaFriendlyNamelow confidence — 1 ruleMicrosoft-Windows-Sysmon (14 events, 690 rules) #
Channel: Operational Event ID 1: Process creation (229 medium, 1 low)
process where → start medium confidence — 209 rulesShow all 209 rules (194 more)
process wheremedium confidence — 20 rulesShow all 20 rules (5 more)
ParentProcessIdlow confidence — 1 ruleChannel: Operational Event ID 2: A process changed a file creation time (40 medium)
file wheremedium confidence — 38 rulesShow all 38 rules (23 more)
file where → change medium confidence — 2 rulesChannel: Operational Event ID 3: Network connection (52 medium)
network wheremedium confidence — 44 rulesShow all 44 rules (29 more)
network where → start medium confidence — 7 rulesnetwork where → protocol medium confidence — 1 ruleChannel: Operational Event ID 5: Process terminated (21 medium)
process wheremedium confidence — 21 rulesShow all 21 rules (6 more)
Channel: Operational Event ID 6: Driver loaded (2 medium)
driver wheremedium confidence — 2 rulesChannel: Operational Event ID 7: Image loaded (7 medium)
library wheremedium confidence — 7 rulesChannel: Operational Event ID 8: CreateRemoteThread (5 low)
TargetImagelow confidence — 5 rulesChannel: Operational Event ID 11: FileCreate (51 medium)
file wheremedium confidence — 39 rulesShow all 39 rules (24 more)
file where → creation medium confidence — 12 rulesChannel: Operational Event ID 12: RegistryEvent (Object create and delete) (53 medium)
registry wheremedium confidence — 9 rulesregistry where → change medium confidence — 44 rulesShow all 44 rules (29 more)
Channel: Operational Event ID 13: RegistryEvent (Value Set) (53 medium)
registry wheremedium confidence — 9 rulesregistry where → change medium confidence — 44 rulesShow all 44 rules (29 more)
Channel: Operational Event ID 14: RegistryEvent (Key and Value Rename) (53 medium)
registry wheremedium confidence — 9 rulesregistry where → change medium confidence — 44 rulesShow all 44 rules (29 more)
Channel: Operational Event ID 15: FileCreateStreamHash (39 medium)
file wheremedium confidence — 39 rulesShow all 39 rules (24 more)
Channel: Operational Event ID 23: FileDelete (File Delete archived) (42 medium)
file wheremedium confidence — 39 rulesShow all 39 rules (24 more)
file where → deletion medium confidence — 3 rulesChannel: Operational Event ID 26: FileDeleteDetected (File Delete logged) (42 medium)
file wheremedium confidence — 39 rulesShow all 39 rules (24 more)
file where → deletion medium confidence — 3 rules