diff --git a/rules/windows/file_event/file_event_win_powershell_startup_shortcuts.yml b/rules/windows/file_event/file_event_win_powershell_startup_shortcuts.yml index 066435f42..621b861c0 100644 --- a/rules/windows/file_event/file_event_win_powershell_startup_shortcuts.yml +++ b/rules/windows/file_event/file_event_win_powershell_startup_shortcuts.yml @@ -24,5 +24,5 @@ detection: condition: selection falsepositives: - Unknown - - Depending on your environment accepted applications may leverage this at times. It is recomended to search for recommended inidicative of malware. + - Depending on your environment accepted applications may leverage this at times. It is recommended to search for anomalies inidicative of malware. level: high