User Guide Functional Overview Requirements Architecture System Installation NetEye Additional Components Installation Setup The neteye Command Director NetEye Self Monitoring Tornado Business Service Monitoring IT Operation Analytics - Telemetry Geo Maps NagVis Audit Log Shutdown Manager Reporting ntopng Visual Monitoring with Alyvix Elastic Stack IT Operations (Command Orchestrator) Asset Management Service Level Management Cyber Threat Intelligence - SATAYO NetEye Update & Upgrade How To NetEye Extension Packs Troubleshooting Security Policy Glossary
module icon Elastic Stack
Overview Architecture Authorization Kibana Elasticsearch Overview Enabling El Proxy Sending custom logs to El Proxy Configuration files Commands Elasticsearch Templates and Retentions El Proxy DLQ Blockchain Verification Handling Blockchain Corruptions El Proxy Metrics El Proxy Security El Proxy REST Endpoints Agents Logstash Elastic APM Elastic RUM Elastic XDR Log Manager - Deprecated
ntopng Visual Monitoring with Alyvix Elastic Stack IT Operations (Command Orchestrator) Asset Management Service Level Management Cyber Threat Intelligence - SATAYO Introduction to NetEye Monitoring Business Service Monitoring IT Operation Analytics Visualization Network Visibility Log Management & Security Orchestrated Datacenter Shutdown Application Performance Monitoring User Experience Service Management Service Level Management & Reporting Requirements for a Node Cluster Requirements and Best Practices NetEye Satellite Requirements TCP and UDP Ports Requirements Additional Software Installation Introduction Single Node Cluster NetEye Master Master-Satellite Architecture Underlying Operating System Acquiring NetEye ISO Image Installing ISO Image Single Nodes and Satellites Cluster Nodes Configuration of Tenants Satellite Nodes Only Nodes behind a Proxy Additional NetEye Components Single Node Cluster Node Satellites Nodes only Verify if a module is running correctly Accessing the New Module Cluster Satellite Security Identity and Access Management External Identity Providers Configure federated LDAP/AD Emergency Reset of Keycloak Configuration Advanced Configuration Authorization Resources Tuning Advanced Topics Basic Concepts & Usage Advanced Topics Monitoring Environment Templates Monitored Objects Import Monitored Objects Data Fields Deployment Icinga 2 Agents Configuration Baskets Dashboard Monitoring Status VMD Permissions Notifications Jobs API Configuring Icinga Monitoring Retention Policy NetEye Self Monitoring Concepts Collecting Events Add a Filter Node WHERE Conditions Iterating over Event fields Retrieving Payload of an Event Extract Variables Create a Rule Tornado Actions Test your Configuration Export and Import Configuration Example Under the hood Development Retry Strategy Configuration Thread Pool Configuration API Reference Configure a new Business Process Create your first Business Process Node Importing Processes Operators The ITOA Module Configuring User Permissions Telegraf Metrics in NetEye Telegraf Configuration Telegraf on Monitored Hosts Visualizing Dashboards Customizing Performance Graph The NetEye Geo Map Visualizer Map Viewer Configuring Geo Maps NagVis Audit Log Overview Shutdown Manager user Shutdown Manager GUI Shutdown Commands Advanced Topics Overview User Role Management Cube Use Cases ntopng and NetEye Integration Permissions Retention Advanced Topics Overview User Roles Nodes Test Cases Dashboard Use Cases Overview Architecture Authorization Kibana Elasticsearch Overview Enabling El Proxy Sending custom logs to El Proxy Configuration files Commands Elasticsearch Templates and Retentions El Proxy DLQ Blockchain Verification Handling Blockchain Corruptions El Proxy Metrics El Proxy Security El Proxy REST Endpoints Agents Logstash Elastic APM Elastic RUM Elastic XDR Log Manager - Deprecated Overview Authorization in the Command Orchestrator Module Configuring CLI Commands Executing Commands Overview Permissions Installation Single Tenancy Multitenancy Communication through a Satellite Asset collection methods Display asset information in monitoring host page Overview Customers Availability Event Adjustment Outages Resource Advanced Topics Introduction Getting Started SATAYO Items Settings Managed Service Mitre Attack Coverage Changelog Before you start Update Procedure Single Node Upgrade from 4.42 to 4.43 Cluster Upgrade from 4.42 to 4.43 Satellite Upgrade from 4.42 to 4.43 DPO machine Upgrade from 4.42 to 4.43 Create a mirror of the RPM repository Sprint Releases Feature Troubleshooting Tornado Networking Service Management - Incident Response IT Operation Analytics - Telemetry Identity Provider (IdP) Configuration NetEye Cluster on Microsoft Azure Introduction to NEP Getting Started with NEPs Online Resources Obtaining NEP Insights Available Packages Advanced Topics Upgrade to NetEye 4.31 Setup Configure swappiness Restarting Stopped Services Enable stack traces in web UI How to access standard logs Director does not deploy when services assigned to a host have the same name How to enable/disable debug logging Activate Debug Logging for Tornado Modules/Services do not start Sync Rule fails when trying to recreate Icinga object How to disable InfluxDB query logging Managing an Elasticsearch Cluster with a Full Disk Some logs are not indexed in Elasticsearch Elasticsearch is not functioning properly Reporting: Error when opening a report Debugging Logstash file input filter Bugfix Policy Reporting Vulnerabilities Glossary

Elastic XDR

This chapter introduces the core principles of Elastic Extended Detection and Response (XDR), the cybersecurity foundation underlying the NetEye platform’s threat detection and response capabilities. Understanding how Elastic XDR works helps users interpret security findings, tune detection rules, and respond to incidents more effectively.

XDR correlates data from various sources across the IT environment — endpoints, network, email security, identity, access management, cloud, and more — and detects and responds to cyber threats across the environment represented by this dataset, providing a unified security approach.

How Elastic XDR Works

Elastic XDR is built on top of the Elastic Stack, leveraging its core capabilities — data ingestion, search, analytics, and visualization — to enable real-time threat detection and incident response across your entire environment.

At a high level, Elastic XDR operates through the following functional stages:

  1. Data Ingestion from Diverse Sources

    Elastic XDR collects and centralizes events and telemetry from multiple sources, including Endpoints (e.g., Elastic Agent), Network appliances (e.g. firewalls, routers, switches or wireless controllers), Cloud infrastructure (e.g., AWS, Azure, GCP logs), on premise applications (e.g. DNS services, web applications, mail gateways or databases) and security consoles, which include external security sources like XDR systems or vulnerability assessment applications. Elastic Agent is the main software component playing a critical role in gathering logs, metrics, and security signals from organization sources. Elastic provides a lot of integrations allowing users to have scalable ingestion and monitoring in heterogeneous environments.

  2. Normalization and Enrichment

    Once ingested, raw data is normalized into a common schema (ECS, Elastic Common Schema) using some data processors that are organized into normalization pipelines (ingest or logstash ones). This harmonization makes it easier to correlate events from different systems and apply consistent detection logic. Enrichment is then applied using such context as - GeoIP and threat intelligence lookups - Asset tagging - User context - MITRE ATT&CK mappings

  3. Detection and Correlation

    Elastic XDR uses prebuilt and custom detection rules to identify suspicious behaviors, known indicators of compromise (IOCs), exploitation of vulnerabilities (CVE), etc. against different organization sources. Elastic XDR detection logic is powered by different languages: KQL (Kibana Query Language), Lucene, EQL (Event Query Language) and ES|QL (Elastic Query Language).

    Detection capabilities include: - Signature-based detection - Behavioral analytics - Anomaly detection via machine learning jobs - Cross-source correlation of events (e.g., lateral movement detection) - Threat intellingence matching - Never-seen-before detection (see the New Terms rule type)

    Detected events are promoted to alerts, and related alerts can be grouped into cases or incidents for investigation.

  4. Investigation and Response

    Security analysts can use Kibana’s Security app to pivot from alerts to detailed event timelines, raw log views, and process trees for endpoint data.

    Response capabilities include: - Manual investigation workflows (with case management) - Automated response actions (via integrations with SOAR tools or custom webhooks) - Endpoint response actions (e.g., isolate host, kill process, quarantine file)

    Elastic’s integration with third-party ticketing systems (e.g., Jira, ServiceNow) enables streamlined escalation and remediation tracking.

    Elastic Stack allow users also to configure several different AI providers in order to use them with new AI Assistant app. The AI Assistant app is an internal ELK stack generative AI that helps users during security analysis and investigations. This apps is useful to correlate events, get remediation suggestions, querying for other information, and so on. To use AI Assistant app an Enterprise Elastic License is required.

Security App

Key XDR features in Kibana are centered in Security App - a dedicated workspace for alerts, cases, and EDR endpoint management.

The Security app also provides Detection Rules UI - a rule editor and manager for customizing alert logic. Case Management offered in the app tracks investigations and supports collaborative response workflows.

Detection Engine

At the heart of Elastic XDR is the Detection Engine, which runs rules to identify threats based on:

  • Predefined threat detection rules from Elastic Security

  • Custom rules written in EQL or KQL

  • Anomaly detection jobs powered by machine learning models

Rules can be tuned for specific environments and threat models, with support for scheduling, alert suppression, and thresholding.

The detection engine also allows the creation of exceptions through the UI.

Machine Learning Integration

Elastic XDR leverages built-in ML capabilities for:

  • Unsupervised anomaly detection (e.g., unusual login times or process executions)

  • Rare process event identification

  • Behavioral deviation modeling

These jobs are pre-configured and deployable directly from Kibana with minimal tuning, but also support custom modeling for advanced users.

Elastic Defend

Elastic XDR includes its own EDR software that can be installed on endpoints through Defend integration. The Defend integration includes its own detection logic based on different capabilities like signature-base detection, in-memory payload detection (YARA rules) and anomaly detection. All this logic is executed on endpoint side. Defend integration could be configured in detect or in prevent mode, i.e. a complete EDR with prevent mode and response action or data collection only.

../../_images/prevent-mode.png

Fig. 162 Rule definition UI

In prevent mode the EDR also prevents the detected behavior to happen causing damage on the endpoint or a compromization/exfiltration of data.

You should use Elastic Defend with Elastic Security for full endpoint detection, prevention, and response capabilities — the foundation of Elastic’s XDR solution. For best results, it is recommended to install Elastic Agent with Elastic Defend in prevention mode on all critical endpoints to unlock the complete Elastic Security experience.

In the case with alerts related to Elastic Agent endpoints where Defend integration is in use, analysts can take direct response actions from the UI of a response colsole, including:

  • Isolate host: Cut off network access to limit lateral movement

  • Kill process: Terminate malicious or suspicious processes

  • Execute command: run any Powershell, Bash, Shell command directly on the machine with root/SYSTEM permissions

  • Scan a path: detect if malicious artifacts are still present in folders/files using Defend detection logic

../../_images/response-console.png

Fig. 163 Response console

Monitoring and Tuning Detection Rules

Each detection rule in Elastic XDR generates alerts when conditions are met. Rules may need tuning to better fit your organization’s systems, policies, and expected behavior. Common tuning actions include:

  • Adjusting thresholds (e.g., increase failed login count from 5 to 10)

  • Narrowing scope (e.g., exclude known admin accounts or internal IP ranges)

  • Modifying queries using filters to reduce noise

  • Suppressing alerts for repeat benign behavior using built-in suppression logic

  • Disabling non-relevant rules for technologies or attack vectors not in use

You can edit rule definitions directly in the Rules UI or clone and modify prebuilt rules to suit your environment.

../../_images/detection-rule.png

Fig. 164 Rule definition UI

Note

From Elastic v8.18 prebuilt rules could be adjusted/edited without the need of cloning them. Prebuilt Elastic detection rules list could change depending on the Elastic Stack version or over-the-air updates. Check out a complete changelog for the Elastic v8.18.

Custom Rule Development

In addition to prebuilt rules, you can write custom rules using different languages:

  • KQL (Kibana Query Language) - the main language used on UI side; most effective for simple atomic queries.

  • Lucene - an alternative to KQL but rarely used in detection logic. It useful when regex in detection logic is needed.

  • EQL (Event Query Language) - allows correlation of multiple events to match a sequence of activities.

  • ES|QL (Elastic Query Language) - an SQL-like syntax for complex queries.

All of the above allow detecting all types of use cases - from simple to quite complex.

Prebuilt and custom detection logic depends also on rule types. Each rule type address a specific use case. There is the simple query type detecting when a single atomic condition is met (e.g. modification of a registry key). There is the threshold type detecting when multiple events happens in a time window (e.g. multiple failed logons in a small period of time). There is the threat match type detecting when an event contains known indicators of compromise stored in TI source (e.g. an IP address reported by MISP platform). There is the machine learning type detecting when suspicious behavioral events happens (e.g. a user logged into a system in usual hours or weekdays).

../../_images/define-rule-type.png

Fig. 165 Detection rule types

Learn more details about detection rule types in the official Elastic documentation.

When creating custom rules:

  • Use ECS-compliant fields for maximum compatibility.

  • Include clear descriptions, severity levels, and mappings to MITRE ATT&CK.

  • Test rules against historical data using Timeline before enabling.

  • Use the right index patterns, tailored to your specific use case (for example logs-apache.* instead of logs-* for Apache Web Server). More specific patterns allow better performance for the detection engine.

  • Set the Timestamp override field to event.ingested field. This can help reduce missing alerts due to network or server outages; this represents the time considered by the detection logic on its runs (time window is calculated on this field); event.ingested contains the time when the event is indexed into Elasticsearch

  • Set the right time window on which the detection rule should run.

  • Set the appropriate Additional look-back time to avoid missing alerts from coming up.

Rule Exceptions

Elastic XDR supports rule exceptions to prevent known benign behaviors from generating alerts. Examples include:

  • Legitimate software that mimics suspicious behavior

  • Recurring but harmless admin scripts

  • Specific hosts or services with known behavior patterns

Exceptions are managed through the Exceptions tab on each rule and can be scoped narrowly (e.g., specific user and process combination) to maintain detection fidelity.

../../_images/rule-exception.png

Fig. 166 Definition of a Rule exception

Endpoint Exceptions

Endpoint Exceptions are available only on Endpoint Security rules.They are applied on endpoint side, not on the Kibana side, to avoid EDR blocking legit behaviors on hosts. Endpoint Exceptions can be created using a UI guide form like Rule Exceptions.

Check out official documentation for more details.

Trusted applications

Some user application may be detected by XDR as malicious. Adding the user applications to the trusted list will reduce false positives and allow actual user application to perform regular operations without being blocked by Elastic Security.

Blocklist

Add applications to a blocklist to prevent them from running on your hosts, extending the list of processes that Endpoint Security considers malicious.

Responding to Threats with Elastic XDR

Elastic XDR not only detects threats, but empowers security teams to investigate efficiently and respond decisively. This section explains how users can interact with alerts, investigate potential incidents, and take response actions using the built-in tools and integrations provided by the Elastic Security solution.

Alert Management and Investigation Workflow

When a detection rule is triggered, it generates an alert. Each alert includes:

  • Rule name and severity

  • Description and expected behavior

  • Enriched event data (e.g., process, user, host, network details)

  • MITRE ATT&CK technique mappings

Users can triage alerts using the Alerts view in Kibana, which supports:

  • Filtering by rule, host, or severity

  • Grouping related alerts into cases

  • Pinning alerts to Timelines for deeper inspection

../../_images/alerts.png

Fig. 167 Alerts view in Kibana

Case Management

Elastic XDR includes built-in case management to track investigations and collaborate across teams. Users can:

  • Create cases from alerts or timelines

  • Assign cases to team members

  • Attach artifacts (alerts, notes, links, observables)

  • Push cases to third-party systems like Jira

Automated Response Actions

Elastic XDR supports automated responses through:

  • Connector actions (webhooks, emails, external systems)

  • SOAR integrations with security orchestration tools (e.g., Swimlane, Tines, Splunk SOAR)

Automation can be used to escalate alerts, enrich data, notify teams, or initiate containment steps.