Update net_connection_win_dead_drop_resolvers.yml

added few more apps to which are triggering false positives and comments to identify the process with the application
This commit is contained in:
Feathers
2022-08-17 18:43:47 +02:00
committed by GitHub
parent 41c3ea16b1
commit 9f2ab4e047
@@ -19,7 +19,7 @@ detection:
- 'youtube.com'
- 'technet.microsoft.com'
- 'facebook.com'
- 'cloudflare.com'
- '.cloudflare.com'
- 'docs.google.com'
- 'steamcommunity.com'
- 'reddit.com'
@@ -42,8 +42,11 @@ detection:
- '\firefox.exe'
filter_others:
Image|endswith:
- '\MsMpEng.exe'
- '\MsSense.exe'
- '\MsMpEng.exe' #Microsoft Defender executable
- '\MsSense.exe' #Windows Defender Advanced Threat Protection Service Executable
- '\PRTG Probe.exe' #Paessler's PRTG Network Monitor
- '\Engine.exe' #Process from qlik.com app
- '\msedgewebview2.exe' # related to Edge browser
condition: selection and not 1 of filter*
falsepositives:
- One might need to exclude other internet browsers found in it's network or other applications like ones mentioned above from Microsoft Defender.