Partners

Automate detection and investigation with Tines and Elastic

Elastic logo
Sign upBook a demo

Together, Tines and Elastic provide security teams with all the information they need to investigate alerts, make business critical decisions in one place all while saving valuable time and resources. By combining the value of high-fidelity detection and alerting delivered by Elastic Security with Tines’ robust automation, SOC teams can effectively support continuous monitoring, threat detection and prevention, alert enrichment, incident response and more. Learn how Texas A&M University System Cyber Operations drives efficient scaling with Tines and Elastic.

Key benefits

Scale security operations efforts

Integrate context & data enrichment into alerts

Investigate & react to alerts faster

Use case examples

Example 1

Elastic SIEM to Slack alert enrichment

Enrich high severity SIEM alerts as they are sent from Elastic to Slack, using Tines records.

Community author

Aaron Jewitt at Elastic

Example 2

Delete Buildkite job logs

Enable incident responders to clean Buildkite logs that would be leaking secrets in the clear at scale. Deleting hundreds of job logs would be a very tedious job to do and not the best usage of time. Using a Tines page, an incident responder can input the details about the Buildkite pipeline and the story will clean all the respective logs within a couple of minutes. The other part of the story is leveraging Entro. Entro is a tool used to detect leaked secrets across various platforms. Entro users can fully automate the remediation by leveraging this story to automatically delete Buidlkite logs whenever a secret could have been leaked within such logs. All audit trails of this investigation will be stored in an Elasticsearch case.

Community author

Christopher Cutajar at Elastic

Example 3

Create an API to query Tines template vendors and actions

Tools

Elastic

Created by

John Tuckner

Example 4

Check Workday for unauthorized travel and alert in Slack

Get login events from JumpCloud and Google and enrich the location from the source IP. If the location matches a list of unauthorized travel sources and has not already been registered in Workday, verify the login with the user and their manager. If it is an unknown login, page the security team with OpsGenie.

Community author

Muhammet Tekbicak

Example 5

Investigate security alerts in Workbench from Slack links

This Story demonstrates how you can start a conversation with Workbench by utilizing the WORKBENCH_LINK function from an external tool, such as Slack. Start a conversation with an Elastic alert and initial GreyNoise analysis and context pre-loaded to assist the investigation.

Created by

Michael Tolan

Example 6

Build and search MITRE ATT&CK semantic index in Elastic

This workflow creates an index of the MITRE ATT&CK framework in Elasticsearch with semantic search capabilities. It enables analysts to efficiently search and correlate MITRE techniques to an alert or ticket description even when exact keywords aren’t used. This enhances threat detection, incident response, and security strategy by providing deeper insights into potential threats.

Created by

Michael Tolan

An illustration of a chain with two rings

Detect security threats and reduce time to respond with Tines and Elastic