Skip to content

Commit 4726382

Browse files
authored
Update defense_evasion_ml_suspicious_windows_event_high_probability.toml
1 parent 3455fd5 commit 4726382

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_event_high_probability.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[metadata]
22
creation_date = "2023/10/16"
3-
integration = ["problemchild", "endpoint", "windows"]
3+
integration = ["problemchild", "endpoint"]
44
maturity = "production"
55
updated_date = "2025/12/17"
66

@@ -12,7 +12,7 @@ probability of it being malicious activity. Alternatively, the model's blocklist
1212
malicious.
1313
"""
1414
from = "now-10m"
15-
index = ["logs-endpoint.events.process-*", "winlogbeat-*"]
15+
index = ["logs-endpoint.events.process-*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score"

0 commit comments

Comments
 (0)