Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Solution] Rule incorrectly retains customized status after reverting MITRE ATT&CK changes #208251

Open
pborgonovi opened this issue Jan 24, 2025 · 3 comments
Assignees
Labels
bug Fixes for quality problems that affect the customer experience Feature:Prebuilt Detection Rules Security Solution Prebuilt Detection Rules area impact:high Addressing this issue will have a high level of impact on the quality/strength of our product. Team:Detection Rule Management Security Detection Rule Management Team Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. triage_needed

Comments

@pborgonovi
Copy link
Contributor

Description:

A prebuilt rule remains marked as “Customized” even after reverting a change to its MITRE ATT&CK technique, returning it to its original state.

Kibana/Elasticsearch Stack version:

VERSION: 9.0.0
BUILD: 82999
COMMIT: 00c67c3

Functional Area (e.g. Endpoint management, timelines, resolver, etc.):

Prebuilt Rules

Pre requisites:

  1. prebuiltRulesCustomizationEnabled feature flag is enabled
  2. Prebuilt rules are available
  3. At least 1 prebuilt rule has MITRE ATT&CK

Steps to reproduce:

  1. Start with a prebuilt rule that includes a MITRE ATT&CK tactic and technique.
  2. Edit the rule and remove the technique, then save the changes.
  • The rule is now correctly marked as Customized.
  1. Edit the rule again and add back the same technique that was removed, returning the rule to its original state.
  2. Save the changes.

Current behavior:

The rule remains marked as Customized, even though its configuration matches the original prebuilt version.

Expected behavior:

Once the rule’s configuration matches the original prebuilt version (with no modifications), the rule should revert to its initial status as not customized.

Screenshots:

Screen.Recording.2025-01-24.at.9.28.30.AM.mov
@pborgonovi pborgonovi added bug Fixes for quality problems that affect the customer experience Feature:Prebuilt Detection Rules Security Solution Prebuilt Detection Rules area impact:high Addressing this issue will have a high level of impact on the quality/strength of our product. Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Detection Rule Management Security Detection Rule Management Team Team:Detections and Resp Security Detection Response Team triage_needed labels Jan 24, 2025
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detections-response (Team:Detections and Resp)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detection-rule-management (Team:Detection Rule Management)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Fixes for quality problems that affect the customer experience Feature:Prebuilt Detection Rules Security Solution Prebuilt Detection Rules area impact:high Addressing this issue will have a high level of impact on the quality/strength of our product. Team:Detection Rule Management Security Detection Rule Management Team Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. triage_needed
Projects
None yet
Development

No branches or pull requests

3 participants