Skip to content

Commit a4bb962

Browse files
committed
[Rule Tuning] PowerShell Windows Defender ATP DataCollection Scripts
1 parent cdb346c commit a4bb962

File tree

3 files changed

+25
-1
lines changed

3 files changed

+25
-1
lines changed

rules/windows/defense_evasion_posh_assembly_load.toml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -169,6 +169,14 @@ value = """
169169
C:\\Program Files\\Microsoft Monitoring Agent\\Agent\\Health Service State\\Monitoring Host Temporary
170170
Files*\\AvailabilityGroupMonitoring.ps1
171171
"""
172+
173+
[rule.filters.meta]
174+
negate = true
175+
[rule.filters.query.wildcard."file.path"]
176+
case_insensitive = true
177+
value = "?:\\\\ProgramData\\\\Microsoft\\\\Windows Defender Advanced Threat Protection\\\\DataCollection\\\\*"
178+
179+
172180
[[rule.threat]]
173181
framework = "MITRE ATT&CK"
174182
[[rule.threat.technique]]

rules/windows/defense_evasion_posh_process_injection.toml

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2021/10/14"
33
integration = ["windows"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/07/02"
66

77
[rule]
88
author = ["Elastic"]
@@ -107,6 +107,14 @@ event.category:process and host.os.type:windows and
107107
)
108108
'''
109109

110+
[[rule.filters]]
111+
112+
[rule.filters.meta]
113+
negate = true
114+
[rule.filters.query.wildcard."file.path"]
115+
case_insensitive = true
116+
value = "?:\\\\ProgramData\\\\Microsoft\\\\Windows Defender Advanced Threat Protection\\\\DataCollection\\\\*"
117+
110118

111119
[[rule.threat]]
112120
framework = "MITRE ATT&CK"

rules_building_block/discovery_posh_generic.toml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -204,6 +204,14 @@ negate = true
204204
[rule.filters.query.wildcard."file.path"]
205205
case_insensitive = true
206206
value = "?:\\\\Program Files\\\\Microsoft Monitoring Agent\\\\Agent\\\\Health Service State\\\\Monitoring Host Temporary Files*"
207+
208+
[rule.filters.meta]
209+
negate = true
210+
[rule.filters.query.wildcard."file.path"]
211+
case_insensitive = true
212+
value = "?:\\\\ProgramData\\\\Microsoft\\\\Windows Defender Advanced Threat Protection\\\\DataCollection\\\\*"
213+
214+
207215
[[rule.threat]]
208216
framework = "MITRE ATT&CK"
209217
[[rule.threat.technique]]

0 commit comments

Comments
 (0)