[Rule Tuning] Remove logs-windows.* index (#1928)

* Remove `logs-windows.*` index

* Update discovery_privileged_localgroup_membership.toml

Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>
This commit is contained in:
Jonhnathan
2022-04-14 09:25:44 -03:00
committed by GitHub
parent 258418785f
commit 0943ffba5f
11 changed files with 21 additions and 21 deletions
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2022/01/24"
maturity = "production"
updated_date = "2022/02/28"
updated_date = "2022/04/13"
[rule]
author = ["Elastic"]
@@ -10,7 +10,7 @@ Identifies the modification of an account's Kerberos pre-authentication options.
the account can maliciously modify these settings to perform offline password cracking attacks such as AS-REP roasting.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-windows.*", "logs-system.*"]
index = ["winlogbeat-*", "logs-system.*"]
language = "kuery"
license = "Elastic License v2"
name = "Kerberos Pre-authentication Disabled for User"
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2022/01/27"
maturity = "production"
updated_date = "2022/02/28"
updated_date = "2022/04/13"
[rule]
author = ["Elastic"]
@@ -11,7 +11,7 @@ SeEnableDelegationPrivilege "user right" enables computer and user accounts to b
abuse this right to compromise Active Directory accounts and elevate their privileges.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-windows.*", "logs-system.*"]
index = ["winlogbeat-*", "logs-system.*"]
language = "kuery"
license = "Elastic License v2"
name = "Sensitive Privilege SeEnableDelegationPrivilege assigned to a User"
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2022/01/26"
maturity = "production"
updated_date = "2022/01/31"
updated_date = "2022/04/13"
[rule]
author = ["Elastic"]
@@ -17,7 +17,7 @@ false_positives = [
""",
]
from = "now-9m"
index = ["winlogbeat-*", "logs-windows.*", "logs-system.*"]
index = ["winlogbeat-*", "logs-system.*"]
language = "kuery"
license = "Elastic License v2"
name = "Potential Shadow Credentials added to AD Object"
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2020/11/12"
maturity = "production"
updated_date = "2021/09/23"
updated_date = "2022/04/13"
[rule]
author = ["Elastic", "Anabella Cristaldi"]
@@ -10,7 +10,7 @@ Identifies attempts to clear Windows event log stores. This is often done by att
or destroy forensic evidence on a system.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-windows.*", "logs-system.*"]
index = ["winlogbeat-*", "logs-system.*"]
language = "kuery"
license = "Elastic License v2"
name = "Windows Event Logs Cleared"
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2020/10/15"
maturity = "production"
updated_date = "2022/03/31"
updated_date = "2022/04/13"
[rule]
author = ["Elastic"]
@@ -10,7 +10,7 @@ Identifies instances of an unusual process enumerating built-in Windows privileg
Administrators or Remote Desktop users.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-windows.*"]
index = ["winlogbeat-*", "logs-system.*"]
language = "eql"
license = "Elastic License v2"
name = "Enumeration of Privileged Local Groups Membership"
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2022/01/31"
maturity = "production"
updated_date = "2022/01/31"
updated_date = "2022/04/13"
[rule]
author = ["Elastic"]
@@ -13,7 +13,7 @@ the protected accounts and groups are reset to match those of the domain's Admin
Administrative Privileges.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-windows.*", "logs-system.*"]
index = ["winlogbeat-*", "logs-system.*"]
language = "kuery"
license = "Elastic License v2"
name = "AdminSDHolder Backdoor"
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2022/01/27"
maturity = "production"
updated_date = "2022/01/27"
updated_date = "2022/04/13"
[rule]
author = ["Elastic"]
@@ -10,7 +10,7 @@ Identifies the modification of the msDS-AllowedToDelegateTo attribute to KRBTGT.
maintain persistence to the domain by having the ability to request tickets for the KRBTGT service.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-windows.*", "logs-system.*"]
index = ["winlogbeat-*", "logs-system.*"]
language = "kuery"
license = "Elastic License v2"
name = "KRBTGT Delegation Backdoor"
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2021/10/18"
maturity = "production"
updated_date = "2022/03/31"
updated_date = "2022/04/13"
[rule]
author = ["Elastic"]
@@ -11,7 +11,7 @@ access or evade password duration policies and preserve compromised credentials.
"""
false_positives = ["Legitimate remote account administration."]
from = "now-9m"
index = ["winlogbeat-*", "logs-windows.*"]
index = ["winlogbeat-*", "logs-system.*"]
language = "eql"
license = "Elastic License v2"
name = "Account Password Reset Remotely"
@@ -11,7 +11,7 @@ Directory are those to which powerful rights, privileges, and permissions are gr
any action in Active Directory and on domain-joined systems.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-windows.*", "logs-system.*"]
index = ["winlogbeat-*", "logs-system.*"]
language = "eql"
license = "Elastic License v2"
name = "User Added to Privileged Group in Active Directory"
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2021/01/04"
maturity = "development"
updated_date = "2021/09/23"
updated_date = "2022/04/13"
[rule]
author = ["Skoetting"]
@@ -16,7 +16,7 @@ false_positives = [
behavior is causing false positives, it can be exempted from the rule.
""",
]
index = ["winlogbeat-*", "logs-windows.*"]
index = ["winlogbeat-*", "logs-system.*"]
language = "kuery"
license = "Elastic License v2"
name = "Creation of a local user account"
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2021/12/12"
maturity = "production"
updated_date = "2022/03/31"
updated_date = "2022/04/13"
[rule]
author = ["Elastic"]
@@ -11,7 +11,7 @@ elevate privileges from a standard domain user to a user with domain admin privi
vulnerability that allows potential attackers to impersonate a domain controller via samAccountName attribute spoofing.
"""
from = "now-9m"
index = ["winlogbeat-*", "logs-windows.*"]
index = ["winlogbeat-*", "logs-system.*"]
language = "eql"
license = "Elastic License v2"
name = "Potential Privileged Escalation via SamAccountName Spoofing"