Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Network Traffic Capture] host.* Fields Skewing Host Risk Score #5752

Closed
MakoWish opened this issue Mar 30, 2023 · 1 comment · Fixed by #6018
Closed

[Network Traffic Capture] host.* Fields Skewing Host Risk Score #5752

MakoWish opened this issue Mar 30, 2023 · 1 comment · Fixed by #6018

Comments

@MakoWish
Copy link
Contributor

MakoWish commented Mar 30, 2023

We have physical servers tied into span ports on our core switches. These have always previously run Packetbeat, but we are migrating to the new Network Traffic Capture Integration. One of the key issues I have noticed with this Integration is that it includes the host.* fields with no apparent way to disable them. Many Integrations have the option to disable the host.* fields if tags contains "forwarded", but I don't see that option on this Integration. This is causing these servers to be deemed the most critical devices based on the Host Risk Score, when the devices are nothing more than observers to the activity.

Since these events are not actually happening on these hosts, I feel the host.* fields should be disabled on this Integration, and the observer.* fields should be populated instead.

Eric

@elasticmachine
Copy link

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
3 participants