[Security Content] Small tweaks on the setup guides (#3308)
* [Security Content] Small tweaks on the setup guides
* Additional Fixes
* Avoid touching deprecated rules
Removed changes from:
- rules/integrations/beaconing/command_and_control_beaconing.toml
- rules/integrations/beaconing/command_and_control_beaconing_high_confidence.toml
- rules/linux/discovery_process_capabilities.toml
- rules/linux/privilege_escalation_dac_permissions.toml
- rules/linux/privilege_escalation_enlightenment_window_manager.toml
- rules/linux/privilege_escalation_gdb_sys_ptrace_elevation.toml
- rules/linux/privilege_escalation_gdb_sys_ptrace_netcon.toml
- rules/linux/privilege_escalation_suspicious_chown_fowner_elevation.toml
- rules/linux/privilege_escalation_suspicious_uid_guid_elevation.toml
- rules_building_block/discovery_capnetraw_capability.toml
- rules_building_block/persistence_cap_sys_admin_added_to_new_binary.toml
(selectively cherry picked from commit 458e67918a)
This commit is contained in:
committed by
github-actions[bot]
parent
5cec5b7f31
commit
b1989a921b
@@ -19,14 +19,14 @@ license = "Elastic License v2"
|
||||
name = "Potential Buffer Overflow Attack Detected"
|
||||
risk_score = 21
|
||||
rule_id = "b7c05aaf-78c2-4558-b069-87fa25973489"
|
||||
setup = """
|
||||
setup = """## Setup
|
||||
|
||||
|
||||
This rule leverages alert data from other prebuilt detection rules to function correctly.
|
||||
|
||||
### Dependent Elastic Detection Rule Enablement
|
||||
As a higher-order rule (based on other detections), this rule also requires the following prerequisite Elastic detection rule to be installed and enabled:
|
||||
- Segfault Detected (5c81fc9d-1eae-437f-ba07-268472967013)
|
||||
|
||||
"""
|
||||
severity = "low"
|
||||
tags = [
|
||||
|
||||
Reference in New Issue
Block a user