[Rule Tuning] Fix missing Winlogbeat index (#3976)

* [Rule Tuning] Fix missing Winlogbeat index

* bump
This commit is contained in:
Jonhnathan
2024-08-09 12:46:33 -03:00
committed by GitHub
parent 207dc55ede
commit fcc8aaaf63
3 changed files with 6 additions and 6 deletions
@@ -2,7 +2,7 @@
creation_date = "2023/06/19"
integration = ["endpoint", "system"]
maturity = "production"
updated_date = "2024/08/07"
updated_date = "2024/08/09"
[rule]
author = ["Elastic"]
@@ -15,7 +15,7 @@ false_positives = [
"Legitimate publicly shared files from Google Drive.",
]
from = "now-9m"
index = ["auditbeat-*", "logs-endpoint*", "logs-system.security*"]
index = ["auditbeat-*", "logs-endpoint*", "logs-system.security*", "winlogbeat-*"]
language = "eql"
license = "Elastic License v2"
name = "Suspicious File Downloaded from Google Drive"
@@ -2,7 +2,7 @@
creation_date = "2024/07/23"
integration = ["endpoint", "system"]
maturity = "production"
updated_date = "2024/08/07"
updated_date = "2024/08/09"
[rule]
author = ["Elastic"]
@@ -11,7 +11,7 @@ Identifies a potential forced authentication using related SMB named pipes. Atta
authenticate to a host controlled by them to capture hashes or enable relay attacks.
"""
from = "now-9m"
index = ["logs-endpoint.events.network-*", "logs-system.security*"]
index = ["logs-endpoint.events.network-*", "logs-system.security-*", "winlogbeat-*"]
language = "eql"
license = "Elastic License v2"
name = "Active Directory Forced Authentication from Linux Host - SMB Named Pipes"
@@ -2,7 +2,7 @@
creation_date = "2024/07/24"
integration = ["system", "windows"]
maturity = "production"
updated_date = "2024/08/07"
updated_date = "2024/08/09"
[rule]
author = ["Elastic"]
@@ -12,7 +12,7 @@ domain controller computer account coming from other hosts to the DC that owns t
hash after capturing it using forced authentication.
"""
from = "now-9m"
index = ["logs-system.security*", "logs-windows.forwarded*"]
index = ["logs-system.security-*", "logs-windows.forwarded*", "winlogbeat-*"]
language = "eql"
license = "Elastic License v2"
name = "Potential Relay Attack against a Domain Controller"