Skip to content

Commit 370db3a

Browse files
authored
Update and rename windows_detect_wpdbusenum_registry_key_modification.yml to windows_wpdbusenum_registry_key_modification.yml
1 parent 90865c0 commit 370db3a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

detections/endpoint/windows_detect_wpdbusenum_registry_key_modification.yml renamed to detections/endpoint/windows_wpdbusenum_registry_key_modification.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
name: Windows Detect WPDBusEnum Registry Key Modification
1+
name: Windows WPDBusEnum Registry Key Modification
22
id: 52b48e8b-eb6e-48b0-b8f1-73273f6b134e
33
version: 1
44
date: '2025-01-17'
@@ -15,7 +15,7 @@ search: |-
1515
| eval object_handle = registry_value_data, object_name = replace(mvindex(split(mvindex(split(registry_path, "??"),1),"&"),2),"PROD_","")
1616
| `security_content_ctime(firstTime)`
1717
| `security_content_ctime(lastTime)`
18-
| `windows_detect_wpdbusenum_registry_key_modification_filter`
18+
| `windows_wpdbusenum_registry_key_modification_filter`
1919
how_to_implement: To successfully implement this search, you must ingest endpoint logging that tracks changes to the HKLM\SOFTWARE\Microsoft\Windows Portable Devices\Devices\ or HKLM\System\CurrentControlSet\Enum\SWD\WPDBUSENUM\ registry keys. Ensure that the field from the event logs is being mapped to the proper fields in the Endpoint.Registry data model.
2020
known_false_positives: Legitimate USB activity will also be detected. Please verify and investigate as appropriate.
2121
references:

0 commit comments

Comments
 (0)