Loading

Recorded Future Integration

Version 2.0.2 (View all)
Compatible Kibana version(s) 8.18.0 or higher
9.0.0 or higher
Supported Serverless project types
What's this?
Security
Observability
Subscription level
What's this?
Basic
Level of support
What's this?
Elastic

The Recorded Future integration has three data streams:

  • threat: Threat intelligence from the Recorded Future Connect API's risklist endpoints, or local CSV files of that data.
  • playbook_alert: Playbook alerts data from Recorded Future's API for Playbook Alerts.
  • triggered_alert: Triggered alerts data from the Recorded Future Connect API's alerts endpoint.

For the threat data stream, you need to define the entity and list to fetch. The supported entities are domain, hash, ip, and url. Check the Recorded Future documentation for the available lists for each entity or use the default. To fetch indicators from multiple entities, you need to create a separate integration policy for each.

Alternatively, the threat data stream can fetch custom Fusion files by supplying the URL to the CSV file as an advanced configuration option.

The threat data stream will check whether the available data has changed before actually downloading it. A short interval setting will mean that it checks frequently, but each version of the data will only be ingested once.

The alerts data allows for streamlined alert management and improved security monitoring. By collecting both alert types, it provides deeper insights into potential threats.

The ingested IOCs expire after a certain duration. An Elastic Transform is created to facilitate making only active IOCs available to end users. This transform creates a destination index named logs-ti_recordedfuture_latest.threat-3 which only contains active and unexpired IOCs. The destination index also has an alias logs-ti_recordedfuture_latest.threat. When setting up indicator match rules, use this latest destination index to avoid false positives from expired IOCs. Please refer to the ILM Policy section below for information on how source indices are managed to prevent unbounded growth.

To facilitate IOC expiration, source datastream-backed indices .ds-logs-ti_recordedfuture.threat-* are allowed to contain duplicates from each polling interval. An ILM policy is added to these source indices to prevent unbounded growth. This means data in these source indices will be deleted after 5 days from the ingestion date.

Note

For large risklist downloads, adjust the timeout setting so that the Agent has enough time to download and process the risklist.

Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to Agentless integrations and the Agentless integrations FAQ.

Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

This is the threat dataset.

This is the triggered_alert dataset.

This is the playbook_alert dataset.