Skip to content

Commit 10c8444

Browse files
committed
pushing a detections renamed
1 parent 3126836 commit 10c8444

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

detections/endpoint/windows_renamed_powershell.yml renamed to detections/endpoint/windows_renamed_powershell_execution.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
name: Windows Renamed Powershell
1+
name: Windows Renamed Powershell Execution
22
id: c08014de-cc5a-42de-9775-76ecd5b37bbd
33
version: 1
44
date: '2025-05-07'
@@ -19,7 +19,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1919
| `drop_dm_object_name(Processes)`
2020
| `security_content_ctime(firstTime)`
2121
| `security_content_ctime(lastTime)`
22-
| `windows_renamed_powershell_filter`'
22+
| `windows_renamed_powershell_execution_filter`'
2323
how_to_implement: The detection is based on data that originates from Endpoint Detection
2424
and Response (EDR) agents. These agents are designed to provide security-related
2525
telemetry from the endpoints where the agent is installed. To implement this search,

0 commit comments

Comments
 (0)