Skip to content

Commit 615eec8

Browse files
w0rk3rtradebot-elastic
authored andcommitted
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 8 (#5023)
* [Rule Tuning] Windows 3rd Party EDR Compatibility - Part 8 * Apply suggestions from code review Co-authored-by: Samirbous <[email protected]> * Update defense_evasion_wdac_policy_by_unusual_process.toml --------- Co-authored-by: Samirbous <[email protected]> (cherry picked from commit be18b4d)
1 parent bd56644 commit 615eec8

5 files changed

+31
-12
lines changed

rules/windows/defense_evasion_system_critical_proc_abnormal_file_activity.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/08/19"
3-
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[transform]
88
[[transform.osquery]]
@@ -44,6 +44,7 @@ index = [
4444
"endgame-*",
4545
"logs-m365_defender.event-*",
4646
"logs-sentinel_one_cloud_funnel.*",
47+
"logs-crowdstrike.fdr*",
4748
]
4849
language = "eql"
4950
license = "Elastic License v2"
@@ -113,6 +114,7 @@ tags = [
113114
"Data Source: Sysmon",
114115
"Data Source: Microsoft Defender for Endpoint",
115116
"Data Source: SentinelOne",
117+
"Data Source: Crowdstrike",
116118
]
117119
timestamp_override = "event.ingested"
118120
type = "eql"

rules/windows/defense_evasion_unusual_process_network_connection.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[rule]
88
author = ["Elastic"]
@@ -16,6 +16,7 @@ index = [
1616
"logs-endpoint.events.process-*",
1717
"logs-endpoint.events.network-*",
1818
"logs-windows.sysmon_operational-*",
19+
"logs-sentinel_one_cloud_funnel.*",
1920
]
2021
language = "eql"
2122
license = "Elastic License v2"
@@ -58,6 +59,7 @@ tags = [
5859
"Resources: Investigation Guide",
5960
"Data Source: Elastic Defend",
6061
"Data Source: Sysmon",
62+
"Data Source: SentinelOne",
6163
]
6264
type = "eql"
6365

rules/windows/defense_evasion_via_filter_manager.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows", "m365_defender", "system"]
3+
integration = ["endpoint", "windows", "m365_defender", "system", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[transform]
88
[[transform.osquery]]
@@ -45,6 +45,7 @@ index = [
4545
"logs-windows.forwarded*",
4646
"logs-windows.sysmon_operational-*",
4747
"winlogbeat-*",
48+
"logs-sentinel_one_cloud_funnel.*",
4849
]
4950
language = "eql"
5051
license = "Elastic License v2"
@@ -115,6 +116,7 @@ tags = [
115116
"Data Source: Microsoft Defender for Endpoint",
116117
"Data Source: Windows Security Event Logs",
117118
"Data Source: Sysmon",
119+
"Data Source: SentinelOne",
118120
]
119121
timestamp_override = "event.ingested"
120122
type = "eql"

rules/windows/defense_evasion_wdac_policy_by_unusual_process.toml

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2025/02/28"
3-
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[rule]
88
author = ["Elastic"]
@@ -18,6 +18,7 @@ index = [
1818
"endgame-*",
1919
"logs-m365_defender.event-*",
2020
"logs-sentinel_one_cloud_funnel.*",
21+
"logs-crowdstrike.fdr*",
2122
]
2223
language = "eql"
2324
license = "Elastic License v2"
@@ -67,14 +68,24 @@ tags = [
6768
"Data Source: Sysmon",
6869
"Data Source: Microsoft Defender for Endpoint",
6970
"Data Source: SentinelOne",
71+
"Data Source: Crowdstrike",
7072
]
7173
timestamp_override = "event.ingested"
7274
type = "eql"
7375

7476
query = '''
7577
file where host.os.type == "windows" and event.action != "deletion" and
76-
file.path : ("?:\\Windows\\System32\\CodeIntegrity\\*.p7b", "?:\\Windows\\System32\\CodeIntegrity\\CiPolicies\\Active\\*.cip") and
77-
not process.executable : "C:\\Windows\\System32\\poqexec.exe"
78+
file.extension : ("p7b", "cip") and
79+
file.path : (
80+
"?:\\Windows\\System32\\CodeIntegrity\\*.p7b",
81+
"?:\\Windows\\System32\\CodeIntegrity\\CiPolicies\\Active\\*.cip",
82+
"\\Device\\HarddiskVolume*\\Windows\\System32\\CodeIntegrity\\*.p7b",
83+
"\\Device\\HarddiskVolume*\\Windows\\System32\\CodeIntegrity\\CiPolicies\\Active\\*.cip"
84+
) and
85+
not process.executable : (
86+
"C:\\Windows\\System32\\poqexec.exe",
87+
"\\Device\\HarddiskVolume*\\Windows\\System32\\poqexec.exe"
88+
)
7889
'''
7990

8091

rules/windows/defense_evasion_wsl_filesystem.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2023/01/12"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[rule]
88
author = ["Elastic"]
@@ -16,6 +16,7 @@ index = [
1616
"logs-endpoint.events.process-*",
1717
"logs-endpoint.events.file-*",
1818
"logs-windows.sysmon_operational-*",
19+
"logs-sentinel_one_cloud_funnel.*",
1920
]
2021
language = "eql"
2122
license = "Elastic License v2"
@@ -67,6 +68,7 @@ tags = [
6768
"Data Source: Elastic Defend",
6869
"Data Source: Sysmon",
6970
"Resources: Investigation Guide",
71+
"Data Source: SentinelOne",
7072
]
7173
timestamp_override = "event.ingested"
7274
type = "eql"

0 commit comments

Comments
 (0)