89420ae976
* [New Rule] Potential PrintNightmare Exploitation rules * added Potential PrintNightmare File Modification * added spoolsv as process name to narrow more the scope * added Suspicious Print Spooler File Deletion * removed Suspicious Print Driver Registry Modification cuz of potential noise * Update privilege_escalation_printspooler_malicious_registry_modification.toml * Update rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com> * Update rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com> * Update rules/windows/privilege_escalation_printspooler_malicious_registry_modification.toml Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com> * adjusted description and added a comment for sysmon compatibility * added FP note and relinted all files * Update rules/windows/privilege_escalation_printspooler_malicious_driver_file_changes.toml Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com> * Update rules/windows/privilege_escalation_printspooler_malicious_registry_modification.toml Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com> * Update rules/windows/privilege_escalation_printspooler_suspicious_file_deletion.toml Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com> * Update rules/windows/privilege_escalation_unusual_printspooler_childprocess.toml Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com> * relinted Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com> Co-authored-by: Brent Murphy <56412096+bm11100@users.noreply.github.com>