Skip to content

Commit 2ab27cd

Browse files
patel-bhavinnasbench
authored andcommitted
Update suspicious_event_log_service_behavior.yml
1 parent 6f1d3e6 commit 2ab27cd

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

detections/deprecated/suspicious_event_log_service_behavior.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ date: '2025-02-10'
55
author: Mauricio Velazco, Splunk
66
status: deprecated
77
type: Hunting
8-
description: The following analytic detects the shutdown of the Windows Event Log
8+
description: This search has been deprecated in favour of Windows Event Logging Service Has Shutdown . The following analytic detects the shutdown of the Windows Event Log
99
service using Windows Event ID 1100. This event is logged every time the service
1010
stops, including during normal system shutdowns. Monitoring this activity is crucial
1111
as it can indicate attempts to cover tracks or disable logging. If confirmed malicious,

0 commit comments

Comments
 (0)