Commit Graph

553 Commits

Author SHA1 Message Date
shashank-elastic 1ce072a4e5 Prep for Release 9.3 (#5548) 2026-01-12 21:07:07 +05:30
Ruben Groenewoud 11769a4be3 [New/Tuning] Several New Linux Rules (#5531)
* [New/Tuning] Several New Linux Rules

* Update collection_potential_video_recording_or_screenshot_activity.toml

* Update discovery_dmidecode_system_discovery.toml

* Update rules/linux/collection_potential_audio_recording_activity.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

* Update exfiltration_potential_wget_data_exfiltration.toml

* [New Rule] Linux User or Group Deletion

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-01-08 16:00:50 +01:00
Ruben Groenewoud ee936cb154 [New Rule] Potential Password Spraying Attack via SSH (#5515)
* [New Rule] Potential Password Spraying Attack via SSH

* ++

* Update rules/linux/credential_access_potential_password_spraying_attack.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update credential_access_potential_password_spraying_attack.toml

* Update credential_access_potential_password_spraying_attack.toml

* Change time bucket duration from 1 to 5 minutes

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2026-01-08 13:43:52 +01:00
Ruben Groenewoud 1c1632e0b9 [Rule Tuning] Linux DR Tuning - 3 (#5483)
* [Rule Tuning] Linux DR Tuning - 3

* Update rules/linux/credential_access_aws_creds_search_inside_container.toml

* Adjust thresholds and expand event action handling

* Update credential_access_potential_linux_ssh_bruteforce_external.toml

* Increase threshold for SSH brute force detection

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Update credential_access_ssh_backdoor_log.toml

Removed 'auditbeat-*' from the index list.

* Refactor credential access rule for clarity

Removed redundant event.action expansion and filtering logic.

* Refactor ESQL query for SSH brute force detection

Refactor ESQL query to improve readability and maintainability by moving the event.action expansion and filtering logic.

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Update credential_access_potential_successful_linux_ftp_bruteforce.toml

* Update credential_access_potential_successful_linux_rdp_bruteforce.toml

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Add time window truncation to bruteforce rule

* Add time window truncation to SSH brute force rule

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Update SSH brute force detection rule to EQL

* Update CIDR match conditions for SSH brute force rule

* Update EQL query for SSH brute force detection
2026-01-08 13:32:43 +01:00
Ruben Groenewoud e1698890a4 [Rule Tuning] Linux DR Tuning - 7 (#5504)
* [Rule Tuning] Linux DR Tuning - 7

* Update execution_egress_connection_from_entrypoint_in_container.toml

* Update execution_kubernetes_direct_api_request_via_curl_or_wget.toml

* Update rules/linux/execution_perl_tty_shell.toml

* Update execution_perl_tty_shell.toml

* Update rules/linux/execution_unix_socket_communication.toml

* Update execution_file_made_executable_via_chmod_inside_container.toml

* Remove duplicate Crowdstrike data source entry

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 11:10:46 +01:00
Ruben Groenewoud ccd3f70ee8 [Rule Tuning] Linux DR Tuning - 6 (#5497)
* [Rule Tuning] Linux DR Tuning - 6

* Fix syntax error in discovery_esxi_software_via_grep.toml

* Update discovery_pam_version_discovery.toml

* Update discovery_virtual_machine_fingerprinting.toml

* Revise investigation title for kernel module enumeration

Updated the title of the investigation section to clarify focus on unusual kernel module enumeration.

* Update discovery_port_scanning_activity_from_compromised_host.toml

* Enhance ESQL query for subnet scanning detection

Updated ESQL query to include additional fields and conditions for better analysis of connection attempts from compromised hosts.

* Remove Elastic Endgame data source from rule

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 10:45:32 +01:00
Ruben Groenewoud c2747b0b29 [Rule Tuning] Linux DR Tuning - 4 (#5484)
* [Rule Tuning] Linux DR Tuning - 4

* Update defense_evasion_file_mod_writable_dir.toml

* Update command_and_control_frequent_egress_netcon_from_sus_executable.toml

* Remove duplicate host.name entry in TOML file

* Fix formatting in defense_evasion_file_mod_writable_dir.toml

* Update command_and_control_frequent_egress_netcon_from_sus_executable.toml

* Add additional fields to base64 decoding activity rule

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 10:11:05 +01:00
Ruben Groenewoud b13afcdeaa [Rule Tuning] Linux DR Tuning - 8 (#5505)
* [Rule Tuning] Linux DR Tuning - 8

* Revise investigation guide for THC tool downloads

Updated investigation guide to reflect THC tool instead of SSH-IT worm. Enhanced description for clarity.

* Update exfiltration_unusual_file_transfer_utility_launched.toml

* Refine ESQL query for brute force malware detection

Updated the query to include additional fields and modified the conditions for filtering events.

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 10:01:11 +01:00
Ruben Groenewoud d968f62a5a [Rule Tuning] Linux DR Tuning - 10 (#5510)
* [Rule Tuning] Linux DR Tuning - 10

* Update persistence_udev_rule_creation.toml

* Refactor ESQL query for Linux process events

* Refactor query in persistence_web_server_sus_command_execution rule

Removed unnecessary fields from the query and added new fields for event dataset and data stream namespace.

* Update persistence_systemd_netcon.toml

* Update persistence_web_server_sus_child_spawned.toml

* Refactor process.parent.name conditions in TOML file

* Update persistence_web_server_unusual_command_execution.toml

* Update persistence_web_server_unusual_command_execution.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 09:32:57 +01:00
Ruben Groenewoud 80ee91b0f2 [Rule Tuning] Linux DR Tuning - 11 (#5511)
* [Rule Tuning] Linux DR Tuning - 11

* Update privilege_escalation_potential_suid_sgid_exploitation.toml

* Update rules/linux/privilege_escalation_suspicious_uid_guid_elevation.toml

* Update privilege_escalation_docker_escape_via_nsenter.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 16:31:13 +01:00
Ruben Groenewoud a973da1a6b [Rule Tuning] Linux DR Tuning - 9 (#5508)
* [Rule Tuning] Linux DR Tuning - 9

* Update rules/linux/persistence_apt_package_manager_file_creation.toml

* Fix formatting in persistence_boot_file_copy.toml

* Update persistence_chkconfig_service_add.toml

* Change user.id values to string format in TOML

* Fix condition for Java process working directory

* Fix logical operator in OpenSSL passwd hash rule

* Fix syntax for working_directory check

* Fix condition for original file name check

* Update persistence_web_server_unusual_command_execution.toml

* Add cloud CLI tools to persistence rules

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 16:18:38 +01:00
Ruben Groenewoud 473df70fbb [Rule Tuning] Linux DR Tuning - 5 (#5494)
* [Rule Tuning] Linux DR Tuning - 5

* Fix query syntax for shared object detection rule

* Update defense_evasion_kernel_module_removal.toml

* Fix condition for process working directory check

* Refactor query in defense_evasion_symlink_binary rule

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 15:55:06 +01:00
Ruben Groenewoud 066096f766 [Rule Tuning] Linux DR Tuning - 2 (#5481)
* [Rule Tuning] Linux DR Tuning - 2

* Update command_and_control_linux_proxychains_activity.toml
2026-01-06 17:00:55 +01:00
Ruben Groenewoud 019c263ed2 [Rule Tuning] Linux DR Tuning - 1 (#5122)
* [Rule Tuning] Linux DR Tuning - 1

* Added integrations

* Update command_and_control_git_repo_or_file_download_to_sus_dir.toml

* Update collection_linux_clipboard_activity.toml

* Update collection_linux_clipboard_activity.toml

* Update rules/linux/command_and_control_aws_cli_endpoint_url_used.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update collection_linux_clipboard_activity.toml

* Update rules/linux/command_and_control_aws_cli_endpoint_url_used.toml

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2026-01-06 16:18:04 +01:00
Ruben Groenewoud 5bc834bfc6 [Rule Tuning] Shared Object Created or Changed by Previously Unknown … (#5469)
* [Rule Tuning] Shared Object Created or Changed by Previously Unknown Process

* Update rules/linux/persistence_shared_object_creation.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2025-12-19 14:32:31 +01:00
Samirbous b996a29451 [Tuning] Diverse Rules Tuning (#5482)
* [Tuning] Diverse Rules Tuning

* Update persistence_shell_profile_modification.toml

* Update defense_evasion_ml_suspicious_windows_event_low_probability.toml

* Update defense_evasion_ml_suspicious_windows_event_high_probability.toml

* Update defense_evasion_ml_suspicious_windows_event_high_probability.toml

* ++

* Update persistence_suspicious_ssh_execution_xzbackdoor.toml

* Update persistence_suspicious_ssh_execution_xzbackdoor.toml

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Update persistence_shell_profile_modification.toml

* Revert "Update credential_access_potential_linux_ssh_bruteforce_internal.toml"

This reverts commit bad889a30d3f4a028de2b6624307f75b279a205b.

* Update persistence_web_server_sus_destination_port.toml

* Update defense_evasion_ml_suspicious_windows_event_high_probability.toml

* Update defense_evasion_ml_suspicious_windows_event_low_probability.toml

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2025-12-18 15:30:12 +00:00
Ruben Groenewoud a16307ecff [New/Tuning] Linux Tunneling Rules (#5452) 2025-12-15 10:44:08 +01:00
Ruben Groenewoud 294e8292b8 [Rule Tuning] Security File Access via Common Utilities (#5453)
* [Rule Tuning] Security File Access via Common Utilities

* ++

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2025-12-15 10:25:36 +01:00
Samirbous 3726611b93 [Tuning] Top Noisy Rules (#5449)
* [Tuning] Windows BruteForce Rules Tuning

#1 Multiple Logon Failure from the same Source Address: converted to ES|QL and raised the threshold to 100 failed auths, alert quality should be better since it aggregates all failed auths info into one alert vs multiple EQL matches. (expected reduction more than 50%)

#2 Privileged Account Brute Force - coverted to ESQL and set the threshold to 50 in a minute. this should drop noise volume by more than 50%.

* ++

* Update execution_shell_evasion_linux_binary.toml

* Update execution_shell_evasion_linux_binary.toml

* Update defense_evasion_indirect_exec_forfiles.toml

* Update lateral_movement_remote_file_copy_hidden_share.toml

* Update lateral_movement_remote_file_copy_hidden_share.toml

* Update persistence_service_windows_service_winlog.toml

* Update credential_access_lsass_openprocess_api.toml

* Update persistence_suspicious_scheduled_task_runtime.toml

* Update impact_hosts_file_modified.toml

* Update defense_evasion_process_termination_followed_by_deletion.toml

* Update rules/windows/credential_access_lsass_openprocess_api.toml

* Update rules/windows/credential_access_bruteforce_admin_account.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/windows/credential_access_lsass_openprocess_api.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/windows/credential_access_bruteforce_multiple_logon_failure_same_srcip.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update credential_access_lsass_openprocess_api.toml

* Update impact_hosts_file_modified.toml

* Update credential_access_dollar_account_relay.toml

* Update credential_access_new_terms_secretsmanager_getsecretvalue.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2025-12-12 14:28:12 +00:00
Ruben Groenewoud 2b1a4acae0 [Rule Tuning] Suspicious Network Connection via systemd (#5432) 2025-12-12 13:28:47 +01:00
Ruben Groenewoud d16ee304d5 [Rule Tuning] Unusual Web Server Command Execution (#5450)
* [Rule Tuning] Unusual Web Server Command Execution

* ++
2025-12-12 13:01:12 +01:00
shashank-elastic 58a514340b December Schema Refresh (#5420) 2025-12-08 22:07:46 +05:30
Ruben Groenewoud 7aacebba02 [Rule Tuning] Creation or Modification of Pluggable Authentication Module or Configuration (#5421) 2025-12-08 18:54:23 +05:30
Terrance DeJesus 7a884ebe2b [Rule Tuning] Node.js Pre or Post-Install Script Execution to Cross-Platform (#5403)
* [Rule Tuning] Node.js Pre or Post-Install Script Execution to Cross-Platform
Fixes #5402

* removed rule from Linux directory

* adjusted mitre for unit tests

* Update rules/cross-platform/execution_nodejs_pre_or_post_install_script_execution.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* expanding to S1

* adding integration metadata

* Add 'start' action to Node.js install script detection

* Update rules/cross-platform/execution_nodejs_pre_or_post_install_script_execution.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2025-12-04 09:07:12 -05:00
Ruben Groenewoud 4fc6aa9a35 [New Rule] Unusual Web Server Command Execution (#5392)
* [New Rule] Unusual Web Server Command Execution

* ++

* Add node and java to unusual command execution rule
2025-12-03 16:29:08 +01:00
Ruben Groenewoud f098336ff9 [New Rule] Pod or Container Creation with Suspicious Command-Line (#5379)
* [New Rule] Pod or Container Creation with Suspicious Command-Line

* Added container domain tag

* Update execution_suspicious_pod_or_container_creation_command_execution.toml

* Refine EQL query for suspicious pod/container creation

* Update rules/linux/execution_suspicious_pod_or_container_creation_command_execution.toml

* Update execution_suspicious_pod_or_container_creation_command_execution.toml

* Update process name conditions for suspicious execution
2025-12-03 16:14:33 +01:00
Ruben Groenewoud d3745c21a7 [Rule Tuning] Python Startup Hook Rules (#5400) 2025-12-03 15:13:26 +01:00
Samirbous 02979fec68 [New/Tuning] NPM Shai-Hulud coverage (#5368)
* [New/Tuning] NPM Shai-Hulud coverage

https://socket.dev/blog/shai-hulud-strikes-again-v2

* Update command_and_control_curl_wget_spawn_via_nodejs_parent.toml

* Update command_and_control_curl_wget_spawn_via_nodejs_parent.toml

* Update command_and_control_curl_wget_spawn_via_nodejs_parent.toml

* Update credential_access_trufflehog_execution.toml

* Update credential_access_trufflehog_execution.toml

* Update credential_access_trufflehog_execution.toml

* Update rules/cross-platform/command_and_control_curl_wget_spawn_via_nodejs_parent.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/cross-platform/command_and_control_curl_wget_spawn_via_nodejs_parent.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/cross-platform/command_and_control_curl_wget_spawn_via_nodejs_parent.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/cross-platform/execution_register_github_actions_runner.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/cross-platform/execution_via_github_actions_runner.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Create initial_access_github_register_self_hosted_runner.toml

* Update initial_access_github_register_self_hosted_runner.toml

* Update initial_access_github_register_self_hosted_runner.toml

* Update initial_access_github_register_self_hosted_runner.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2025-12-02 10:57:12 +00:00
Ruben Groenewoud 4a042d1a22 [Rule Tuning] File Deletion via Shred (#5381)
* [Rule Tuning] File Deletion via Shred

* ++

* Update integrations and query for file deletion rule
2025-12-02 10:13:29 +01:00
Ruben Groenewoud a6569a824f [Rule Tuning] At Job Created or Modified (#5378) 2025-12-02 09:55:41 +01:00
Terrance DeJesus d510d32730 [New Rule] Webshell Deployed via Apache Struts CVE-2023-50164 Exploitation (#5345)
* [New Rule] Webshell Deployed via Apache Struts CVE-2023-50164 Exploitation
Fixes #5344

* Update rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml

* added investigation guide

* removed vulnerability tag

* Update rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml

* Update rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml

* Update rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml

* Update rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2025-11-24 15:08:39 -05:00
shashank-elastic 5386345ca7 Add Investigation Guides for Rules (#5357) 2025-11-25 01:08:15 +05:30
Ruben Groenewoud 726b3c47ce [New Rule] Proxy Shell Execution via Busybox (#5348)
* [New Rule] Proxy Shell Execution via Busybox

* Update defense_evasion_busybox_indirect_shell_spawn.toml
2025-11-24 15:51:39 +01:00
Ruben Groenewoud 7fc895ee38 [New Rule] Curl or Wget Egress Network Connection via LoLBin (#5347)
* [New Rule] Curl or Wget Egress Network Connection via LoLBin

* Update defense_evasion_curl_or_wget_executed_via_lolbin.toml
2025-11-24 15:38:38 +01:00
Ruben Groenewoud fe642a879a [Rule Tuning] Remote File Creation in World Writeable Directory (#5304)
* [Rule Tuning] Remote File Creation in World Writeable Directory

* Update lateral_movement_remote_file_creation_world_writeable_dir.toml
2025-11-18 09:24:03 +01:00
Ruben Groenewoud 4c984b0ed5 [Rule Tuning] Potential Execution via XZBackdoor (#5318) 2025-11-17 09:50:33 +01:00
shashank-elastic e938ecf41a Refresh Manifest and Schemas November Update (#5298) 2025-11-11 18:04:20 +05:30
Ruben Groenewoud 1280e0854a [New Rule] Potential SSH Password Grabbing via strace (#5294) 2025-11-11 09:35:34 +01:00
Ruben Groenewoud 57facddd32 [Rule Tuning] File Transfer or Listener Established via Netcat (#5223)
* [Rule Tuning] File Transfer or Listener Established via Netcat

* Formatting

* Update execution_file_transfer_or_listener_established_via_netcat.toml

* Update execution_file_transfer_or_listener_established_via_netcat.toml

* Add timestamp override to netcat execution rule

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2025-11-10 16:11:16 +01:00
Ruben Groenewoud 37e18af7a5 [Rule Tuning] Adds Crowdstrike Compatibility to Linux Process Rules (#5232)
* First batch

* Second batch

* Batch 2
2025-11-10 16:03:39 +01:00
Ruben Groenewoud bb38e2558a [New Rule] Privilege Escalation via SUID/SGID Proxy Execution (#5266)
* [New Rule] Privilege Escalation via SUID/SGID Proxy Execution

* Update privilege_escalation_potential_suid_sgid_proxy_execution.toml

* Update rules/linux/privilege_escalation_potential_suid_sgid_proxy_execution.toml
2025-11-10 11:41:38 +01:00
Ruben Groenewoud a3cb002ef4 [Rule Tuning] Potential CVE-2025-32463 Sudo Chroot Execution Attempt (#5227) 2025-10-17 09:29:17 +02:00
Samirbous 574c8d67ea [Tuning] Simple HTTP Web Server Connection (#5209)
* Update persistence_simple_web_server_connection_accepted.toml

* Update persistence_simple_web_server_connection_accepted.toml
2025-10-13 15:01:38 +01:00
shashank-elastic 3397b7e707 Monthly Schema Updates (#5187) 2025-10-06 21:39:14 +05:30
Ruben Groenewoud 949cb751ca [New Rule] Attempt to Clear Logs via Journalctl (#5170) 2025-10-06 13:52:25 +02:00
Terrance DeJesus 1833d2e7a0 tuning 'Unusual Instance Metadata Service (IMDS) API Request' (#5163)
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2025-10-06 13:19:22 +02:00
Ruben Groenewoud 25880e73da [New Rule] Potential CVE-2025-41244 vmtoolsd LPE Exploitation Attempt (#5166)
* [New Rule] Potential CVE-2025-41244 vmtoolsd LPE Exploitation Attempt

* Added additional 3rd party EDR compatibility

* Update privilege_escalation_cve_2025_41244_vmtoolsd_lpe.toml

* Add crowdstrike compatibility

* ++

* Update privilege_escalation_cve_2025_41244_vmtoolsd_lpe.toml
2025-10-06 13:01:57 +02:00
Ruben Groenewoud be3af09d9d [Rule Tuning] Misc. Linux Community Tunings (#5160)
* [Rule Tuning] Misc. Linux Community Tunings

* ++

* Fix query syntax in execution_unusual_path_invocation rule

* Refactor process.parent conditions for clarity
2025-10-06 12:05:59 +02:00
Ruben Groenewoud 5d69eb19ba [New Rules] Potential CVE-2025-32463 Exploitation (#5169)
* [New Rules] Potential CVE-2025-32463 Exploitation

* Update chroot rule logic

* Added IGs

* Update rules/linux/privilege_escalation_cve_2025_32463_nsswitch_file_creation.toml

* Update rules/linux/privilege_escalation_cve_2025_32463_nsswitch_file_creation.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2025-10-01 11:25:22 +02:00
Ruben Groenewoud 8319b7f5d8 [Rule Tuning] Potential Port Scanning Activity from Compromised Host (#5161)
* [Rule Tuning] Potential Port Scanning Activity from Compromised Host

* Update rules/linux/discovery_port_scanning_activity_from_compromised_host.toml

* Update port scanning detection query

Refine query to include source IP and limit destination port range.

* Update discovery_port_scanning_activity_from_compromised_host.toml

* Update query in discovery port scanning rule

* Update discovery_port_scanning_activity_from_compromised_host.toml
2025-09-30 16:35:41 +02:00