This website requires JavaScript.
d72cb92d59
Bringing back "fix: Cleaning up the hashable content for the rule" (#4621 ) (#4668 )
dev-v1.1.3
Sergey Polzunov
2025-04-28 18:29:55 +02:00
97e6d8b706
Lock versions for releases: 8.14,8.15,8.16,8.17,8.18,9.0 (#4665 )
dev-v1.1.2
shashank-elastic
2025-04-25 20:35:09 +05:30
f02ccfef64
[New Rule] Adding Coverage for AWS IAM or STS API Calls via Temporary Session Tokens (#4628 )
Terrance DeJesus
2025-04-24 15:39:51 -04:00
191396e5e8
Version bump (#4655 )
dev-v1.1.1
Sergey Polzunov
2025-04-24 19:19:36 +02:00
b7a324b2e8
Revert "fix: Cleaning up the hashable content for the rule (#4621 )" (#4654 )
Sergey Polzunov
2025-04-24 19:05:17 +02:00
84966f02a1
[Tuning] Update DPRK ByBit Hunting Queries (#4645 )
Colson Wilhoit
2025-04-24 07:58:06 -05:00
80c4f7eacc
fix: Cleaning up the hashable content for the rule (#4621 )
dev-v1.1.0
Sergey Polzunov
2025-04-24 11:03:26 +02:00
b429be2bda
[Rule Tuning] O365 Exchange Suspicious Mailbox Right Delegation (#4648 )
Isai
2025-04-24 00:49:06 -04:00
70062c3991
Update ATT&CK coverage URL(s) in docs-dev/ATT&CK-coverage.md (#4649 )
dev-v1.0.18
github-actions[bot]
2025-04-24 07:12:12 +05:30
34231160ee
Fix versions for changes in required_fileds (#4640 )
shashank-elastic
2025-04-24 06:28:18 +05:30
b9ed05562d
[Rule Tuning] User Added to Privileged Group in Active Directory (#4646 )
Jonhnathan
2025-04-23 21:42:33 -03:00
e8e76972f5
[Rule Tuning] Replace legacy winlog.api usage (#4647 )
Jonhnathan
2025-04-23 21:22:38 -03:00
54fadc8e2e
Add 8.18 and 9.0 beats schemas (#4641 )
dev-v1.0.17
shashank-elastic
2025-04-24 05:36:45 +05:30
bbfc026c95
[New Hunt] New Hunting Queries for DPRK ByBit (#4644 )
dev-v1.0.16
Terrance DeJesus
2025-04-23 16:41:23 -04:00
ea31143b83
[New] Suspicious Azure Sign-in via Visual Studio Code (#4639 )
dev-v1.0.15
Samirbous
2025-04-23 14:06:05 +01:00
f8e91be329
[New] RemoteMonologue Attack rules (#4604 )
Samirbous
2025-04-22 19:26:57 +01:00
1bab74179e
[New Rule] Potential Malicious PowerShell Based on Alert Correlation (#4635 )
Jonhnathan
2025-04-22 13:36:04 -03:00
c80319d462
[Deprecate] LaunchDaemon Creation or Modification and Immediate Loading (#4547 )
Colson Wilhoit
2025-04-22 10:53:01 -05:00
8361cfd205
[New Rule] Potential PowerShell Obfuscation via String Reordering (#4595 )
Jonhnathan
2025-04-22 12:26:55 -03:00
364d9dd3bc
[New Rule] Threat Intel Email Indicator Match (#4598 )
dev-v1.0.14
Jonhnathan
2025-04-22 12:15:36 -03:00
a495b4b9b2
[Rule Tuning] Potential DLL Side-Loading via Trusted Microsoft Programs (#4627 )
Jonhnathan
2025-04-22 11:59:06 -03:00
a9f99137f3
[New Rule] Dynamic IEX Reconstruction via Method String Access (#4634 )
Jonhnathan
2025-04-22 11:47:03 -03:00
4ef72457d3
[Tuning] MacOS DR Tuning PR (#4546 )
Colson Wilhoit
2025-04-21 17:32:05 -05:00
c58d59eeb7
[New Rule] Adding Coverage for AWS CLI with Kali Linux Fingerprint Identified (#4625 )
Terrance DeJesus
2025-04-21 12:06:57 -04:00
94237798a5
[New Rule] Adding Coverage for AWS IAM Virtual MFA Device Registration (#4626 )
Terrance DeJesus
2025-04-21 11:02:14 -04:00
96c2d0ca85
[New Rule] Adding Coverage for AWS Temporary User Session Token Used from Multiple Addresses (#4624 )
Terrance DeJesus
2025-04-17 16:06:40 -04:00
62feac3348
[Bug] Update Schema Prompt to include new_terms_fields (#4567 )
dev-v1.0.13
Eric Forte
2025-04-17 10:45:51 -04:00
6cb238bedb
[Enhancement] Add flag to export rules via KQL search on name (#4594 )
Frederik Berg
2025-04-17 00:40:46 +02:00
9b682b752c
Feature exclude tactic name (#4593 )
Frederik Berg
2025-04-16 22:02:14 +02:00
033c82858c
[FR] Add Support for Local Dates Flag (#4582 )
dev-v1.0.10
Eric Forte
2025-04-16 15:41:09 -04:00
ba16e27edb
[Rule Tuning] Tuning Azure Service Principal Credentials Added (#4570 )
dev-v1.0.9
Terrance DeJesus
2025-04-16 13:58:17 -04:00
1a6669e5a6
[Rule Tuning] Adjusting Microsoft Entra ID Rare Authentication Requirement for Principal User (#4562 )
dev-v1.0.8
Terrance DeJesus
2025-04-16 12:21:41 -04:00
e11fe78846
[Rule Tuning] Suspicious WMI Event Subscription Created (#4618 )
Jonhnathan
2025-04-16 10:05:20 -03:00
3eed0f5b6a
[Rule Tuning] SSH Authorized Keys File Deletion (#4591 )
Jonhnathan
2025-04-15 12:16:03 -03:00
ea7de8230c
[FR] Add Kibana Action Connector Error to Exception List Workaround (#4583 )
dev-v1.0.7
Eric Forte
2025-04-15 09:18:50 -04:00
108b64f0c2
[FR] Update Detection Rules MITRE Workflow to SHA Pin (#4581 )
dev-v1.0.6
Eric Forte
2025-04-15 09:03:34 -04:00
595d204fe6
Remove Task List reference (#4605 )
shashank-elastic
2025-04-15 09:22:56 +05:30
3b1f780435
[D4C Conversion] Converting Compatible D4C Rules to DR (#4532 )
Ruben Groenewoud
2025-04-10 14:26:40 +02:00
05c9f6bbdb
[FN Tuning] Shared Object Created or Changed by Previously Unknown Pr… (#4529 )
Ruben Groenewoud
2025-04-08 18:19:18 +02:00
fbddc2e659
Lock versions for releases: 8.14,8.15,8.16,8.17,8.18,9.0 (#4601 )
dev-v1.0.5
github-actions[bot]
2025-04-08 18:25:47 +05:30
a5d9d6400a
[Rule Tuning] Suspicious Execution via Scheduled Task (#4599 )
Jonhnathan
2025-04-07 14:29:08 -03:00
3966981dae
Add investigation guides (#4600 )
shashank-elastic
2025-04-07 20:55:39 +05:30
9577d53284
[Rule Tuning] Add Host Metadata to ES|QL Aggregation Rules (#4592 )
Jonhnathan
2025-04-07 12:00:14 -03:00
753e8d8200
[New] Unusual Network Connection to Suspicious Top Level Domain (#4563 )
Colson Wilhoit
2025-04-03 14:22:41 -05:00
d4b2a35237
[New] Unusual Network Connection to Suspicious Web Service (#4569 )
Colson Wilhoit
2025-04-03 14:02:03 -05:00
8bb5e2493b
Update docset.yml (#4590 )
Mika Ayenson, PhD
2025-04-03 13:46:01 -05:00
e7806fc74f
[Rule Tuning] O365 Exchange Suspicious Mailbox Right Delegation (#4589 )
Jonhnathan
2025-04-02 09:52:34 -03:00
6d8cfda10f
Update defense_evasion_microsoft_defender_tampering.toml (#4573 )
Samirbous
2025-04-01 18:04:29 +01:00
c6e37d6910
[Rule Tuning] Tuning Illicit Grant Consent Detections in Azure and M365 (#4557 )
Terrance DeJesus
2025-03-27 15:55:04 -04:00
280140650a
tuning 'Azure Conditional Access Policy Modified' (#4558 )
Terrance DeJesus
2025-03-27 15:43:46 -04:00
2f3f4fbdef
deprecating 'Azure Virtual Network Device Modified or Deleted' (#4559 )
Terrance DeJesus
2025-03-27 10:09:34 -04:00
51826ed32f
Update ATT&CK coverage URL(s) in docs-dev/ATT&CK-coverage.md (#4571 )
dev-v1.0.4
github-actions[bot]
2025-03-27 09:42:15 +05:30
2b3095a13c
Update Max signals value to supported limits (#4556 )
dev-v1.0.3
shashank-elastic
2025-03-27 09:02:25 +05:30
63c1f47689
[Rule Tuning] Added OWA (outlook for web) new AppID (#4568 )
M. Visser
2025-03-26 19:15:28 +01:00
e8c54169a4
Prep main for 9.1 (#4555 )
dev-v1.0.2
shashank-elastic
2025-03-26 20:34:14 +05:30
2d2c5b4d88
[Bug] Update Custom Rules Markdown Location (#4565 )
dev-v1.0.1
Eric Forte
2025-03-26 10:00:52 -04:00
5e12f05a36
fixing double header in investigation notes (#4490 )
Terrance DeJesus
2025-03-25 09:08:13 -04:00
3bbe24d154
Create new detection rule set documentation to be included in the new docs. (#4508 )
Martijn Laarman
2025-03-24 17:23:06 +01:00
65170c394b
fix: removing outdated code in Kibana client auth (#4495 )
dev-v1.0.0
Sergey Polzunov
2025-03-24 12:28:36 +01:00
db78756062
[New Rule] Adding Coverage for DynamoDB Exfiltration Behaviors (#4535 )
dev-v0.4.26
Terrance DeJesus
2025-03-21 10:05:24 -04:00
75b2b5cb6a
[FR] Bump changed-files Version to Patched Version (#4542 )
Eric Forte
2025-03-20 12:58:21 -04:00
cd9ec7838c
[ci] Add new docs-builder automation. (#4507 )
Martijn Laarman
2025-03-20 17:20:27 +01:00
059d7efa25
Prep for Release 9.0 (#4550 )
dev-v0.4.25
shashank-elastic
2025-03-20 20:32:07 +05:30
955e973c00
Change description and name of problemchild ML detection-rules (#4545 )
Kirti Sodhi
2025-03-20 08:58:10 -04:00
28a06fd25f
Update defense_evasion_posh_assembly_load.toml (#4543 )
Samirbous
2025-03-20 08:13:28 +00:00
5ccb7ed4af
Min stack rules from 4516 (#4549 )
Eric Forte
2025-03-19 20:27:30 -04:00
5b3dc4a4a7
Revert "Add new ML detection rules for Privileged Access Detection (#4516 )" (#4548 )
Eric Forte
2025-03-19 20:08:08 -04:00
2ff8d1bb56
Add new ML detection rules for Privileged Access Detection (#4516 )
dev-v0.4.24
Kirti Sodhi
2025-03-19 11:02:28 -04:00
40a97f719f
Temporaily Disable Changed FIles Workflow (#4538 )
dev-v0.4.23
Eric Forte
2025-03-14 23:42:48 -04:00
0993ced309
Deprecate Cloud Defend Rules (#4537 )
shashank-elastic
2025-03-14 21:27:37 +05:30
290f0be959
Update defense_evasion_execution_suspicious_explorer_winword.toml (#4533 )
Samirbous
2025-03-14 13:46:56 +00:00
a64b6a39a7
Lock versions for releases: 8.12,8.13,8.14,8.15,8.16,8.17 (#4531 )
dev-v0.4.22
github-actions[bot]
2025-03-12 19:02:53 +05:30
d7d8c414ec
[New Rule] File Creation in /var/log via Suspicious Process (#4528 )
Ruben Groenewoud
2025-03-12 12:50:48 +01:00
02be7cac0a
Update ATT&CK coverage URL(s) in docs-dev/ATT&CK-coverage.md (#4530 )
dev-v0.4.21
github-actions[bot]
2025-03-12 12:49:43 +05:30
3ed820afa8
[New Rule] Adding Coverage for Azure Entra Password Spraying (Non-Interactive SFA) (#4523 )
Terrance DeJesus
2025-03-11 11:25:10 -04:00
aacb376acf
[New Rule] Adding Coverage for Azure Entra Rare App ID for Principal Authentication (#4524 )
Terrance DeJesus
2025-03-11 11:05:56 -04:00
fd1369a164
[New Rule] Adding Coverage for Azure Entra Rare Instance of Single-Factor Authentication for User (#4525 )
Terrance DeJesus
2025-03-11 10:51:01 -04:00
7c4f334a00
[New Hunt] Adding Hunting Queries for Azure Entra Sign-In Anomalies (#4527 )
Terrance DeJesus
2025-03-11 10:27:08 -04:00
4deb6a73b8
[FR] [DaC] Update Readme with DaC Support References (#4526 )
dev-v0.4.20
Eric Forte
2025-03-10 21:24:12 -04:00
eadcd9d3e0
[FR] Add Env Var DR_CLI_MAX_WIDTH and DaC Docs Updates (#4518 )
dev-v0.4.19
Eric Forte
2025-03-10 12:59:12 -04:00
3bdda091e1
chore: use docs-dev instead of docs dir for docs (#4522 )
dev-v0.4.18
Sergey Polzunov
2025-03-07 14:34:51 +01:00
e28512a32f
Deprecation Notice to Cloud Defend Rules (#4520 )
shashank-elastic
2025-03-07 10:50:00 +05:30
561ab703de
[New Rule] Uncommon Destination Port Connection by Web Server (#4515 )
Ruben Groenewoud
2025-03-06 17:31:33 +01:00
9fb7b57a47
[New Rule] Unusual File Creation from Web Server Parent (#4514 )
Ruben Groenewoud
2025-03-06 17:21:47 +01:00
fe0a9f4935
[New/Tuning] Docker Socket Enumeration (#4510 )
Ruben Groenewoud
2025-03-06 17:07:10 +01:00
8dfa5da3bf
[New Rules] Potential Port/Subnet Scanning Activity from Compromised Host (#4509 )
Ruben Groenewoud
2025-03-06 16:57:33 +01:00
fe06843636
[New Rule] Unusual Process Spawned from Web Server Parent (#4513 )
Ruben Groenewoud
2025-03-06 16:46:12 +01:00
6eed757b66
Revert "Moving docs to docs-dev"
traut
2025-03-06 16:29:37 +01:00
75abb8d0b5
Moving docs to docs-dev
traut
2025-03-06 16:27:26 +01:00
7ce6aaf566
[New Rule] Unusual Command Execution from Web Server Parent (#4512 )
Ruben Groenewoud
2025-03-06 16:25:38 +01:00
a1d6ff4a50
Added ML detection-rules for new Security Host package (#4519 )
Kirti Sodhi
2025-03-06 09:23:29 -05:00
081bd03618
fix(ci): use negative patterns in paths instead of paths-ignore (#4521 )
Sergey Polzunov
2025-03-06 13:57:41 +01:00
8854b3bea0
Ignore changes in rules/integrations except endpoint, and in _deprecated (#4498 )
Sergey Polzunov
2025-03-05 12:49:46 +01:00
5f54eb8006
chore: Removing RTAs (#4437 )
dev-v0.4.17
Sergey Polzunov
2025-03-05 12:35:57 +01:00
49c361dd98
[New Rules] Azure OpenAI (#3701 )
Mika Ayenson, PhD
2025-03-04 11:29:38 -06:00
b1470a480b
[New] WDAC Policy File by an Unusual Process (#4504 )
Samirbous
2025-03-04 15:21:58 +00:00
467034ee5b
Deprecate an APM BBR rule (#4511 )
shashank-elastic
2025-03-04 17:39:45 +05:30
b9e8115c2f
[New Rule] Python Site or User Customize File Creation (#4500 )
Ruben Groenewoud
2025-03-03 15:30:33 +01:00
d948279af6
[New Rule] Python Path File (pth) Creation (#4499 )
Ruben Groenewoud
2025-03-03 15:20:00 +01:00
f70eafb8e7
[New Rule] Successful SSH Authentication from Unusual User (#4481 )
Ruben Groenewoud
2025-03-03 11:55:27 +01:00