text code block:event.category:process and host.os.type:linux and event.type:start and event.action:exec and process.entry_leader.entry_meta.type:container and process.interactive:true and process.name:(sh or bash or dash or tcsh or csh or zsh or ksh or fish) and not ( process.parent.name:(dpkg or runc or tini or frontend or elastic-agent or agentbeat or dpkg-query or ansible-playbook or gpgv or apt or apt-get) or process.parent.command_line:"runc init" )
Install detection rules in Elastic Security
Detect Interactive Shell Launched via Unusual Parent Process in a Container in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(external, opens in a new tab or window).