Ruben Groenewoud
|
37e18af7a5
|
[Rule Tuning] Adds Crowdstrike Compatibility to Linux Process Rules (#5232)
* First batch
* Second batch
* Batch 2
|
2025-11-10 16:03:39 +01:00 |
|
shashank-elastic
|
059d7efa25
|
Prep for Release 9.0 (#4550)
|
2025-03-20 20:32:07 +05:30 |
|
Jonhnathan
|
0268daa17d
|
[Rule Tuning] Tighten Up Elastic Defend Indexes - Linux (#4446)
|
2025-02-05 15:25:45 -03:00 |
|
Mika Ayenson
|
fe8c81d762
|
[FR] Generate investigation guides (#4358)
|
2025-01-22 11:17:38 -06:00 |
|
Jonhnathan
|
6b0b988d79
|
[Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 10 (#4357)
* [Rule Tuning] Linux 3rd Party EDR Support - Crowdstrike and S1 - 10
* Remaining ones
|
2025-01-09 11:54:46 -03:00 |
|
Ruben Groenewoud
|
a71bbe0cf8
|
[Rule Tuning] Misc. DR Rule Tuning - Part 2 (#3905)
* [Rule Tuning] Misc. DR Rule Tuning - Part 2
* ++
* Update privilege_escalation_suspicious_uid_guid_elevation.toml
* Update rules/linux/persistence_systemd_service_creation.toml
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
|
2024-07-19 15:21:35 +02:00 |
|
shashank-elastic
|
63e91c2f12
|
Back-porting Version Trimming (#3704)
|
2024-05-23 00:45:10 +05:30 |
|
Mika Ayenson
|
2c3dbfc039
|
Revert "Back-porting Version Trimming (#3681)"
This reverts commit 71d2c59b5c.
|
2024-05-22 13:51:46 -05:00 |
|
shashank-elastic
|
71d2c59b5c
|
Back-porting Version Trimming (#3681)
|
2024-05-23 00:11:50 +05:30 |
|
Ruben Groenewoud
|
9f8638a004
|
[Tuning] event.action and event.type change (#3495)
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
|
2024-03-13 10:11:21 +01:00 |
|
Jonhnathan
|
458e67918a
|
[Security Content] Small tweaks on the setup guides (#3308)
* [Security Content] Small tweaks on the setup guides
* Additional Fixes
* Avoid touching deprecated rules
|
2024-03-11 09:09:40 -03:00 |
|
shashank-elastic
|
d52546eee5
|
Enhance Setup Guide information (#3256)
|
2023-11-03 19:05:29 +05:30 |
|
shashank-elastic
|
7254c582c5
|
Move Setup information into setup filed (#3206)
|
2023-10-23 19:28:18 +05:30 |
|
shashank-elastic
|
276c0f9cd3
|
Setup information for Linux Rules - Set7 (#3190)
|
2023-10-17 19:45:01 +05:30 |
|
Jonhnathan
|
4233fef238
|
[Security Content] Include "Data Source: Elastic Defend" tag (#3002)
* win folder
* Other folders
* Update test_all_rules.py
* .
* updated missing elastic defend tags
---------
Co-authored-by: terrancedejesus <terrance.dejesus@elastic.co>
|
2023-09-05 14:22:01 -04:00 |
|
Ruben Groenewoud
|
ef49709c7d
|
[New Rules] Linux Wildcard Injection (#2973)
* [New Rules] Linux Wildcard Injection
* Update rules/linux/privilege_escalation_chown_chmod_unauthorized_file_read.toml
Co-authored-by: Justin Ibarra <16747370+brokensound77@users.noreply.github.com>
* Update rules/linux/privilege_escalation_potential_wildcard_shell_spawn.toml
Co-authored-by: Justin Ibarra <16747370+brokensound77@users.noreply.github.com>
* Update rules/linux/privilege_escalation_potential_wildcard_shell_spawn.toml
* Update rules/linux/privilege_escalation_potential_wildcard_shell_spawn.toml
Co-authored-by: Justin Ibarra <16747370+brokensound77@users.noreply.github.com>
* Update rules/linux/privilege_escalation_potential_wildcard_shell_spawn.toml
---------
Co-authored-by: Justin Ibarra <16747370+brokensound77@users.noreply.github.com>
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
|
2023-08-04 16:32:34 +02:00 |
|