Building effective threat hunting and detection rules in Elastic Security