Commit Graph

3141 Commits

Author SHA1 Message Date
shashank-elastic 5db396f084 Skip unit test for protected prebuilt-rules on DAC env (#5323) 2025-11-17 21:41:46 +05:30
shashank-elastic 79607723df Renovate Updates (#5258) 2025-11-17 20:22:11 +05:30
Samirbous 64cc823481 [Tuning] Outbound Scheduled Task Activity via PowerShell (#5287)
https://github.com/elastic/detection-rules/issues/5286

Verified cidrmatch on destination.ip works on both integrations (endpoint and sysmon):
2025-11-17 10:02:50 +00:00
Ruben Groenewoud 4c984b0ed5 [Rule Tuning] Potential Execution via XZBackdoor (#5318) 2025-11-17 09:50:33 +01:00
Terrance DeJesus 38d38f293e [New Rule] Azure Compute Snapshot Deletion(s) (#5211)
* [New Rule] Azure Compute Snapshot Deletion(s)
Fixes #5210

* adding missing field to non-ecs

* added rule.investigation_fields header
2025-11-15 08:36:03 -05:00
Jonhnathan a2bf7f088d [Security Content] Windows Setup Guides - WinEventLog & Sysmon (#5162)
* [Security Content] Windows Setup Guides

* Move it to the right folder

* Fix link

* test

* ++

* ++

* ++

* ++

* ++

* ++

* ++

* ++

* Fix links

* ++

* ++

* Update pyproject.toml

* Update docs/audit_policies/windows/sysmon_eventid1_process_creation.md

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Update docs/audit_policies/windows/audit_powershell_scriptblock.md

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>

* Update pyproject.toml

---------

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2025-11-14 09:22:31 -08:00
Jonhnathan 8b74ba7136 [Rule Tuning] Remove host.os.type Unit Test Exception (#5317) 2025-11-14 08:46:24 -08:00
Isai 5c1ee125df [Rule Tuning] AWS GetSessionToken Abuse (#5274)
This rule is extremely loud in telemetry with no meaningful way to reduce false positives. The behavior it's capturing is common behavior, however can be used for threat hunting, investigation and further correlation with other detection rules. I'm moving this to a BBR rule with a few changes:
- removed IAMUser specification in the query. Temporary sessions can be created by both IAM Users and the Root Account. This rule should capture both instances.
- reduced execution window
- name change to AWS GetSessionToken Usage as this captured behavior is not indicative of abuse
- added highlighted fields
- updated description, FP and IG
2025-11-14 04:14:13 -05:00
Isai 94bb6643fc [Rule Tuning] AWS Cloudtrail Created/Updated/Suspended/Deleted (#5292)
These Cloudtrail lifecycle rules are performing as expected in telemetry, very low volume. No major changes needed

- updated Descriptions and IGs
- added highlighted fields
- added missing tags
- reduced execution windows
2025-11-14 02:48:52 -05:00
Isai f02589c249 [Rule Tunings] AWS Group Creation, User Added to Group, Group Deletion (#5269)
* [Rule Tuning][New Rule] AWS S3 Bucket Policy Added to Share with External Account/ to Allow Public Access

AWS S3 Bucket Policy Added to Share with External Account
Low telemetry volume overall, however false positives were seen for cloudfront identity and service accounts being given access to a bucket
- Reduced the scope of this rule to only analyze policy that include account ids or account ARNs (which include an account ID). This eliminates the false positives triggered by sharing buckets with a service account (i.e. cloudtrail.amazonaws.com)
- Excluded cloudfront identity, which should be treated the same way service accounts are being treated and be excluded as they do not include account IDs in their ARN
- This rule wasn't explicitly capturing the use of `Principal: *` which is a public sharing method, often accompanied by a Condition statement (i.e. aws.SourceAccount =  OR aws.PrincipalAccount= OR ip.address = ....). The new query will capture Condition statements that include an account id. However there is still a gap for Policies that have explicit `Principal:*` with or without a condition, so another rule was created that will account for these scenarios.
- added highlighted fields
- updated investigation guide and description
- updated Mitre tactics and tags
- `event.type` used in place of `event.category` field

### AWS S3 Bucket Policy Added to Allow Public Access
Rule added to cover gap in public bucket policy added which includes an `Effect=Allow` and `Principal: *`. While an additional condition might be added to this policy which would exclude public access, cases where the condition is not included mean the bucket is publicly accessible. Both cases need to be verified, because even the condition could be giving access to an attacker owned account. There is also the chance that an `Effect=Deny` for `Principal:*` will trigger a false positive for this rule if the same policy also includes an `Effect=Allow` statement. We call this out in the description, false positive and investigation guide sections of the rule.

* [Rule Tunings] AWS Group Creation, User Added to Group, Group Deletion

All 3 rules are showing extremely low telemetry volume as expected. No major changes needed to these queries.
- updated the descriptions, investigation guides and false positive sections
- reduced execution window
- added highlighted fields

* slight edit to description

* Revert "[Rule Tuning][New Rule] AWS S3 Bucket Policy Added to Share with External Account/ to Allow Public Access"

This reverts commit 776d748a11d11f2c0e974e68c9e3adc77dcb3d9f.

* Update rules/integrations/aws/persistence_iam_group_creation.toml
2025-11-14 02:34:28 -05:00
Isai b3502f77ba [Rule Tuning] AWS S3 Bucket Configuration Deletion (#5265)
No major query logic changes needed. This rule is performing as expected in telemetry, known to be a bit noisier in development environments where bucket configuration changes and deletions happen often.

- updated Description and IG
- reduced execution window
- updated MITRE mapping
- updated tags
- added highlighted fields
2025-11-14 01:49:14 -05:00
Samirbous 7b7082e9f4 [New] Command Obfuscation via Unicode Modifier Letters (#5311)
* [New] Command Obfuscation via Unicode Modifier Letters

* Update defense_evasion_obf_args_unicode_modified_letters.toml

* Update defense_evasion_obf_args_unicode_modified_letters.toml

* Update defense_evasion_obf_args_unicode_modified_letters.toml

* ++

* Update defense_evasion_obf_args_unicode_modified_letters.toml

* Update defense_evasion_obf_args_unicode_modified_letters.toml
2025-11-13 21:29:07 +00:00
Eric Forte 033145adf4 [Bug] Add synthetic properties check to remote ESQL validation (#5308)
* Add synthetic properties check

* Add additional unit test for schema conflicts
2025-11-13 15:25:42 -05:00
Terrance DeJesus f184b0a237 [Rule Tuning] Azure Diagnostic Settings Deletion (#5253)
* [Rule Tuning] Azure Diagnostic Settings Deletion
Fixes #5252

* updated tags and linted

* linted again
2025-11-13 13:49:44 -05:00
Samirbous 7b6f4864f0 Update defense_evasion_agent_spoofing_mismatched_id.toml (#5312) 2025-11-13 17:26:29 +00:00
Eric Forte 29d4aeb37a [Bug] [DAC] Auto Gen Schema Fails on Certain Subqueries (#5256)
* Add alignment checking for sub-queries

* Allow field to be over written with original field

* Update rule prompt to allow for int 0 values

* Support custom schema index overwrite

---------

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2025-11-12 11:21:53 -05:00
Ruben Groenewoud 700443bc97 [New Rule] Potential Git CVE-2025-48384 Exploitation (#5301)
* [New Rule] Potential Git CVE-2025-48384 Exploitation

* ++

* Update execution_git_exploit_cve_2025_48384.toml

* Update execution_git_exploit_cve_2025_48384.toml

* Update rules/cross-platform/execution_git_exploit_cve_2025_48384.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update rules/cross-platform/execution_git_exploit_cve_2025_48384.toml

* Update rules/cross-platform/execution_git_exploit_cve_2025_48384.toml

* Update execution_git_exploit_cve_2025_48384.toml

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2025-11-12 15:45:52 +01:00
Alessandro Stoltenberg 21217e5536 [Rule Tuning] Elastic Agent Service Terminated (#5272)
* rule-tuning: Elastic Agent service termination improve for detection

* [Rule Tuning]: Elastic Agent Service terminated, updated date field

* Enhance detection rules for stopping Elastic Agent

* Fix syntax for process name checks in TOML file

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2025-11-12 08:34:34 -03:00
Terrance DeJesus 7dac1ee803 [Rule Tuning] Microsoft 365 Global Administrator Role Assigned (#5293)
* [Rule Tuning] Microsoft 365 Global Administrator Role Assigned
Fixes #5288

* TOML linted

* Update rules/integrations/o365/persistence_microsoft_365_global_administrator_role_assign.toml
2025-11-11 13:13:07 -05:00
veritasr3x da9bfd0abc MITRE ATT&CK Sub-Technique Update - Solves Issue #5279 (#5280)
* Resolves Issue #5279

* Corrected the "updated_date" value

* Put the technique and sub-technique in the correct location

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
2025-11-11 10:26:14 -05:00
github-actions[bot] 32fb003781 Lock versions for releases: 8.19,9.0,9.1,9.2 (#5300) 2025-11-11 18:58:05 +05:30
shashank-elastic e938ecf41a Refresh Manifest and Schemas November Update (#5298) 2025-11-11 18:04:20 +05:30
Samirbous 29393f2ca4 [New] New USB Storage Device Mounted (#5299)
* Revise USB device mounting detection rule

Updated detection rule for USB device mounting to use device serial number instead of friendly name. Enhanced investigation steps and response actions for better clarity.

* Update initial_access_exfiltration_new_usb_device_mounted.toml

* Update rules/cross-platform/initial_access_exfiltration_new_usb_device_mounted.toml

* Update initial_access_exfiltration_new_usb_device_mounted.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2025-11-11 09:28:54 +00:00
Ruben Groenewoud 1280e0854a [New Rule] Potential SSH Password Grabbing via strace (#5294) 2025-11-11 09:35:34 +01:00
Mika Ayenson, PhD 4e1c8f677c [Tuning] Add mv_expand for gen_ai.policy.action field (#5296)
Resolves #5202
Resolves #5203
Resolves #5204

The gen_ai.policy.action field is an array, so an additional mv_expand
is necessary for the rules to work correctly with AWS Bedrock integration
events that contain multiple policy actions.

Updated rules:
- Unusual High Word Policy Blocks Detected
- Unusual High Denied Topic Blocks Detected
- Unusual High Denied Sensitive Information Policy Blocks Detected
- Unusual High Confidence Content Filter Blocks Detected
- AWS Bedrock Guardrails Detected Multiple Policy Violations Within a Single Blocked Request

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
2025-11-11 07:37:40 +05:30
Samirbous 34bd88a37e [Tuning] Potential Ransomware Behavior - Note Files by System (#5235)
* Update impact_high_freq_file_renames_by_kernel.toml

* Update impact_high_freq_file_renames_by_kernel.toml

* Update rules/windows/impact_high_freq_file_renames_by_kernel.toml

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
2025-11-10 18:22:37 +00:00
Samirbous 085ef447e8 [New] Windows Server Update Service Spawning Suspicious Processes (#5250)
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287

ttps://hawktrace.com/blog/CVE-2025-59287
2025-11-10 18:10:32 +00:00
Isai 28f227ab6f [Rule Tunings] AWS EC2 EBS Snapshot and Encryption Rules (#5229)
* [Rule Tunings] AWS EC2 EBS Snapshot and Encryption Rules

AWS EC2 Encryption Disabled
 rule performance is good, telemetry looks low as expected
- additional context to description to emphasize the security concern and purpose of the rule
- updated investigation guide
- added highlighted fields
- reduced execution window

AWS EC2 EBS Snapshot Access Removed
rule alerts as expected, telemetry volume is low as expected. however, this rule can be accomplished using EQL so I've changed the rule type
- changed rule type to eql
- added index
- updated IG
- added highlighted fields
note: I have to use `any` for the query since there is no `event.category` defined for `event.action: ModifySnapshotAttribute`

AWS EC2 EBS Snapshot Shared or Made Public
Converted to EQL. As an ESQL rule the primary benefit was being able to definitely exclude instances where a user adds their own account id when calling the ModifySnapshotAttribute instead of an external account id. This is a redundant action as the snapshot when created is automatically shared with the account it's created in. But this could be a false positive if it's done by mistake. Instead of keeping this as an ESQL rule, I still think there is more value to converting this to EQL for both customer alert context and telemetry. When looking at production data, I saw no instances where the owning account id was added in this way. Its a rare mistake that shouldn't happen often enough to support keeping this as an ESQL rule.
- converted to EQL
- added index
- updated IG
- updated description
- added highlighted fields

* adding event_category_override = "event.provider"

override event.category to event.provider to account for the use of "any" in EQL query

* normalizing IG title capitalization

normalizing IG title capitalization

* bumping severity to medium

since EC2 snapshot data can be sensitive, unauthorized sharing or access removal should be triaged

* updated event_category_override field

replaced event.provider with event.type to satisfy EQL library parsing requirements
2025-11-10 12:08:31 -05:00
shashank-elastic 56c40b18f0 Ignore agentless executions in agent_id_status events. (#5295) 2025-11-10 22:18:51 +05:30
Isai 4d89eab189 [Rule Tuning] AWS S3 Bucket Server Access Logging Disabled (#5254)
#### AWS S3 Bucket Server Access Logging Disabled
Rule is triggering as expected with low telemetry
- removed `any` from EQL query by replacing event category field with `event.type` as this is mapped for the API action `PutBucketLogging`
- added `event.provider` as part of query
- updated Investigation guide
- Added highlighted fields
2025-11-10 11:36:55 -05:00
Isai 70ee55d07d [Rule Tuning] AWS S3 Bucket Expiration Lifecycle Configuration Added (#5251)
* [Rule Tuning] AWS S3 Bucket Expiration Lifecycle Configuration Added

AWS S3 Bucket Expiration Lifecycle Configuration Added
- changed rule type to EQL so as not to use the double wildcard
- used `event.type` as event category override field because `event.category` is not mapped for `PutBucketLifecycle` action
- removed unnecessary `*LifecycleConfiguration*` check from query, this field is required for any `PutBucketLifecycle` API call so unnecessary to include in the query.
- updated description and IG
- reduced execution window
- updated Mitre mapping
- removed incorrect setup notes
- added highlighted fields

* fixing Mitre mapping error

* adding IG disclaimer
2025-11-10 11:25:06 -05:00
Isai cc5387d566 [New Rule][Deprecation] AWS EC2 Export Task Rules (#5248)
* [New Rule][Deprecation] AWS EC2 Export Tasks Rules

**AWS EC2 VM Export Failure**
Starting Deprecation process for this rule. I cannot see the value in alerting on a failed VM export attempt. This is rare behavior in general but failed attempts don't warrant an alert especially considering we have no coverage for an actual successful VM Export. This rule has had no alerts in telemetry, I've seen no hits in prod data either. VM exports have a very specific use-case, they can be used to create VM image files that can be downloaded and used to run a VM locally. Successful exports warrant an alert.

**AWS EC2 Export Task**
This new rule is meant to fill the previously mentioned gap regarding successful VM exports. But also includes other forms of EC2 export tasks.
`CreateImageExportTask`
`ExportImage`
`CreateStoreImageTask`

* adding highlighted fields

adding highlighted fields

* Update rules/integrations/aws/exfiltration_ec2_vm_export_failure.toml

* Update rules/integrations/aws/exfiltration_ec2_vm_export_failure.toml
2025-11-10 11:15:13 -05:00
Isai 5b386e0a8f [Rule Tuning] AWS EC2 Full Network Packet Capture Detected (#5244)
* [Rule Tuning] AWS EC2 Full Network Packet Capture Detected

**AWS EC2 Full Network Packet Capture Detected**
Alert telemetry is low in general however the alerts that do exist are unnecessarily duplicative in nature.  When a traffic mirror session is created (CreateTrafficMirrorSession), it is typcially created alongside A filter and filter rules (CreateTrafficMirrorFilter, CreateTrafficMirrorFilterRule) which determines what traffic will be mirrored. There is also a traffic mirror target (CreateTrafficMirrorTarget), which is the destination for the mirrored traffic to go. The original scope of this rule included all of those APIs when really the only API needed here is `CreateTrafficMirrorSession`, which is the actual network mirroring behavior. The rest of those calls can be used as additional context during alert triage, but I've significantly reduced the scope of this rule to only capture the actual traffic mirroring behavior.
- reduced the query scope to `CreateTrafficMirrorSession` only
- reduced the execution window
- update description and investigation guide
- replaced API reference link
- added highlighted fields

* updating mitre technique

updating mitre technique

* updated Mitre mapping

adding network sniffing technique

* updating references to include relevant threat blog

updating references to include relevant threat blog

* adding EC2 tag

adding EC2 tag

* updating EC2 tagging
2025-11-10 10:49:17 -05:00
Ruben Groenewoud 57facddd32 [Rule Tuning] File Transfer or Listener Established via Netcat (#5223)
* [Rule Tuning] File Transfer or Listener Established via Netcat

* Formatting

* Update execution_file_transfer_or_listener_established_via_netcat.toml

* Update execution_file_transfer_or_listener_established_via_netcat.toml

* Add timestamp override to netcat execution rule

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2025-11-10 16:11:16 +01:00
Ruben Groenewoud 37e18af7a5 [Rule Tuning] Adds Crowdstrike Compatibility to Linux Process Rules (#5232)
* First batch

* Second batch

* Batch 2
2025-11-10 16:03:39 +01:00
Ruben Groenewoud bb38e2558a [New Rule] Privilege Escalation via SUID/SGID Proxy Execution (#5266)
* [New Rule] Privilege Escalation via SUID/SGID Proxy Execution

* Update privilege_escalation_potential_suid_sgid_proxy_execution.toml

* Update rules/linux/privilege_escalation_potential_suid_sgid_proxy_execution.toml
2025-11-10 11:41:38 +01:00
Isai 62d7316e85 [Rule Tuning] AWS S3 Object Versioning Suspended (#5261)
* [Rule Tuning] AWS S3 Object Versioning Suspended

AWS S3 Object Versioning Suspended
This rule is performing well in telemetry, no major query changes in terms of detection logic or rule type.
- to improve performance, changed event category field to `event.type` since `event.category` is not mapped for `PutBucketVersioning` event.action. This avoids use of `any` in query.
- added `event.provider == "s3.amazonaws.com"` to query
- added highlighted fields
- updated investigation guide

* removed some copy errors
2025-11-07 17:09:24 -05:00
Isai 477df5c635 [Rule Tuning] AWS S3 Static Site Javascript File Uploaded (#5264)
This rule is triggering as expected. However, the threat this rule is meant to capture is a potential malicious .js file upload. Currently it is capturing both GetObject (read file) and PutObject (write file) API calls which is adding noise without adding much threat detection value.
- Removed `GetObject` API call from scope, so this rule focuses only on write activity. This reduced  alert telemetry volume by ~73%
- added `event.outcome == success` criteria to exclude failed upload attempts
- corrected `Pulumi` typo in user agent exclusion criteria
- reduced execution window
- added highlighted fields
2025-11-07 17:00:56 -05:00
Isai ee06afd9e1 [Rule Tuning][New Rule] AWS S3 Bucket Policy Added to Share with External Account/ to Allow Public Access (#5268)
* [Rule Tuning][New Rule] AWS S3 Bucket Policy Added to Share with External Account/ to Allow Public Access

AWS S3 Bucket Policy Added to Share with External Account
Low telemetry volume overall, however false positives were seen for cloudfront identity and service accounts being given access to a bucket
- Reduced the scope of this rule to only analyze policy that include account ids or account ARNs (which include an account ID). This eliminates the false positives triggered by sharing buckets with a service account (i.e. cloudtrail.amazonaws.com)
- Excluded cloudfront identity, which should be treated the same way service accounts are being treated and be excluded as they do not include account IDs in their ARN
- This rule wasn't explicitly capturing the use of `Principal: *` which is a public sharing method, often accompanied by a Condition statement (i.e. aws.SourceAccount =  OR aws.PrincipalAccount= OR ip.address = ....). The new query will capture Condition statements that include an account id. However there is still a gap for Policies that have explicit `Principal:*` with or without a condition, so another rule was created that will account for these scenarios.
- added highlighted fields
- updated investigation guide and description
- updated Mitre tactics and tags
- `event.type` used in place of `event.category` field

### AWS S3 Bucket Policy Added to Allow Public Access
Rule added to cover gap in public bucket policy added which includes an `Effect=Allow` and `Principal: *`. While an additional condition might be added to this policy which would exclude public access, cases where the condition is not included mean the bucket is publicly accessible. Both cases need to be verified, because even the condition could be giving access to an attacker owned account. There is also the chance that an `Effect=Deny` for `Principal:*` will trigger a false positive for this rule if the same policy also includes an `Effect=Allow` statement. We call this out in the description, false positive and investigation guide sections of the rule.

* [Rule Tunings] AWS Group Creation, User Added to Group, Group Deletion

All 3 rules are showing extremely low telemetry volume as expected. No major changes needed to these queries.
- updated the descriptions, investigation guides and false positive sections
- reduced execution window
- added highlighted fields

* Revert "[Rule Tunings] AWS Group Creation, User Added to Group, Group Deletion"

This reverts commit c66a4f11e1c690a856b1c2f4cbb03077739629d7.
2025-11-07 16:25:05 -05:00
Terrance DeJesus 3a52db299e [Rule Tuning] M365 Impossible / Atypical Travel FN (#5267)
* [Rule Tuning] M365 Portal Login (Impossible Travel)
Fixes #5239

* updated investigation header
2025-11-04 11:29:25 -05:00
Samirbous 598e5c363f [New] Suspicious Kerberos Authentication Ticket Request (#5260)
* [New] Suspicious Kerberos Authentication Ticket Request

Multi-datasource correlation to detect suspicious Kerberos Authentication Ticket Request from the source machine and the Domain Controller.

* Update lateral_movement_credential_access_kerberos_correlation.toml

* Update rules/windows/lateral_movement_credential_access_kerberos_correlation.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/windows/lateral_movement_credential_access_kerberos_correlation.toml

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>

* Update rules/windows/lateral_movement_credential_access_kerberos_correlation.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update rules/windows/lateral_movement_credential_access_kerberos_correlation.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update lateral_movement_credential_access_kerberos_correlation.toml

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2025-11-03 15:44:13 +00:00
elastic-renovate-prod[bot] f52aedf41d Update tj-actions/changed-files action to v46.0.5 (#5097) 2025-10-28 21:07:33 +05:30
shashank-elastic c6f1c90c2f Update Release Fleet and Lock versions to use ESQL Remote Validation (#5245) 2025-10-27 21:05:16 +05:30
Eric Forte 7604c20d9e [FR] Add ESQL rules to dataset exception (#5249)
* Add ESQL rules to dataset exception

* Add unit test
2025-10-27 11:03:48 -04:00
shashank-elastic 9345e0ec27 Add unit test for protected prebuilt-rules (#5242) 2025-10-24 19:15:52 +05:30
Eric Forte 566242772f Remove toml filtering for branches (#5243) 2025-10-23 12:53:15 -04:00
github-actions[bot] b9b8e24514 Lock versions for releases: 8.19,9.0,9.1,9.2 (#5234) 2025-10-17 22:10:05 +05:30
shashank-elastic 3c56a72cd4 Update Splunk Schemas for pre-release versions to support 9.0 Kibana versions (#5233) 2025-10-17 11:52:37 -04:00
shashank-elastic 818978975d Prep 9.2 (#5231) 2025-10-17 21:01:13 +05:30
Terrance DeJesus b24c6111ed [New Rule] Azure Compute Restore Point Collection Deleted (#5217)
* [New Rule] Azure Compute Restore Point Collection Deleted
Fixes #5216

* Update rules/integrations/azure/impact_azure_compute_restore_point_collection_deleted.toml

* Update rules/integrations/azure/impact_azure_compute_restore_point_collection_deleted.toml

* updated severities
2025-10-17 10:49:38 -04:00