Skip to content

Commit 4c07f16

Browse files
committed
mionr tick
1 parent 92a4b78 commit 4c07f16

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

detections/endpoint/windows_ad_replication_request_initiated_from_unsanctioned_location.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ search: |-
3333
values(Computer) as Computer, values(status) as status, values(src_category) as
3434
src_category, values(src_ip) as src_ip values(action) as action values(authentication_method) as authentication_method values(dest) as dest values(signature) as signature values(signature_id) as signature_id by TargetLogonId
3535
| search NOT src_category="domain_controller"
36-
| `windows_ad_replication_request_initiated_from_unsanctioned_location_filter`'
36+
| `windows_ad_replication_request_initiated_from_unsanctioned_location_filter`
3737
how_to_implement:
3838
To successfully implement this search, you need to be ingesting
3939
eventcode `4662`. The Advanced Security Audit policy settings `Audit Directory Services

0 commit comments

Comments
 (0)