[Rule Tuning] Update Index Pattern for Detection Engine Rules (#101)
* [Rule Tuning] Update Index Pattern for Detection Engine Rules * update indices
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
creation_date = "2020/02/18"
|
||||
ecs_version = ["1.5.0"]
|
||||
maturity = "production"
|
||||
updated_date = "2020/06/24"
|
||||
updated_date = "2020/08/03"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -10,7 +10,7 @@ description = """
|
||||
Identifies a PowerShell process launched by either cscript.exe or wscript.exe. Observing Windows scripting processes
|
||||
executing a PowerShell script, may be indicative of malicious activity.
|
||||
"""
|
||||
index = ["winlogbeat-*"]
|
||||
index = ["winlogbeat-*", "logs-endpoint.events.*"]
|
||||
language = "kuery"
|
||||
license = "Elastic License"
|
||||
name = "Windows Script Executing PowerShell"
|
||||
|
||||
Reference in New Issue
Block a user