Skip to content

Commit 91ef868

Browse files
w0rk3rgithub-actions[bot]
authored andcommitted
[Rule Tuning] 3rd Party EDR Compatibility - 9 (#4034)
* [Rule Tuning] 3rd Party EDR Compatibility - 9 * min_stack for merge, bump updated_date (cherry picked from commit 8938f09)
1 parent dfd20fb commit 91ef868

10 files changed

+100
-81
lines changed

rules/windows/defense_evasion_wsl_registry_modification.toml

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
[metadata]
22
creation_date = "2023/01/12"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2024/08/05"
5+
updated_date = "2024/10/10"
6+
min_stack_version = "8.13.0"
7+
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
68

79
[rule]
810
author = ["Elastic"]
@@ -11,7 +13,14 @@ Detects changes to the registry that indicates the install of a new Windows Subs
1113
Adversaries may enable and use WSL for Linux to avoid detection.
1214
"""
1315
from = "now-9m"
14-
index = ["winlogbeat-*", "logs-endpoint.events.registry-*", "logs-windows.sysmon_operational-*", "endgame-*"]
16+
index = [
17+
"winlogbeat-*",
18+
"logs-endpoint.events.registry-*",
19+
"logs-windows.sysmon_operational-*",
20+
"endgame-*",
21+
"logs-m365_defender.event-*",
22+
"logs-sentinel_one_cloud_funnel.*"
23+
]
1524
language = "eql"
1625
license = "Elastic License v2"
1726
name = "Windows Subsystem for Linux Distribution Installed"
@@ -64,6 +73,8 @@ tags = [
6473
"Data Source: Elastic Endgame",
6574
"Data Source: Elastic Defend",
6675
"Data Source: Sysmon",
76+
"Data Source: Microsoft Defender for Endpoint",
77+
"Data Source: SentinelOne",
6778
]
6879
timeline_id = "3e47ef71-ebfc-4520-975c-cb27fc090799"
6980
timeline_title = "Comprehensive Registry Timeline"
@@ -72,9 +83,7 @@ type = "eql"
7283

7384
query = '''
7485
registry where host.os.type == "windows" and event.type == "change" and registry.value : "PackageFamilyName" and
75-
registry.path :
76-
("HK*\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Lxss\\*\\PackageFamilyName",
77-
"\\REGISTRY\\*\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Lxss\\*\\PackageFamilyName")
86+
registry.path : "*\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Lxss\\*\\PackageFamilyName"
7887
'''
7988

8089

rules/windows/discovery_adfind_command_activity.toml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
[metadata]
22
creation_date = "2020/10/19"
3-
integration = ["endpoint", "windows", "system"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2024/08/07"
5+
updated_date = "2024/10/10"
6+
min_stack_version = "8.13.0"
7+
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
68

79
[rule]
810
author = ["Elastic"]
@@ -15,9 +17,12 @@ from = "now-9m"
1517
index = [
1618
"logs-endpoint.events.process-*",
1719
"winlogbeat-*",
18-
"logs-windows.*",
20+
"logs-windows.forwarded*",
21+
"logs-windows.sysmon_operational-*",
1922
"endgame-*",
2023
"logs-system.security*",
24+
"logs-m365_defender.event-*",
25+
"logs-sentinel_one_cloud_funnel.*",
2126
]
2227
language = "eql"
2328
license = "Elastic License v2"
@@ -67,14 +72,6 @@ references = [
6772
]
6873
risk_score = 21
6974
rule_id = "eda499b8-a073-4e35-9733-22ec71f57f3a"
70-
setup = """## Setup
71-
72-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
73-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
74-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
75-
`event.ingested` to @timestamp.
76-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
77-
"""
7875
severity = "low"
7976
tags = [
8077
"Domain: Endpoint",
@@ -85,6 +82,9 @@ tags = [
8582
"Data Source: Elastic Endgame",
8683
"Data Source: Elastic Defend",
8784
"Data Source: System",
85+
"Data Source: Microsoft Defender for Endpoint",
86+
"Data Source: Sysmon",
87+
"Data Source: SentinelOne",
8888
]
8989
timestamp_override = "event.ingested"
9090
type = "eql"

rules/windows/discovery_admin_recon.toml

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/12/04"
3-
integration = ["endpoint", "windows", "system"]
3+
integration = ["endpoint", "windows", "system", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2024/08/07"
5+
updated_date = "2024/10/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -14,9 +14,10 @@ from = "now-9m"
1414
index = [
1515
"logs-endpoint.events.process-*",
1616
"winlogbeat-*",
17-
"logs-windows.*",
17+
"logs-windows.forwarded*",
1818
"endgame-*",
1919
"logs-system.security*",
20+
"logs-m365_defender.event-*",
2021
]
2122
language = "eql"
2223
license = "Elastic License v2"
@@ -55,14 +56,6 @@ This rule looks for the execution of the `net` and `wmic` utilities to enumerate
5556
"""
5657
risk_score = 21
5758
rule_id = "871ea072-1b71-4def-b016-6278b505138d"
58-
setup = """## Setup
59-
60-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
61-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
62-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
63-
`event.ingested` to @timestamp.
64-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
65-
"""
6659
severity = "low"
6760
tags = [
6861
"Domain: Endpoint",
@@ -73,6 +66,7 @@ tags = [
7366
"Data Source: Elastic Endgame",
7467
"Data Source: Elastic Defend",
7568
"Data Source: System",
69+
"Data Source: Microsoft Defender for Endpoint",
7670
]
7771
timestamp_override = "event.ingested"
7872
type = "eql"

rules/windows/discovery_enumerating_domain_trusts_via_dsquery.toml

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
[metadata]
22
creation_date = "2023/01/27"
3-
integration = ["endpoint", "windows", "system"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2024/08/07"
5+
updated_date = "2024/10/10"
6+
min_stack_version = "8.13.0"
7+
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
68

79
[rule]
810
author = ["Elastic"]
@@ -18,9 +20,12 @@ from = "now-9m"
1820
index = [
1921
"winlogbeat-*",
2022
"logs-endpoint.events.process-*",
21-
"logs-windows.*",
23+
"logs-windows.forwarded*",
24+
"logs-windows.sysmon_operational-*",
2225
"endgame-*",
2326
"logs-system.security*",
27+
"logs-m365_defender.event-*",
28+
"logs-sentinel_one_cloud_funnel.*",
2429
]
2530
language = "eql"
2631
license = "Elastic License v2"
@@ -72,6 +77,9 @@ tags = [
7277
"Resources: Investigation Guide",
7378
"Data Source: Elastic Defend",
7479
"Data Source: System",
80+
"Data Source: Microsoft Defender for Endpoint",
81+
"Data Source: Sysmon",
82+
"Data Source: SentinelOne",
7583
]
7684
timestamp_override = "event.ingested"
7785
type = "eql"

rules/windows/discovery_enumerating_domain_trusts_via_nltest.toml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2022/05/31"
3-
integration = ["endpoint", "windows", "system"]
3+
integration = ["endpoint", "windows", "system", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2024/08/07"
5+
updated_date = "2024/10/10"
66

77
[rule]
88
author = ["Elastic"]
@@ -21,9 +21,11 @@ from = "now-9m"
2121
index = [
2222
"winlogbeat-*",
2323
"logs-endpoint.events.process-*",
24-
"logs-windows.*",
24+
"logs-windows.forwarded*",
25+
"logs-windows.sysmon_operational-*",
2526
"endgame-*",
2627
"logs-system.security*",
28+
"logs-m365_defender.event-*",
2729
]
2830
language = "eql"
2931
license = "Elastic License v2"
@@ -75,6 +77,8 @@ tags = [
7577
"Resources: Investigation Guide",
7678
"Data Source: Elastic Defend",
7779
"Data Source: System",
80+
"Data Source: Microsoft Defender for Endpoint",
81+
"Data Source: Sysmon",
7882
]
7983
timestamp_override = "event.ingested"
8084
type = "eql"

rules/windows/discovery_group_policy_object_discovery.toml

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
[metadata]
22
creation_date = "2023/01/18"
3-
integration = ["windows", "endpoint"]
3+
integration = ["windows", "endpoint", "system", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2024/08/07"
5+
updated_date = "2024/10/10"
6+
min_stack_version = "8.13.0"
7+
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
68

79
[rule]
810
author = ["Elastic"]
@@ -15,9 +17,12 @@ from = "now-9m"
1517
index = [
1618
"winlogbeat-*",
1719
"logs-endpoint.events.process-*",
18-
"logs-windows.*",
20+
"logs-windows.forwarded*",
21+
"logs-windows.sysmon_operational-*",
1922
"endgame-*",
2023
"logs-system.security*",
24+
"logs-m365_defender.event-*",
25+
"logs-sentinel_one_cloud_funnel.*",
2126
]
2227
language = "eql"
2328
license = "Elastic License v2"
@@ -66,6 +71,9 @@ tags = [
6671
"Data Source: Elastic Endgame",
6772
"Data Source: Elastic Defend",
6873
"Data Source: System",
74+
"Data Source: Microsoft Defender for Endpoint",
75+
"Data Source: Sysmon",
76+
"Data Source: SentinelOne",
6977
]
7078
timestamp_override = "event.ingested"
7179
type = "eql"

rules/windows/discovery_peripheral_device.toml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
[metadata]
22
creation_date = "2020/11/02"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2024/08/07"
5+
updated_date = "2024/10/10"
6+
min_stack_version = "8.13.0"
7+
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
68

79
[rule]
810
author = ["Elastic"]
@@ -14,9 +16,12 @@ from = "now-9m"
1416
index = [
1517
"winlogbeat-*",
1618
"logs-endpoint.events.process-*",
17-
"logs-windows.*",
19+
"logs-windows.forwarded*",
20+
"logs-windows.sysmon_operational-*",
1821
"endgame-*",
1922
"logs-system.security*",
23+
"logs-m365_defender.event-*",
24+
"logs-sentinel_one_cloud_funnel.*",
2025
]
2126
language = "eql"
2227
license = "Elastic License v2"
@@ -52,14 +57,6 @@ This rule looks for the execution of the `fsutil` utility with the `fsinfo` subc
5257
"""
5358
risk_score = 21
5459
rule_id = "0c7ca5c2-728d-4ad9-b1c5-bbba83ecb1f4"
55-
setup = """## Setup
56-
57-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
58-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
59-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
60-
`event.ingested` to @timestamp.
61-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
62-
"""
6360
severity = "low"
6461
tags = [
6562
"Domain: Endpoint",
@@ -70,6 +67,9 @@ tags = [
7067
"Data Source: Elastic Endgame",
7168
"Data Source: Elastic Defend",
7269
"Data Source: System",
70+
"Data Source: Microsoft Defender for Endpoint",
71+
"Data Source: Sysmon",
72+
"Data Source: SentinelOne",
7373
]
7474
timestamp_override = "event.ingested"
7575
type = "eql"

rules/windows/execution_apt_solarwinds_backdoor_child_cmd_powershell.toml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
[metadata]
22
creation_date = "2020/12/14"
3-
integration = ["endpoint", "windows", "system"]
3+
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2024/08/07"
5+
updated_date = "2024/10/10"
6+
min_stack_version = "8.13.0"
7+
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
68

79
[rule]
810
author = ["Elastic"]
@@ -14,9 +16,12 @@ from = "now-9m"
1416
index = [
1517
"winlogbeat-*",
1618
"logs-endpoint.events.process-*",
17-
"logs-windows.*",
19+
"logs-windows.forwarded*",
20+
"logs-windows.sysmon_operational-*",
1821
"endgame-*",
1922
"logs-system.security*",
23+
"logs-m365_defender.event-*",
24+
"logs-sentinel_one_cloud_funnel.*",
2025
]
2126
language = "eql"
2227
license = "Elastic License v2"
@@ -27,14 +32,6 @@ references = [
2732
]
2833
risk_score = 47
2934
rule_id = "d72e33fc-6e91-42ff-ac8b-e573268c5a87"
30-
setup = """## Setup
31-
32-
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2,
33-
events will not define `event.ingested` and default fallback for EQL rules was not added until version 8.2.
34-
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
35-
`event.ingested` to @timestamp.
36-
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
37-
"""
3835
severity = "medium"
3936
tags = [
4037
"Domain: Endpoint",
@@ -45,6 +42,9 @@ tags = [
4542
"Data Source: Elastic Endgame",
4643
"Data Source: Elastic Defend",
4744
"Data Source: System",
45+
"Data Source: Microsoft Defender for Endpoint",
46+
"Data Source: Sysmon",
47+
"Data Source: SentinelOne",
4848
]
4949
timestamp_override = "event.ingested"
5050
type = "eql"

0 commit comments

Comments
 (0)