Skip to content

Commit e9c2a4c

Browse files
authored
Update defense_evasion_ml_suspicious_windows_event_low_probability.toml
1 parent 4726382 commit e9c2a4c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

rules/integrations/problemchild/defense_evasion_ml_suspicious_windows_event_low_probability.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ probability of it being malicious activity. Alternatively, the model's blocklist
1212
malicious.
1313
"""
1414
from = "now-10m"
15-
index = ["logs-endpoint.events.process-*", "winlogbeat-*"]
15+
index = ["logs-endpoint.events.process-*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Machine Learning Detected a Suspicious Windows Event with a Low Malicious Probability Score"

0 commit comments

Comments
 (0)