shashank-elastic
|
d52546eee5
|
Enhance Setup Guide information (#3256)
|
2023-11-03 19:05:29 +05:30 |
|
shashank-elastic
|
7254c582c5
|
Move Setup information into setup filed (#3206)
|
2023-10-23 19:28:18 +05:30 |
|
shashank-elastic
|
5a98208b53
|
Setup information for Linux Rules - Set6 (#3189)
|
2023-10-17 19:33:07 +05:30 |
|
Jonhnathan
|
4233fef238
|
[Security Content] Include "Data Source: Elastic Defend" tag (#3002)
* win folder
* Other folders
* Update test_all_rules.py
* .
* updated missing elastic defend tags
---------
Co-authored-by: terrancedejesus <terrance.dejesus@elastic.co>
|
2023-09-05 14:22:01 -04:00 |
|
Jonhnathan
|
b4c84e8a40
|
[Security Content] Tags Reform (#2725)
* Update Tags
* Bump updated date separately to be easy to revert if needed
* Update resource_development_ml_linux_anomalous_compiler_activity.toml
* Apply changes from the discussion
* Update persistence_init_d_file_creation.toml
* Update defense_evasion_timestomp_sysmon.toml
* Update defense_evasion_application_removed_from_blocklist_in_google_workspace.toml
* Update missing Tactic tags
* Update unit tests to match new tags
* Add missing IG tags
* Delete okta_threat_detected_by_okta_threatinsight.toml
* Update command_and_control_google_drive_malicious_file_download.toml
* Update persistence_rc_script_creation.toml
* Mass bump
* Update persistence_shell_activity_by_web_server.toml
* .
---------
Co-authored-by: Mika Ayenson <Mika.ayenson@elastic.co>
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>
|
2023-06-22 18:38:56 -03:00 |
|
shashank-elastic
|
0107e0fcaa
|
Detect Threat indicators for VMware ESXi servers (#2708)
|
2023-04-25 20:17:16 +05:30 |
|