Samirbous
b60b6e2af3
[New] Attempt to establish VScode Remote Tunnel ( #4061 )
...
* [New] Attempt to establish VScode Remote Tunnel
* Update command_and_control_tunnel_vscode.toml
* Update command_and_control_tunnel_vscode.toml
* Update command_and_control_tunnel_vscode.toml
* Update rules/windows/command_and_control_tunnel_vscode.toml
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
---------
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
2024-09-16 07:39:39 +01:00
Samirbous
3a3400c8e5
[New] MsiExec Service Child Process With Network Connection ( #4062 )
...
* [New] MsiExec Service Child Process With Network Connection
converted an ER diag rule to SIEM rule as it matches on a good number of MSI related FNs.
* Update defense_evasion_msiexec_child_proc_netcon.toml
* Update rules/windows/defense_evasion_msiexec_child_proc_netcon.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update rules/windows/defense_evasion_msiexec_child_proc_netcon.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update rules/windows/defense_evasion_msiexec_child_proc_netcon.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update rules/windows/defense_evasion_msiexec_child_proc_netcon.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
---------
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2024-09-15 20:22:44 +01:00
Samirbous
56fc2beb46
[New] Suspicious PowerShell Execution via Windows Scripts ( #4060 )
...
* [New] Suspicious PowerShell Execution via Windows Scripts
this PR converts this ER https://github.com/elastic/protections-artifacts/blob/ea2f8dd3b61a7cdf2ce83ca5f06f2096bb62a494/behavior/rules/windows/execution_suspicious_powershell_execution_via_windows_scripts.toml#L5 to a SIEM rule compatible with S1 and M365D and Winlog/sysmon.
* Update execution_powershell_susp_args_via_winscript.toml
* Create defense_evasion_script_via_html_app.toml
* ++
* Update defense_evasion_script_via_html_app.toml
* Update execution_powershell_susp_args_via_winscript.toml
---------
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
2024-09-15 19:51:21 +01:00
Samirbous
b6162abefa
[New] WPS Office Exploitation via DLL Hijack ( #4043 )
...
* Create execution_initial_access_wps_dll_exploit.toml
* Update execution_initial_access_wps_dll_exploit.toml
---------
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
2024-09-15 11:23:35 +01:00
Samirbous
9255dafe53
[New] Detonate LNK TOP Rules ( #4058 )
...
* [New] Detonate LNK TOP Rules
the following two rules are the top ones matching on TPs from detonate for LNK files, converting them to SIEM rules compatible with Sysmon/Winlogbeat, SentinelOne and M365 Defender :
https://github.com/elastic/protections-artifacts/blob/ea2f8dd3b61a7cdf2ce83ca5f06f2096bb62a494/behavior/rules/windows/execution_suspicious_powershell_execution.toml#L8
https://github.com/elastic/protections-artifacts/blob/ea2f8dd3b61a7cdf2ce83ca5f06f2096bb62a494/behavior/rules/windows/execution_suspicious_windows_command_shell_execution.toml#L8
* Update execution_windows_cmd_shell_susp_args.toml
* Update execution_windows_powershell_susp_args.toml
* Update execution_windows_cmd_shell_susp_args.toml
* Update execution_windows_powershell_susp_args.toml
* Update execution_windows_powershell_susp_args.toml
* Update execution_windows_cmd_shell_susp_args.toml
* Update execution_windows_powershell_susp_args.toml
* Update rules/windows/execution_windows_cmd_shell_susp_args.toml
* Update rules/windows/execution_windows_powershell_susp_args.toml
* Update execution_windows_cmd_shell_susp_args.toml
* Update execution_windows_cmd_shell_susp_args.toml
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2024-09-15 10:49:17 +01:00
Terrance DeJesus
bb9a772870
[New Rule] Okta Public Client App OAuth Token Request with Client Credentials ( #4074 )
...
* adding new rule for Okta public client app OAuth token request with client credentials
* Update detection_rules/etc/non-ecs-schema.json
* changing new terms to okta.actor.display_name
* linted; added references
2024-09-13 14:57:49 -04:00
Samirbous
cad3865fcf
[New] Potential Escalation via Vulnerable MSI Repair - CVE-2024-38014 ( #4076 )
...
* [New] Potential Escalation via Vulnerable MSI Repair
https://sec-consult.com/blog/detail/msi-installer-repair-to-system-a-detailed-journey/
* Update privilege_escalation_msi_repair_via_mshelp_link.toml
* Update rules/windows/privilege_escalation_msi_repair_via_mshelp_link.toml
* Update rules/windows/privilege_escalation_msi_repair_via_mshelp_link.toml
* Update rules/windows/privilege_escalation_msi_repair_via_mshelp_link.toml
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2024-09-13 17:57:44 +01:00
shashank-elastic
3e25ea8c2b
[New Rule] AWS Bedrock Detections ( #4072 )
2024-09-13 19:46:47 +05:30
Thijs Xhaflaire
df1f0bc98e
[New Rule] Add Jamf Protect detection rules ( #4047 )
...
* Create privilege_escalation_user_added_to_admin_group.toml
* Update privilege_escalation_user_added_to_admin_group.toml
* Update privilege_escalation_user_added_to_admin_group.toml
* Adding pbpaste detection rule and minor adjustments to user added to group
* Update credential_access_high_volume_of_pbpaste.toml
* Update credential_access_high_volume_of_pbpaste.toml
* Adding two rules to validate our approach.
* Updated index to "logs-jamf_protect*"
* Update credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update rules/integrations/jamf/credential_access_high_volume_of_pbpaste.toml
* Update rules/integrations/jamf/credential_access_high_volume_of_pbpaste.toml
* Update rules/integrations/jamf/credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update rules/integrations/jamf/privilege_escalation_user_added_to_admin_group.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update rules/integrations/jamf/privilege_escalation_user_added_to_admin_group.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update rules/integrations/jamf/privilege_escalation_user_added_to_admin_group.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update rules/integrations/jamf/privilege_escalation_user_added_to_admin_group.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Moved to rules/macos folder
* Removed rules from integration/jamf folder
* Update credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update credential_access_high_volume_of_pbpaste.toml
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com >
* minstack rules and support jamf_protect non-dataset
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com >
Co-authored-by: Mika Ayenson <Mika.ayenson@elastic.co >
2024-09-12 15:03:56 -05:00
Terrance DeJesus
29051c2e33
[New Rule] Cross Platform: AWS SendCommand API Call with Run Shell Command Parameters ( #4052 )
...
* add new rule 'AWS SSM with Run Shell Command Parameters'
* linting
* Update rules/cross-platform/execution_aws_ssm_sendcommand_with_command_parameters.toml
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
* reverting suggestion; causes KQL parser errors for optimization
* fixing query command filter
* added linux event type filter
* fixing array
* fixed description
* Update rules/cross-platform/execution_aws_ssm_sendcommand_with_command_parameters.toml
---------
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
2024-09-11 13:40:25 -04:00
Jonhnathan
127a56aede
[Rule Tuning] Remote Execution via File Shares ( #4067 )
...
* [Rule Tuning] Remote Execution via File Shares
* Update lateral_movement_execution_via_file_shares_sequence.toml
2024-09-11 10:49:41 -03:00
Samirbous
dc9c58527f
[Tuning] Unusual Network Activity from a Windows System Binary ( #4065 )
...
* Update defense_evasion_network_connection_from_windows_binary.toml
* Update defense_evasion_network_connection_from_windows_binary.toml
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2024-09-10 13:30:56 -03:00
Terrance DeJesus
8d27b6069b
[Rule Tuning] M365/Azure Brute-Forcing New Rule and Tuning; Deprecate Similar Rule ( #4057 )
...
* deprecated rule; tuned for single source inclusion
* adjusted query comments
* added min-stack
* updated date
* added Azure-based rule for brute forcing
* added reference to o365spray
* fixed tag
* adjusted query comment
* added rule for repeat source
* adjusted query to use count distinct
* added intervals; adjusted lookback window according to time truncation
2024-09-10 11:26:40 -04:00
Terrance DeJesus
0a08f5e677
[New Rule] New Microsoft 365 Impossible Travel Rules and Deprecation ( #4054 )
...
* new impossible travel rules for o365; deprecated development rule
* deleted development rule as it has not lock version
* reverted rule deletion, added note about reliability and related rules
2024-09-05 17:36:56 -04:00
Samirbous
e30dc312e4
[Tuning] Potential Execution via XZBackdoor ( #4053 )
...
* Update persistence_suspicious_ssh_execution_xzbackdoor.toml
* Update persistence_suspicious_ssh_execution_xzbackdoor.toml
2024-09-05 20:13:32 +01:00
Terrance DeJesus
be611be8b3
[New Rule] Instance Metadata Service (IMDS) API Requests - Linux ( #4005 )
...
* new rule metadata API requests
* updated description and name
* added Ipv6
* adjusted query
* rule name fix
* changed to EQL; added discovery tactic
* removed timestamp override
* adding host.os.type
* adjusted description
* Update rules/linux/credential_access_unusual_instance_metadata_service_api_request.toml
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
* Update rules/linux/credential_access_unusual_instance_metadata_service_api_request.toml
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
* adjusted query
---------
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
2024-09-05 10:08:32 -04:00
Ruben Groenewoud
9f964b68a4
[New Rule] Root Certificate Installation ( #4025 )
...
* [New Rule] Root Certificate Installation
* Update defense_evasion_root_certificate_installation.toml
* Update rules/linux/defense_evasion_root_certificate_installation.toml
2024-09-03 17:40:17 +02:00
Ruben Groenewoud
b3a75899d5
[New Rule] SELinux Configuration Creation or Modification ( #4024 )
...
* [New Rule] SELinux Configuration Creation or Modification
* Update rules/linux/defense_evasion_selinux_configuration_creation_modification.toml
* Rename defense_evasion_selinux_configuration_creation_modification.toml to defense_evasion_selinux_configuration_creation_or_renaming.toml
* Update rules/linux/defense_evasion_selinux_configuration_creation_or_renaming.toml
* Update rules/linux/defense_evasion_selinux_configuration_creation_or_renaming.toml
2024-09-01 10:14:59 +02:00
Ruben Groenewoud
fb07033159
[New Rule] Attempt to Disable Auditd Service ( #4028 )
...
* [New Rule] Attempt to Disable Auditd Service
* Update defense_evasion_attempt_to_disable_auditd_service.toml
* Update rules/linux/defense_evasion_attempt_to_disable_auditd_service.toml
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com >
---------
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com >
2024-09-01 09:51:13 +02:00
Ruben Groenewoud
30cd1b6a00
[New Rule] Potential Defense Evasion via Doas ( #4027 )
...
* [New Rule] Potential Defense Evasion via Doas
* Update rules/linux/defense_evasion_doas_configuration_creation_or_modification.toml
* Update rules/linux/defense_evasion_doas_configuration_creation_or_modification.toml
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
* Rename defense_evasion_doas_configuration_creation_or_modification.toml to defense_evasion_doas_configuration_creation_or_rename.toml
---------
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
2024-08-29 21:19:13 +02:00
Ruben Groenewoud
19b4a4d7dd
[New Rule] SSL Certificate Deletion ( #4026 )
...
* [New Rule] SSL Certificate Deletion
* Update defense_evasion_ssl_certificate_deletion.toml
* Update rules/linux/defense_evasion_ssl_certificate_deletion.toml
2024-08-29 21:10:59 +02:00
Terrance DeJesus
1ff26cf53e
[New Rule] New Rules AWS Multi-Region Discovery of EC2 Instances and Quotas ( #4015 )
...
* new rules AWS EC2 discovery in multiple-regions
* adjusted query and from window
* added event providers, adjusted tags, changed file name
2024-08-28 13:42:32 -04:00
Samirbous
3e831b82c3
Update credential_access_suspicious_web_browser_sensitive_file_access.toml ( #4029 )
...
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com >
2024-08-28 16:33:44 +01:00
Terrance DeJesus
6aaccc64a6
[New Rule] AWS CLI Command with Custom Endpoint URL ( #4002 )
...
* new rule AWS CLI COmmand with Custom Endpoint URL
* fixed query
* added host os type
* added timestamp override
2024-08-28 09:58:08 -04:00
Jonhnathan
e60c21b37b
[Rule Tuning] Enumeration of Privileged Local Groups Membership ( #4016 )
2024-08-27 09:54:19 -03:00
Jonhnathan
70c3a6f7b1
[Rule Tuning] Potential privilege escalation via CVE-2022-38028 ( #4004 )
2024-08-22 15:32:28 -03:00
Ruben Groenewoud
162a48c97f
[New Rule] Openssl Client or Server Activity ( #3930 )
...
* [New Rule] Openssl Client or Server Activity
* Endgame support
* Added one exclusion
* Update execution_shell_openssl_client_or_server.toml
* Update execution_shell_openssl_client_or_server.toml
---------
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-08-22 16:53:31 +02:00
Kirti Sodhi
dfbf86e853
Update ProblemChild detection rules with High and Low probability ( #4000 )
...
* Updated ProblemChild detection rules
2024-08-22 09:17:41 -04:00
Terrance DeJesus
b6b6f6b482
[New Rule] First Occurrence AWS STS Temporary Credential Request by User ( #3991 )
...
* adding new rule 'First Occurrence of STS GetFederationToken Request by User'
* added integration tag
* Update rules/integrations/aws/defense_evasion_sts_get_federation_token.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* added reference
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2024-08-21 20:17:10 -04:00
Terrance DeJesus
5493165440
[New Rule] AWS Signin Single Factor Console Login via Federated Session ( #3992 )
...
* adding new rule 'AWS Signin Single Factor Console Login with Federated User'
* changed uuid
* added integration tag
* fixed mitre mapping
* added min-stack
* Update rules/integrations/aws/initial_access_signin_console_login_no_mfa.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* added reference
* Update rules/integrations/aws/initial_access_signin_console_login_no_mfa.toml
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2024-08-21 18:19:54 -04:00
Terrance DeJesus
2559b7bb41
[Rule Tuning] Tuning AWS Rules for SAML Provider Updates and Assumed Roles via STS ( #3898 )
...
* tuning AWS rules for SAML provider updates and assumed roles via STS
* fixed mitre mapping
* adjusted new terms and added user ID to query
* reverting new terms value change
* adding non-ecs to new term checks
* fixing mitre mapping
* Update rules/integrations/aws/privilege_escalation_sts_temp_creds_via_assume_role.toml
* reverting file removal to add diff changes
* changeing rule contents
* reverting rule changes
* added rule contents
* changed file name
* linted
* reverting lint
2024-08-20 11:53:46 -04:00
Jonhnathan
4c44f98cd6
[Rule Tuning] LSASS Process Access via Windows API ( #3975 )
...
* [Rule Tuning] LSASS Process Access via Windows API
* Update credential_access_lsass_openprocess_api.toml
* Update credential_access_lsass_openprocess_api.toml
2024-08-14 11:42:18 -03:00
Terrance DeJesus
3500c3db15
[Rule Tuning] Tuning Direct Outbound SMB Connection ( #3485 )
...
* tuning 'Direct Outbound SMB Connection'
* removed lolbas references
* reverted EQL function due to escaped characters in substring match
* Update rules/windows/lateral_movement_direct_outbound_smb_connection.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* Update rules/windows/lateral_movement_direct_outbound_smb_connection.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* reverted internal address exclusion; adjusted rule name and description
* removing min-stack
* Update rules/windows/lateral_movement_direct_outbound_smb_connection.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
2024-08-13 13:53:07 -04:00
Terrance DeJesus
74d8186aeb
[Rule Tuning] Tuning MsBuild Making Network Connections ( #3482 )
...
* tuning 'MsBuild Making Network Connections'
* added performance note; added comments in query
* adjusted array search
* linting
* updated query logic;updated date
* updated query logic
* fixed query error
* changed query logic
* removing min-stack
* reverting change
* updated network sequence event
2024-08-13 12:55:08 -04:00
Ruben Groenewoud
c58ae92dd1
[New Rule] Dynamic Linker Creation or Modification ( #3969 )
...
* [New Rule] Dynamic Linker Creation or Modification
* Removed new line from description
* Update rules/linux/defense_evasion_dynamic_linker_file_creation.toml
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com >
* Update defense_evasion_dynamic_linker_file_creation.toml
---------
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com >
2024-08-10 10:25:55 +02:00
Ruben Groenewoud
55e81c1169
[Rule Tuning] Attempt to Disable IPTables or Firewall ( #3972 )
...
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com >
2024-08-10 10:18:11 +02:00
Ruben Groenewoud
b6ffb10ab2
[Rule Tuning] System Log File Deletion ( #3970 )
2024-08-10 10:04:56 +02:00
Ruben Groenewoud
6e3e5f6373
[Rule Tuning] Potential Disabling of AppArmor ( #3971 )
...
* [Rule Tuning] Potential Disabling of AppArmor
* Update query
---------
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com >
2024-08-10 09:51:45 +02:00
Jonhnathan
8950d33539
[Rule Tuning] Suspicious PrintSpooler Service Executable File Creation ( #3964 )
...
* [Rule Tuning] Suspicious PrintSpooler Service Executable File Creation
* .
* ++
2024-08-09 13:23:16 -03:00
Jonhnathan
20f4242566
[Rule Tuning] Simple KQL to EQL Conversion ( #3948 )
...
* [Rule Tuning] Simple KQL to EQL Conversion
* Update rules/windows/persistence_msds_alloweddelegateto_krbtgt.toml
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
* Update privilege_escalation_group_policy_iniscript.toml
---------
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
2024-08-09 13:11:27 -03:00
Jonhnathan
fcc8aaaf63
[Rule Tuning] Fix missing Winlogbeat index ( #3976 )
...
* [Rule Tuning] Fix missing Winlogbeat index
* bump
2024-08-09 12:46:33 -03:00
Jonhnathan
207dc55ede
[Rule Tuning] Windows File-based Rules Tuning ( #3963 )
...
* [Rule Tuning] Windows File-based Rules Tuning
* Update credential_access_lsass_memdump_file_created.toml
* .
2024-08-09 12:26:58 -03:00
Jonhnathan
f5069763b6
[Rule Tuning] Add System tag to DRs ( #3968 )
...
* [Rule Tuning] Add System tag to DRs
* bump
2024-08-09 11:14:33 -03:00
Terrance DeJesus
698e830f9f
[Rule Tuning] Removing Minimum Stack Compatibility ( #3974 )
...
* removing min-stack
* removing min-stack
* updating date
2024-08-08 11:47:48 -04:00
Terrance DeJesus
fe9ba15a2a
[Rule Tuning] Tuning Suspicious HTML File Creation for Performance ( #3480 )
...
* tuning 'Suspicious HTML File Creation'
* TOML lint; reverted EQL function checks
* updated date
2024-08-08 11:12:55 -04:00
Jonhnathan
25ad765acb
[Rule Tuning] Include winlogbeat index in sysmon-related rules ( #3966 )
2024-08-08 12:02:23 -03:00
Terrance DeJesus
ff3d51721a
[Rule Tuning] Tuning Persistent Scripts in the Startup Directory ( #3479 )
...
* tuning 'Persistent Scripts in the Startup Directory'
* adjusted query logic; added note about performance
* adjusted query logic
* adjusted query logic; added note about performance
* removed newline
* adjusted query logic to be more inclusive
* adjusted query
* adjusted query to leave wildcard and substring searches towards the end
* TOML lint
* Update rules/windows/persistence_startup_folder_scripts.toml
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
* adjusted note; removed setup
* adjusted note; removed setup
* Update rules/windows/persistence_startup_folder_scripts.toml
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
* Update rules/windows/persistence_startup_folder_scripts.toml
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
* updated date
---------
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com >
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com >
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2024-08-06 18:42:53 -04:00
shashank-elastic
2ee5ae1f19
Fix Version Bump for Related Integrations ( #3960 )
2024-08-06 18:48:24 +05:30
Jonhnathan
a6f1aa6fd7
[Rule Tuning] Windows Registry Rules Tuning - 2 ( #3958 )
2024-08-06 17:15:08 +05:30
Jonhnathan
9b85079da1
[Rule Tuning] Windows Registry Rules Tuning - 1 ( #3957 )
2024-08-06 17:05:17 +05:30