Skip to content

Commit 0ed670c

Browse files
committed
lamehug
1 parent 1ce551d commit 0ed670c

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

detections/endpoint/windows_ai_platform_dns_query.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,13 @@ type: Anomaly
88
description: The following analytic detects DNS queries initiated by the Windows AI Platform to domains associated with Hugging Face, a popular provider of machine learning models and services. Monitoring for such DNS requests is important because it can reveal when systems are reaching out to external AI platforms, which may indicate the use of third-party AI resources or the transfer of sensitive data outside the organization’s environment. Detecting these queries helps organizations enforce data governance policies, prevent unapproved use of external AI services, and maintain visibility into potential data exfiltration risks. Proactive monitoring ensures better control over AI model usage and organizational data flows.
99
data_source:
1010
- Sysmon EventID 22
11-
search: '`sysmon` EventCode=22 process_name="python.exe" QueryName= "router.huggingface.co"
11+
search: '`sysmon` EventCode=22 process_name IN ("python.exe", "cmd.exe", "rundll32.exe","powershell.exe", "pwsh.exe") QueryName= "router.huggingface.co"
1212
| rename dvc as dest
13-
| stats count min(_time) as firstTime max(_time) as lastTime
14-
by answer answer_count dest process_exec process_guid process_name query query_count reply_code_id signature signature_id src user_id
13+
| stats count min(_time) as firstTime max(_time) as lastTime
14+
by answer answer_count dvc process_exec process_guid process_name query query_count reply_code_id signature signature_id src user_id
1515
vendor_product QueryName QueryResults QueryStatus
1616
| `security_content_ctime(firstTime)`
17-
| `security_content_ctime(lastTime)`
17+
| `security_content_ctime(lastTime)`
1818
| `windows_ai_platform_dns_query_filter`'
1919
how_to_implement: To successfully implement this search, you need to be ingesting
2020
logs with the process name and eventcode = 22 dnsquery executions from your endpoints.

0 commit comments

Comments
 (0)