Commit Graph

125 Commits

Author SHA1 Message Date
shashank-elastic d2502c7394 Prep for Release 8.17 (#4256) 2024-11-07 23:53:04 +05:30
Terrance DeJesus 1c9177ef6f [New Rule] Adding Coverage for AWS IAM Create User via Assumed Role on EC2 Instance (#4244)
* adding new rule 'AWS IAM Create User via Assumed Role on EC2 Instance'

* adding false-positive note

* changed file name

* added event.provider

* tuned 'AWS EC2 Instance Interaction with IAM Service' to be BBR

* updated query

* added BBR tag

* moved rule to BBR

* fixed BBR query

* moved rule to BBR
2024-11-06 11:28:41 -05:00
shashank-elastic 123e090e7d Fix Minstack version for windows integration - Pahse 2 (#4216) 2024-10-28 20:25:02 +05:30
shashank-elastic 92fe46b8ff Fix Minstack version for windows integration (#4214) 2024-10-28 19:28:10 +05:30
shashank-elastic 275c7288a3 Add testcase to check for related_integrations based on index (#4096) 2024-10-22 00:17:30 +05:30
Ruben Groenewoud 601254488b [BBR Promotion] Q2 Linux BBR Promotion (#4172)
* [BBR Promotion] Q2 Linux BBR Promotion

* Update collection_linux_clipboard_activity.toml

* Update defense_evasion_creation_of_hidden_files_directories.toml
2024-10-18 16:55:09 +02:00
Ruben Groenewoud 592ad0fe9a [Rule Tuning] Q2 Linux DR Tuning - BBR (#4171)
* [Rule Tuning] Q2 Linux DR Tuning - BBR

* Update discovery_kernel_module_enumeration_via_proc.toml

* Update discovery_linux_modprobe_enumeration.toml

* Update discovery_linux_sysctl_enumeration.toml

* Update discovery_potential_memory_seeking_activity.toml

* Update discovery_potential_memory_seeking_activity.toml
2024-10-18 16:45:23 +02:00
Mika Ayenson b80d8342d6 [Docs | Rule Tuning] Add blog references to rules (#4097)
* [Docs | Rule Tuning] Add blog references to rules

* Apply suggestions from code review

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Apply suggestions from code review

* Update google_workspace blog references

* add okta blog references

* Update dates

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2024-09-25 15:19:20 -05:00
Jonhnathan c3160b9279 [New Rule] PowerShell Script with Windows Defender Tampering Capabilities (#4075)
* [New Rule] PowerShell Script with Windows Defender Tampering Capabilities

* .
2024-09-13 11:51:19 -03:00
shashank-elastic a53f7d55a3 Testcase to check if Rule Type: BBR tag is present for all BBR rules (#4048) 2024-09-02 21:29:31 +05:30
Ruben Groenewoud 162b4e7be8 [New Rule] Access Control List Modification via setfacl (#4009)
* [New BBR] Access Control List Modification via setfacl

* added reference

* Update rules_building_block/defense_evasion_acl_modification_via_setfacl.toml

Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

---------

Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>
2024-09-01 09:58:50 +02:00
Jonhnathan f5069763b6 [Rule Tuning] Add System tag to DRs (#3968)
* [Rule Tuning] Add System tag to DRs

* bump
2024-08-09 11:14:33 -03:00
Jonhnathan 25ad765acb [Rule Tuning] Include winlogbeat index in sysmon-related rules (#3966) 2024-08-08 12:02:23 -03:00
Jonhnathan a6f1aa6fd7 [Rule Tuning] Windows Registry Rules Tuning - 2 (#3958) 2024-08-06 17:15:08 +05:30
Jonhnathan 392e813e7a [Rule Tuning] Microsoft IIS Service Account Password Dumped (#3935) 2024-08-02 16:37:45 -03:00
shashank-elastic f3b0dc1954 Prep for next release 8.16 (#3919) 2024-07-24 11:19:56 -04:00
eric-forte-elastic baee89de9b Revert "Prep for next release 8.16 (#3914)"
This reverts commit 4245a815d2.
2024-07-23 14:06:04 -04:00
shashank-elastic 4245a815d2 Prep for next release 8.16 (#3914)
* Prep for Release 8.16

* Add subscription

* Remove double subscription

* Formatting

* Formatting

* Revert Beaconing rules minstack and lock version
2024-07-23 13:04:03 -04:00
Mika Ayenson 03c99d22d3 Revert "Prep for Release 8.16 (#3913)"
This reverts commit 01135085f6.
2024-07-23 09:50:04 -05:00
shashank-elastic 01135085f6 Prep for Release 8.16 (#3913) 2024-07-23 09:42:26 -05:00
Jonhnathan 6bc1913473 [Rule Tuning] PowerShell Rules (#3903) 2024-07-22 08:39:40 -03:00
Jonhnathan 125084ceec [Rule Tuning] Improve Compatibility in WIndows BBR Detection Rules (#3841)
* [Rule Tuning] Improve Windows BBR Compatibility

* Update defense_evasion_services_exe_path.toml
2024-07-01 10:41:00 -03:00
Isai a8ce53f82f [New BBR] AWS RDS DB Snapshot Created (#3828)
* [New BBR] AWS RDS DB Snapshot Created

...

* Squashed commit of the following:

commit 6746a421c4
Author: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
Date:   Tue Jun 25 16:14:28 2024 +0200

    [New Rules] Yum Plugin Creation / Discovery (#3820)

    * [New Rules] Yum Plugin Creation / Discovery

    * Update discovery_yum_plugin_detection.toml

    * Update and rename discovery_yum_plugin_detection.toml to discovery_yum_dnf_plugin_detection.toml

commit 632e169f7a
Author: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Date:   Tue Jun 25 09:35:36 2024 -0400

    [Hunt Tuning] Add Descriptions, Collapse Queries and Re-Generate Docs (#3791)

    * add description to hunting schema; change queries to be a list

    * update createremotethreat by process hunt

    * update dll hijack and masquerading as MSFT library

    * remove sysmon specific dDLL hijack via masquerading MSFT library

    * updated Masquerading Attempts as Native Windows Binaries

    * updates Rare DLL Side-Loading by Occurrence

    * updates Rare LSASS Process Access Attempts

    * update DNS Queries via LOLBins with Low Occurence Frequency

    * updated Low Occurrence of Drivers Loaded on Unique Hosts

    * updates Excessive RDP Network Activity by Host and User

    * updates Excessive SMB Network Activity by Process ID

    * updated Executable File Creation by an Unusual Microsoft Binary

    * Frequency of Process Execution and Network Logon by Source Address

    * updates Frequency of Process Execution and Network Logon by Source Address

    * updated Execution via Remote Services by Client Address

    * updated Startup Execution with Low Occurrence Frequency by Unique Host

    * updated Low Frequency of Process Execution via WMI by Unique Agent

    * updated Low Frequency of Process Execution via Windows Scheduled Task by Unique Agent

    * updated Low Occurence of Process Execution via Windows Services with Unique Agent

    * Updated High Count of Network Connection Over Extended Period by Process

    * update Libraries Loaded by svchost with Low Occurrence Frequency

    * updated Microsoft Office Child Processes with Low Occurrence Frequency by Unique Agent

    * updated Network Discovery via Sensitive Ports by Unusual Process

    * updated PE File Transfer via SMB_Admin Shares by Agent or User

    * updated Persistence via Run Key with Low Occurrence Frequency

    * updates Persistence via Startup with Low Occurrence Frequency by Unique Host

    * updates "Persistence via Run Key with Low Occurrence Frequency"; adjusted file names to remove data source

    * updates "Low Occurrence of Suspicious Launch Agent or Launch Daemon"

    * updates "Egress Network Connections with Total Bytes Greater than Threshold"

    * updates "Rundll32 Execution Aggregated by Command Line"

    * updates "Scheduled tasks Creation by Action via Registry"

    * updates "Scheduled Tasks Creation for Unique Hosts by Task Command"

    * updates "Suspicious Base64 Encoded Powershell Command"

    * updates "Suspicious DNS TXT Record Lookups by Process"

    * updates "Unique Windows Services Creation by Service File Name"

    * Updates "Unique Windows Services Creation by Service File Name"

    * updates "Windows Command and Scripting Interpreter from Unusual Parent Process"

    * updates "Windows Logon Activity by Source IP"

    * updates "Suspicious Network Connections by Unsigned Mach-O"

    * updates LLM hunting queries

    * re-generated markdown files; updated generate markdown py file

    * updated test_hunt_data

    * Update hunting/macos/queries/suspicious_network_connections_by_unsigned_macho.toml

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

    * Update hunting/windows/queries/drivers_load_with_low_occurrence_frequency.toml

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

    * Update hunting/windows/queries/domain_names_queried_via_lolbins_and_with_low_occurence_frequency.toml

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

    * Update hunting/windows/queries/excessive_rdp_network_activity_by_source_host_and_user.toml

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

    * Update hunting/windows/queries/excessive_rdp_network_activity_by_source_host_and_user.toml

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

    * updated missing integrations

    * updated MD docs according to recent hunting changes

    * Update hunting/windows/queries/executable_file_creation_by_an_unusual_microsoft_binary.toml

    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

    * Update hunting/windows/queries/detect_rare_dll_sideload_by_occurrence.toml

    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

    * Update hunting/windows/queries/detect_masquerading_attempts_as_native_windows_binaries.toml

    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

    * Update hunting/windows/queries/detect_dll_hijack_via_masquerading_as_microsoft_native_libraries.toml

    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

    * Update hunting/llm/queries/aws_bedrock_dos_resource_exhaustion_detection.toml

    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

    * added enrichment policy link to rule

    * Update hunting/windows/docs/execution_via_windows_management_instrumentation_by_occurrence_frequency_by_unique_agent.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/windows_command_and_scripting_interpreter_from_unusual_parent.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/windows_command_and_scripting_interpreter_from_unusual_parent.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/rundll32_execution_aggregated_by_cmdline.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/microsoft_office_child_processes_with_low_occurrence_frequency.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/microsoft_office_child_processes_with_low_occurrence_frequency.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/queries/execution_via_windows_management_instrumentation_by_occurrence_frequency_by_unique_agent.toml

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/queries/execution_via_windows_management_instrumentation_by_occurrence_frequency_by_unique_agent.toml

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/index.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/docs/execution_via_network_logon_by_occurrence_frequency_by_top_source_ip.md

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    * Update hunting/windows/queries/execution_via_network_logon_by_occurrence_frequency_by_top_source_ip.toml

    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

    ---------

    Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>
    Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
    Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

commit 6f43d1f535
Author: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
Date:   Tue Jun 25 17:58:37 2024 +0530

    Lock versions for releases: 8.9,8.10,8.11,8.12,8.13,8.14 (#3821)

commit 0726ce41bf
Author: James Valente <65730960+jvalente-salemstate@users.noreply.github.com>
Date:   Tue Jun 25 07:22:07 2024 -0400

    Tune rule to exclude forwarded events. (#3790)

    Events containing "forwarded" as a tag may include host information
    that is not related to the host running elastic agent. This triggers
    false positive alerts. Examples include Entity Analytics integrations,
    Palo Alto GlobalProtect activity, and M365 Defender device events.

    Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

commit 2708a89f20
Author: Isai <59296946+imays11@users.noreply.github.com>
Date:   Tue Jun 25 00:11:48 2024 -0400

    [New Rule] AWS IAM User Created Access Keys for Another User (#3788)

    * [New Rule] AWS IAM User Created Access Keys for Another User

    ...

    * updated min_stack and removed index field

    * reversed tactic order

    * added AWS documentation as reference

    * Apply suggestions from code review

    updated_date, query format change, removed keep from query

commit da8f3e4880
Author: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Date:   Fri Jun 21 13:11:23 2024 -0400

    [New Rule] Okta Credential Stuffing and Password Spraying Identification via Source, Device Token and Actor (#3797)

    * adding new rule 'Multiple Okta User Authentication Events with Same Device Token Hash'

    * adding new rule 'Multiple Okta User Authentication Events with Client Address'

    * updating UUIDs

    * removed indexes

    * adding new rule 'High Number of Okta Device Token Cookies Generated for Authentication'

    * added okta outcome reason 'INVALID_CREDENTIALS' to queries

    * updated risk score

    * made all rules low risk score

    * added user session start to rule

    * updated min-stack comments

commit a131e021ed
Author: Mika Ayenson <Mika.ayenson@elastic.co>
Date:   Fri Jun 21 11:05:57 2024 -0500

    Revert "Test case to check updated_date (#3764)"

    This reverts commit 7621a54fcc.

commit 7621a54fcc
Author: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
Date:   Fri Jun 21 18:43:32 2024 +0530

    Test case to check updated_date (#3764)

commit 675cad2ed4
Author: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
Date:   Fri Jun 21 18:29:39 2024 +0530

    Incorrect Integration Index Check (#3794)

* fix technique id
2024-06-27 23:59:33 -04:00
Terrance DeJesus 13140d532c fixed index (#3770) 2024-06-10 09:35:28 -04:00
shashank-elastic e357a2c050 Refresh MITRE Attack v15.1.0 (#3725) 2024-06-04 20:14:58 +05:30
Terrance DeJesus 2e366741dc [New Rule] Building Block - AWS Lambda Function Created or Updated (#3610)
* new rule 'AWS Lambda Function Created or Updated'

* added bbr fields

* updated severity

* Update rules_building_block/execution_aws_lambda_function_updated.toml
2024-06-01 10:40:13 -04:00
Terrance DeJesus 3b994c1133 [New Rule] Building Block Rule - Attempt to Retrieve User Data from AWS EC2 Instance (#3593)
* adding new rule 'Attempt to Retrieve User Data from AWS EC2 Instance'

* Update rules_building_block/discovery_userdata_request_from_ec2_instance.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2024-05-28 11:15:04 -04:00
shashank-elastic 63e91c2f12 Back-porting Version Trimming (#3704) 2024-05-23 00:45:10 +05:30
Mika Ayenson 2c3dbfc039 Revert "Back-porting Version Trimming (#3681)"
This reverts commit 71d2c59b5c.
2024-05-22 13:51:46 -05:00
shashank-elastic 71d2c59b5c Back-porting Version Trimming (#3681) 2024-05-23 00:11:50 +05:30
Terrance DeJesus 608b801088 [New Rule] Building Block Rule - AWS IAM Login Profile Added to User (#3633)
* new rule 'AWS IAM Login Profile Added to User'

* Update rules_building_block/persistence_aws_iam_login_profile_added_to_user.toml

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>

* Update rules_building_block/persistence_aws_iam_login_profile_added_to_user.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

---------

Co-authored-by: Isai <59296946+imays11@users.noreply.github.com>
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2024-05-14 11:10:43 -04:00
Jonhnathan c2d1586270 [Rule Tuning] Windows BBR Promotion (#3577)
* [Rule Tuning] Windows BBR Promotion

* Update non-ecs-schema.json

* Update persistence_netsh_helper_dll.toml

* Update persistence_werfault_reflectdebugger.toml

* Update privilege_escalation_unquoted_service_path.toml

* Update defense_evasion_msdt_suspicious_diagcab.toml

* Update defense_evasion_suspicious_msiexec_execution.toml

* Update discovery_security_software_wmic.toml

* Revert "Update defense_evasion_msdt_suspicious_diagcab.toml"

This reverts commit 0e1f3ea3e18a146c421a5bda784633cca4a2b0c0.

* Revert "Update defense_evasion_suspicious_msiexec_execution.toml"

This reverts commit 4e26a167774ad712d19334a4c2c712cc1d550e7f.

* Revert "Update discovery_security_software_wmic.toml"

This reverts commit d638cec354a46cacab1e62596f4ad939a1d9c32a.

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
2024-04-16 09:28:17 -03:00
Jonhnathan d0dfa479bb [Rule Tuning] Windows BBR Rule Tuning - 1 (#3579)
* [Rule Tuning] Windows BBR Rule Tuning - 1

* Update non-ecs-schema.json

* Update rules_building_block/command_and_control_certutil_network_connection.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update rules_building_block/collection_common_compressed_archived_file.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update defense_evasion_dll_hijack.toml

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2024-04-08 10:38:41 -03:00
Jonhnathan c5addae009 [Rule Tuning] Windows BBR Rule Tuning - 3 (#3581)
* [Rule Tuning] Windows BBR Rule Tuning - 3

* Update non-ecs-schema.json

* Update rules_building_block/execution_settingcontent_ms_file_creation.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update persistence_startup_folder_lnk.toml

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2024-04-08 09:47:48 -03:00
Jonhnathan 1bc59bdc04 [Rule Tuning] Windows BBR Rule Tuning - 2 (#3580)
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2024-04-08 09:34:26 -03:00
Jonhnathan 109e8a85a5 [Rule Tuning] BBR Rule Tuning 1 - Tighten Indexes Edition (#3576)
* [Rule Tuning] BBR Rule Tuning 1 - Tighten Indexes Edition

* Apply suggestions from code review

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update defense_evasion_msdt_suspicious_diagcab.toml

* Update defense_evasion_suspicious_msiexec_execution.toml

* Update discovery_security_software_wmic.toml

* Update rules_building_block/discovery_security_software_wmic.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Endgame tag

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2024-04-08 08:57:33 -03:00
Jonhnathan e125a4e4cf [Rule Tuning] WRITEDAC Access on Active Directory Object (#3583) 2024-04-08 08:43:25 -03:00
Jonhnathan b47b91b9ec [Rule Tuning] Tighten up Indexes of Elastic Defend Windows Rules (#3549)
* [Rule Tuning] Tighten up Indexes of Elastic Defend Windows Rules

* Delete test.pkl

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
2024-04-01 20:45:12 -03:00
Jonhnathan 67ca13c1ce [Rule Tuning] Replace KQL exceptions for Query DSL Exceptions (#3505)
* [Rule Tuning] Replace KQL exceptions for Query DSL Exceptions

* update min_stack

* build out schema in more detail for Filters

* Update detection_rules/rule.py

Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>

* Remove enum for definition

* remove unused import

* remove $state store

* transform state

* add call to super

* add return type hint

* use dataclass metadata

* use Literal type

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
Co-authored-by: Mika Ayenson <Mika.ayenson@elastic.co>
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com>
2024-04-01 17:44:50 -03:00
Jonhnathan f5254f3b5e [Rule Tuning] Improve Compatibility in WIndows Detection Rules - Part 1 (#3501)
* Initial commit

* Date bump
2024-03-13 10:27:44 -03:00
Ruben Groenewoud 9f8638a004 [Tuning] event.action and event.type change (#3495)
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
2024-03-13 10:11:21 +01:00
Jonhnathan 458e67918a [Security Content] Small tweaks on the setup guides (#3308)
* [Security Content] Small tweaks on the setup guides

* Additional Fixes

* Avoid touching deprecated rules
2024-03-11 09:09:40 -03:00
Ruben Groenewoud 3fd0358b73 [Tuning] Linux BBR Tuning - Part 1 (#3469)
* [Tuning] Linux BBR Tuning - Part 1

* [Tuning] Linux BBR Tuning - Part 1

* Update defense_evasion_processes_with_trailing_spaces.toml

* Update defense_evasion_processes_with_trailing_spaces.toml

* One more tuning

* Update collection_linux_suspicious_clipboard_activity.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2024-03-07 17:19:12 +01:00
Ruben Groenewoud 7a0967924c [Tuning] Linux BBR Tuning - Part 2 (#3470)
* [Tuning] Linux BBR Tuning - Part 2

* Update discovery_of_accounts_or_groups_via_builtin_tools.toml

* Update discovery_process_discovery_via_builtin_tools.toml

* Update discovery_hosts_file_access.toml

* Update discovery_system_network_connections.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2024-03-07 12:35:33 +01:00
Ruben Groenewoud 5a80423003 [BBR Promotion] Linux BBR --> DR Promotion (#3472)
* [BBR Promotion] Linux BBR --> DR Promotion

* [BBR Promotion] Linux BBR --> DR Promotion

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2024-03-06 10:49:42 -03:00
Ruben Groenewoud 3484cac7eb [Tuning] Event.dataset removal & Tag Addition (#3451)
* [Tuning] Removed event.dataset and added tag

* [Tuning] Removed event.dataset and added tag

* fixed typo

---------

Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
2024-02-20 15:18:27 +01:00
Jonhnathan 5334601b6f [Rule Tuning] Windows BBR Tuning - 3 (#3382)
* [Rule Tuning] Windows BBR Tuning - 3

* Update defense_evasion_service_disabled_registry.toml

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2024-02-14 15:00:43 -03:00
Jonhnathan 1a8271db2f [Rule Tuning] Windows BBR Tuning - 4 (#3384)
* [Rule Tuning] Windows BBR Tuning - 4

* Update discovery_system_time_discovery.toml
2024-02-14 14:21:07 -03:00
Jonhnathan f233909e7d [Rule Tuning] Windows BBR Tuning - 6 (#3386)
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2024-02-14 12:49:25 -03:00
Jonhnathan 97e49795ab [Rule Tuning] Windows BBR Tuning - 5 (#3385)
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2024-02-14 10:23:06 -03:00