b1ddfb11d4
* [New Rule] Windows Services - winlog https://github.com/elastic/detection-rules/issues/2164 (T1543.003 - Windows Service) - remote windows service (4624,4697) - suspicious windows service imagepath (7045, 4697) : cmd, powershell etc. * added winlog.logon.type (keyword) * Update non-ecs-schema.json * Update persistence_service_windows_service_winlog.toml * Update non-ecs-schema.json Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com> Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>