Skip to content

Commit bd56644

Browse files
w0rk3rtradebot-elastic
authored andcommitted
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 7 (#5022)
(cherry picked from commit 48dfb75)
1 parent 30a3c89 commit bd56644

5 files changed

+21
-15
lines changed

rules/windows/defense_evasion_script_via_html_app.toml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/09/09"
33
integration = ["windows", "system", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2025/07/21"
5+
updated_date = "2025/08/26"
66

77
[rule]
88
author = ["Elastic"]
@@ -18,6 +18,7 @@ index = [
1818
"logs-windows.forwarded*",
1919
"logs-windows.sysmon_operational-*",
2020
"winlogbeat-*",
21+
"endgame-*",
2122
]
2223
language = "eql"
2324
license = "Elastic License v2"
@@ -68,6 +69,7 @@ tags = [
6869
"Data Source: SentinelOne",
6970
"Data Source: Microsoft Defender for Endpoint",
7071
"Resources: Investigation Guide",
72+
"Data Source: Elastic Endgame",
7173
]
7274
timestamp_override = "event.ingested"
7375
type = "eql"

rules/windows/defense_evasion_sdelete_like_filename_rename.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/08/18"
3-
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[rule]
88
author = ["Elastic"]
@@ -18,6 +18,7 @@ index = [
1818
"endgame-*",
1919
"logs-m365_defender.event-*",
2020
"logs-sentinel_one_cloud_funnel.*",
21+
"logs-crowdstrike.fdr*",
2122
]
2223
language = "eql"
2324
license = "Elastic License v2"
@@ -69,6 +70,7 @@ tags = [
6970
"Data Source: Sysmon",
7071
"Data Source: Microsoft Defender for Endpoint",
7172
"Data Source: SentinelOne",
73+
"Data Source: Crowdstrike",
7274
]
7375
timestamp_override = "event.ingested"
7476
type = "eql"

rules/windows/defense_evasion_sip_provider_mod.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/01/20"
3-
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[rule]
88
author = ["Elastic"]
@@ -19,6 +19,7 @@ index = [
1919
"winlogbeat-*",
2020
"logs-m365_defender.event-*",
2121
"logs-sentinel_one_cloud_funnel.*",
22+
"logs-crowdstrike.fdr*",
2223
]
2324
language = "eql"
2425
license = "Elastic License v2"
@@ -71,6 +72,7 @@ tags = [
7172
"Data Source: Sysmon",
7273
"Data Source: Microsoft Defender for Endpoint",
7374
"Data Source: SentinelOne",
75+
"Data Source: Crowdstrike",
7476
"Resources: Investigation Guide",
7577
]
7678
timestamp_override = "event.ingested"

rules/windows/defense_evasion_solarwinds_backdoor_service_disabled_via_registry.toml

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/12/14"
3-
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/08/26"
66

77
[rule]
88
author = ["Elastic"]
@@ -18,6 +18,7 @@ index = [
1818
"endgame-*",
1919
"logs-m365_defender.event-*",
2020
"logs-sentinel_one_cloud_funnel.*",
21+
"logs-crowdstrike.fdr*",
2122
]
2223
language = "eql"
2324
license = "Elastic License v2"
@@ -74,6 +75,7 @@ tags = [
7475
"Data Source: Sysmon",
7576
"Data Source: Microsoft Defender for Endpoint",
7677
"Data Source: SentinelOne",
78+
"Data Source: Crowdstrike",
7779
"Resources: Investigation Guide",
7880
]
7981
timestamp_override = "event.ingested"
@@ -90,11 +92,7 @@ registry where host.os.type == "windows" and event.type == "change" and registry
9092
"SolarWinds.Collector.Service*.exe",
9193
"SolarwindsDiagnostics*.exe"
9294
) and
93-
registry.path : (
94-
"HKLM\\SYSTEM\\*ControlSet*\\Services\\*\\Start",
95-
"\\REGISTRY\\MACHINE\\SYSTEM\\*ControlSet*\\Services\\*\\Start",
96-
"MACHINE\\SYSTEM\\*ControlSet*\\Services\\*\\Start"
97-
) and
95+
registry.path : "*\\SYSTEM\\*ControlSet*\\Services\\*\\Start" and
9896
registry.data.strings : ("4", "0x00000004")
9997
'''
10098

rules/windows/defense_evasion_suspicious_short_program_name.toml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/11/15"
3-
integration = ["endpoint", "windows", "m365_defender"]
3+
integration = ["endpoint", "windows", "m365_defender", "crowdstrike"]
44
maturity = "production"
5-
updated_date = "2025/05/05"
5+
updated_date = "2025/08/26"
66

77
[transform]
88
[[transform.osquery]]
@@ -44,6 +44,7 @@ index = [
4444
"logs-windows.sysmon_operational-*",
4545
"endgame-*",
4646
"logs-m365_defender.event-*",
47+
"logs-crowdstrike.fdr*",
4748
]
4849
language = "eql"
4950
license = "Elastic License v2"
@@ -105,10 +106,11 @@ tags = [
105106
"Use Case: Threat Detection",
106107
"Tactic: Defense Evasion",
107108
"Data Source: Elastic Endgame",
108-
"Resources: Investigation Guide",
109109
"Data Source: Elastic Defend",
110110
"Data Source: Sysmon",
111111
"Data Source: Microsoft Defender for Endpoint",
112+
"Data Source: Crowdstrike",
113+
"Resources: Investigation Guide",
112114
]
113115
timestamp_override = "event.ingested"
114116
type = "eql"

0 commit comments

Comments
 (0)