Jonhnathan
|
7bd9c52852
|
[Rule Tuning] Windows High Severity - 5 (#5096)
* [Rule Tuning] Windows High Severity - 4
* Update privilege_escalation_windows_service_via_unusual_client.toml
|
2025-09-15 09:29:37 -07:00 |
|
Jonhnathan
|
ccedd45df1
|
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 15 (#5030)
* [Rule Tuning] Windows 3rd Party EDR Compatibility - Part 15
* Apply suggestions from code review
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
* ++
---------
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
|
2025-08-28 13:07:38 -07:00 |
|
shashank-elastic
|
e8c54169a4
|
Prep main for 9.1 (#4555)
* Prep for Release 9.1
* Update Patch Version
* Update Patch version
* Update Patch version
|
2025-03-26 11:04:14 -04:00 |
|
Mika Ayenson
|
fe8c81d762
|
[FR] Generate investigation guides (#4358)
|
2025-01-22 11:17:38 -06:00 |
|
Jonhnathan
|
2c07e88c07
|
[Rule Tuning] Fix double bumps caused by Windows Integration Update (#4156)
|
2024-10-15 23:57:44 +05:30 |
|
Jonhnathan
|
7385f9dd2e
|
[Rule Tuning] 3rd Party EDR Compatibility - 16 (#4041)
* [Rule Tuning] 3rd Party EDR Compatibility - 16
* Update rules/windows/privilege_escalation_printspooler_suspicious_file_deletion.toml
* min_stack for merge, bump updated_date
---------
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
|
2024-10-13 18:14:24 -03:00 |
|
Jonhnathan
|
70c3a6f7b1
|
[Rule Tuning] Potential privilege escalation via CVE-2022-38028 (#4004)
|
2024-08-22 15:32:28 -03:00 |
|
Jonhnathan
|
25ad765acb
|
[Rule Tuning] Include winlogbeat index in sysmon-related rules (#3966)
|
2024-08-08 12:02:23 -03:00 |
|
shashank-elastic
|
63e91c2f12
|
Back-porting Version Trimming (#3704)
|
2024-05-23 00:45:10 +05:30 |
|
Mika Ayenson
|
2c3dbfc039
|
Revert "Back-porting Version Trimming (#3681)"
This reverts commit 71d2c59b5c.
|
2024-05-22 13:51:46 -05:00 |
|
shashank-elastic
|
71d2c59b5c
|
Back-porting Version Trimming (#3681)
|
2024-05-23 00:11:50 +05:30 |
|
Samirbous
|
8f6de1c235
|
[New] Potential privilege escalation via CVE-2022-38028 (#3616)
* [New] Potential privilege escalation via CVE-2022-38028
https://www.microsoft.com/en-us/security/blog/2024/04/22/analyzing-forest-blizzards-custom-post-compromise-tool-for-exploiting-cve-2022-38028-to-obtain-credentials/
* Update privilege_escalation_exploit_cve_202238028.toml
* Update privilege_escalation_exploit_cve_202238028.toml
* Update privilege_escalation_exploit_cve_202238028.toml
---------
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
|
2024-04-29 15:10:27 +01:00 |
|