Skip to content

Commit 3e93fb9

Browse files
authored
Merge branch 'develop' into new-research-detection-endpoint
2 parents de2162b + c2eb1a2 commit 3e93fb9

File tree

35 files changed

+469
-58
lines changed

35 files changed

+469
-58
lines changed

app_template/default/data/ui/nav/default.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
<view name="feedback"/>
44
<view name="search"/>
55
<collection label="Dashboards">
6-
<view source="unclassified" match=" - "/>
6+
<view source="unclassified" match="__"/>
77
</collection>
88
<a href="https://docs.splunk.com/Documentation/ESCU">Docs</a>
99
</nav>

detections/application/windows_ad_dangerous_deny_acl_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: This detection identifies an Active Directory access-control list (ACL)
1111
modification event, which applies permissions that deny the ability to enumerate
1212
permissions of the object.

detections/application/windows_ad_dangerous_group_acl_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: 'This detection monitors the addition of the following ACLs to an Active
1111
Directory group object: "Full control", "All extended rights", "All validated writes", "Create
1212
all child objects", "Delete all child objects", "Delete subtree", "Delete", "Modify

detections/application/windows_ad_dangerous_user_acl_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: 'This detection monitors the addition of the following ACLs to an Active
1111
Directory user object: "Full control","All extended rights","All validated writes",
1212
"Create all child objects","Delete all child objects","Delete subtree","Delete","Modify

detections/application/windows_ad_dcshadow_privileges_acl_addition.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
name: Windows AD DCShadow Privileges ACL Addition
22
id: ae915743-1aa8-4a94-975c-8062ebc8b723
3-
version: 3
4-
date: '2025-01-21'
3+
version: 4
4+
date: '2025-02-17'
55
author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: This detection identifies an Active Directory access-control list (ACL)
1111
modification event, which applies the minimum required extended rights to perform
1212
the DCShadow attack.

detections/application/windows_ad_domain_root_acl_deletion.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: ACL deletion performed on the domain root object, significant AD change
1111
with high impact. Following MS guidance all changes at this level should be reviewed.
1212
Drill into the logonID within EventCode 4624 for information on the source device

detections/application/windows_ad_domain_root_acl_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: ACL modification performed on the domain root object, significant AD
1111
change with high impact. Following MS guidance all changes at this level should
1212
be reviewed. Drill into the logonID within EventCode 4624 for information on the

detections/application/windows_ad_gpo_deleted.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
name: Windows AD GPO Deleted
22
id: 0d41772b-35ab-4e1c-a2ba-d0b455481aee
3-
version: 3
4-
date: '2025-01-21'
3+
version: 4
4+
date: '2025-02-17'
55
author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: This detection identifies when an Active Directory Group Policy is deleted
1111
using the Group Policy Management Console.
1212
search: '`wineventlog_security` EventCode=5136 AttributeLDAPDisplayName=gpLink | eval ObjectDN=upper(ObjectDN)

detections/application/windows_ad_gpo_disabled.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
name: Windows AD GPO Disabled
22
id: 72793bc0-c0cd-400e-9e60-fdf36f278917
3-
version: 3
4-
date: '2025-01-21'
3+
version: 4
4+
date: '2025-02-17'
55
author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: This detection identifies when an Active Directory Group Policy is disabled
1111
using the Group Policy Management Console.
1212
search: '`wineventlog_security` EventCode=5136 AttributeLDAPDisplayName=flags OperationType="%%14674"

detections/application/windows_ad_gpo_new_cse_addition.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Dean Luxton
66
status: production
77
type: TTP
88
data_source:
9-
- Windows Security 5136
9+
- Windows Event Log Security 5136
1010
description: This detection identifies when a a new client side extension is added
1111
to an Active Directory Group Policy using the Group Policy Management Console.
1212
search: '`wineventlog_security` EventCode=5136 ObjectClass=groupPolicyContainer AttributeLDAPDisplayName=gPCMachineExtensionNames

0 commit comments

Comments
 (0)