22creation_date = " 2021/10/01"
33integration = [" endpoint" , " sentinel_one_cloud_funnel" ]
44maturity = " production"
5- updated_date = " 2025/03/20 "
5+ updated_date = " 2025/08/27 "
66
77[rule ]
88author = [" Elastic" ]
@@ -14,7 +14,7 @@ false_positives = [
1414 " Certain utilities that delete files for disk cleanup or Administrators manually removing backup files." ,
1515]
1616from = " now-9m"
17- index = [" logs-endpoint.events.file-*" , " endgame-* " , " logs-sentinel_one_cloud_funnel.*" ]
17+ index = [" logs-endpoint.events.file-*" , " logs-sentinel_one_cloud_funnel.*" ]
1818language = " eql"
1919license = " Elastic License v2"
2020name = " Third-party Backup Files Deleted via Unexpected Process"
@@ -60,22 +60,13 @@ This rule identifies file deletions performed by a process that does not belong
6060references = [" https://www.advintel.io/post/backup-removal-solutions-from-conti-ransomware-with-love" ]
6161risk_score = 47
6262rule_id = " 11ea6bec-ebde-4d71-a8e9-784948f8e3e9"
63- setup = """ ## Setup
64-
65- If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
66- events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
67- Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
68- `event.ingested` to @timestamp.
69- For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
70- """
7163severity = " medium"
7264tags = [
7365 " Domain: Endpoint" ,
7466 " OS: Windows" ,
7567 " Use Case: Threat Detection" ,
7668 " Tactic: Impact" ,
7769 " Resources: Investigation Guide" ,
78- " Data Source: Elastic Endgame" ,
7970 " Data Source: Elastic Defend" ,
8071 " Data Source: SentinelOne" ,
8172]
0 commit comments