Skip to content

Commit 9c08869

Browse files
authored
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 9 (#5024)
1 parent be18b4d commit 9c08869

5 files changed

+26
-14
lines changed

rules/windows/defense_evasion_wsl_registry_modification.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2023/01/12"
3-
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[rule]
88
author = ["Elastic"]
@@ -18,6 +18,7 @@ index = [
1818
"endgame-*",
1919
"logs-m365_defender.event-*",
2020
"logs-sentinel_one_cloud_funnel.*",
21+
"logs-crowdstrike.fdr*",
2122
]
2223
language = "eql"
2324
license = "Elastic License v2"
@@ -73,6 +74,7 @@ tags = [
7374
"Data Source: Sysmon",
7475
"Data Source: Microsoft Defender for Endpoint",
7576
"Data Source: SentinelOne",
77+
"Data Source: Crowdstrike",
7678
"Resources: Investigation Guide",
7779
]
7880
timeline_id = "3e47ef71-ebfc-4520-975c-cb27fc090799"

rules/windows/execution_command_prompt_connecting_to_the_internet.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[transform]
88
[[transform.osquery]]
@@ -48,6 +48,7 @@ index = [
4848
"logs-endpoint.events.process-*",
4949
"logs-endpoint.events.network-*",
5050
"logs-windows.sysmon_operational-*",
51+
"logs-sentinel_one_cloud_funnel.*",
5152
]
5253
language = "eql"
5354
license = "Elastic License v2"
@@ -118,6 +119,7 @@ tags = [
118119
"Resources: Investigation Guide",
119120
"Data Source: Elastic Defend",
120121
"Data Source: Sysmon",
122+
"Data Source: SentinelOne",
121123
]
122124
type = "eql"
123125

rules/windows/execution_html_help_executable_program_connecting_to_the_internet.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[transform]
88
[[transform.osquery]]
@@ -43,6 +43,7 @@ index = [
4343
"logs-endpoint.events.process-*",
4444
"logs-endpoint.events.network-*",
4545
"logs-windows.sysmon_operational-*",
46+
"logs-sentinel_one_cloud_funnel.*",
4647
]
4748
language = "eql"
4849
license = "Elastic License v2"
@@ -120,6 +121,7 @@ tags = [
120121
"Resources: Investigation Guide",
121122
"Data Source: Elastic Defend",
122123
"Data Source: Sysmon",
124+
"Data Source: SentinelOne",
123125
]
124126
type = "eql"
125127

rules/windows/execution_powershell_susp_args_via_winscript.toml

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
[metadata]
22
creation_date = "2024/09/09"
3-
integration = ["windows", "system", "sentinel_one_cloud_funnel", "m365_defender"]
3+
integration = ["windows", "system", "sentinel_one_cloud_funnel", "m365_defender", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[rule]
88
author = ["Elastic"]
9-
description = "Identifies PowerShell.exe or Cmd.exe execution spawning from Windows Script Host processes Wscript.exe.\n"
9+
description = "Identifies PowerShell.exe or Cmd.exe execution spawning from Windows Script Host processes Wscript.exe."
1010
from = "now-9m"
1111
index = [
1212
"logs-m365_defender.event-*",
@@ -15,6 +15,8 @@ index = [
1515
"logs-windows.forwarded*",
1616
"logs-windows.sysmon_operational-*",
1717
"winlogbeat-*",
18+
"endgame-*",
19+
"logs-crowdstrike.fdr*",
1820
]
1921
language = "eql"
2022
license = "Elastic License v2"
@@ -61,19 +63,21 @@ tags = [
6163
"OS: Windows",
6264
"Use Case: Threat Detection",
6365
"Tactic: Execution",
66+
"Resources: Investigation Guide",
6467
"Data Source: Windows Security Event Logs",
6568
"Data Source: Sysmon",
6669
"Data Source: SentinelOne",
6770
"Data Source: Microsoft Defender for Endpoint",
68-
"Resources: Investigation Guide",
71+
"Data Source: Elastic Endgame",
72+
"Data Source: Crowdstrike",
6973
]
7074
timestamp_override = "event.ingested"
7175
type = "eql"
7276

7377
query = '''
74-
process where host.os.type == "windows" and event.action == "start" and
78+
process where host.os.type == "windows" and event.type == "start" and
7579
process.name : ("powershell.exe", "pwsh.exe", "cmd.exe") and
76-
process.parent.name : ("wscript.exe", "mshta.exe") and ?process.parent.args : "?:\\Users\\*"
80+
process.parent.name : ("wscript.exe", "mshta.exe")
7781
'''
7882

7983

rules/windows/execution_psexec_lateral_movement_command.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[rule]
88
author = ["Elastic"]
@@ -22,6 +22,7 @@ index = [
2222
"logs-endpoint.events.process-*",
2323
"logs-endpoint.events.network-*",
2424
"logs-windows.sysmon_operational-*",
25+
"logs-sentinel_one_cloud_funnel.*",
2526
]
2627
language = "eql"
2728
license = "Elastic License v2"
@@ -70,6 +71,7 @@ tags = [
7071
"Resources: Investigation Guide",
7172
"Data Source: Elastic Defend",
7273
"Data Source: Sysmon",
74+
"Data Source: SentinelOne",
7375
]
7476
type = "eql"
7577

0 commit comments

Comments
 (0)