We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 99b4d48 commit 1ce551dCopy full SHA for 1ce551d
detections/endpoint/windows_ai_platform_dns_query.yml
@@ -9,7 +9,8 @@ description: The following analytic detects DNS queries initiated by the Windows
9
data_source:
10
- Sysmon EventID 22
11
search: '`sysmon` EventCode=22 process_name="python.exe" QueryName= "router.huggingface.co"
12
- | stats count min(_time) as firstTime max(_time) as lastTime
+ | rename dvc as dest
13
+ | stats count min(_time) as firstTime max(_time) as lastTime
14
by answer answer_count dest process_exec process_guid process_name query query_count reply_code_id signature signature_id src user_id
15
vendor_product QueryName QueryResults QueryStatus
16
| `security_content_ctime(firstTime)`
0 commit comments