Skip to content

Commit 6c3e7df

Browse files
committed
notable to finding 2
1 parent 1f5975b commit 6c3e7df

20 files changed

+32
-40
lines changed

detections/application/email_attachments_with_lots_of_spaces.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ how_to_implement: "You need to ingest data from emails. Specifically, the sender
2929
this detection search. To use this integration, install the Phantom App for Splunk
3030
`https://splunkbase.splunk.com/app/3411/` and add the correct hostname to the \"\
3131
Phantom Instance\" field in the Adaptive Response Actions when configuring this
32-
detection search. The notable event will be sent to Phantom and the playbook will
32+
detection search. The finding based event will be sent to Phantom and the playbook will
3333
gather further information about the file attachment and its network behaviors.
3434
If Phantom finds malicious behavior and an analyst approves of the results, the
3535
email will be deleted from the user's inbox."

detections/application/okta_risk_threshold_exceeded.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,9 @@ search: '| tstats `security_content_summariesonly` values(All_Risk.analyticstori
2828
| search mitre_technique_id_count > 5 | `okta_risk_threshold_exceeded_filter`'
2929
how_to_implement: This search leverages the Risk Framework from Enterprise Security.
3030
Ensure that "Suspicious Okta Activity", "Okta Account Takeover", and "Okta MFA Exhaustion"
31-
analytic stories are enabled. TTPs may be set to Notables for point detections;
32-
anomalies should not be notables but rather risk generators. The correlation relies
33-
on risk before generating a notable. Modify the value as needed.
31+
analytic stories are enabled. TTPs may be set to finding for point detections;
32+
anomalies should not be findings but rather intermediate findings. The correlation relies
33+
on intermediate findings before generating a findings. Modify the value as needed.
3434
known_false_positives: False positives will be limited to the number of events generated
3535
by the analytics tied to the stories. Analytics will need to be tested and tuned,
3636
and the risk score reduced as needed based on the organization.

detections/application/suspicious_email_attachment_extensions.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ how_to_implement: "You need to ingest data from emails. Specifically, the sender
2626
Delete\" can be configured to run when any results are found by this detection search.
2727
To use this integration, install the Phantom App for Splunk `https://splunkbase.splunk.com/app/3411/`,
2828
and add the correct hostname to the \"Phantom Instance\" field in the Adaptive Response
29-
Actions when configuring this detection search. The notable event will be sent to
29+
Actions when configuring this detection search. The finding event will be sent to
3030
Phantom and the playbook will gather further information about the file attachment
3131
and its network behaviors. If Phantom finds malicious behavior and an analyst approves
3232
of the results, the email will be deleted from the user's inbox.'"

detections/cloud/azure_ad_authentication_failed_during_mfa_challenge.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ how_to_implement: You must install the latest version of Splunk Add-on for Micro
3434
known_false_positives: "False positives have been minimized by removing attempts that
3535
result in 'MFA successfully completed messages', which were found to be generated
3636
when a user opts to use a different MFA method than the default.\nFurther reductions
37-
in notable events can be achieved through filtering 'MFA denied; duplicate authentication
37+
in finding events can be achieved through filtering 'MFA denied; duplicate authentication
3838
attempt' messages within the auth_msg field, as they could arguably be considered
3939
as false positives."
4040
references:

detections/deprecated/detect_web_traffic_to_dynamic_domain_providers.yml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,11 @@ how_to_implement: "This search requires you to be ingesting web-traffic logs. Yo
1919
which contains a non-exhaustive list of dynamic DNS providers. Consider periodically
2020
updating this local lookup file with new domains.\nThis search produces fields (`isDynDNS`)
2121
that are not yet supported by ES Incident Review and therefore cannot be viewed
22-
when a notable event is raised. These fields contribute additional context to the
23-
notable. To see the additional metadata, add the following fields, if not already
22+
when a finding event is raised. These fields contribute additional context to the
23+
finding. To see the additional metadata, add the following fields, if not already
2424
present, to Incident Review - Event Attributes (Configure > Incident Management
2525
> Incident Review Settings > Add New Entry):\n* **Label:** IsDynamicDNS, **Field:**
26-
isDynDNS\nDetailed documentation on how to create a new field within Incident Review
27-
may be found here: `https://docs.splunk.com/Documentation/ES/5.3.0/Admin/Customizenotables#Add_a_field_to_the_notable_event_details`
28-
Deprecated because duplicate."
26+
isDynDNS\n Deprecated because duplicate."
2927
known_false_positives: It is possible that list of dynamic DNS providers is outdated
3028
and/or that the URL being requested is legitimate.
3129
references: []

detections/endpoint/batch_file_write_to_system32.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ how_to_implement: To successfully implement this search you need to be ingesting
3030
your endpoints into the `Endpoint` datamodel in the `Processes` node. In addition,
3131
confirm the latest CIM App 4.20 or higher is installed and the latest TA for the
3232
endpoint product.
33-
known_false_positives: It is possible for this search to generate a notable event
33+
known_false_positives: It is possible for this search to generate a finding event
3434
for a batch file write to a path that includes the string "system32", but is not
3535
the actual Windows system directory. As such, you should confirm the path of the
3636
batch file identified by the search. In addition, a false positive may be generated

detections/endpoint/common_ransomware_extensions.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,7 @@ search: '| tstats `security_content_summariesonly` min(_time) as firstTime max(_
2727
how_to_implement: 'You must be ingesting data that records the filesystem activity
2828
from your hosts to populate the Endpoint Filesystem data model node. To see the
2929
additional metadata, add the following fields, if not already present, please review
30-
the detailed documentation on how to create a new field within Incident Review may
31-
be found here: `https://docs.splunk.com/Documentation/ES/5.3.0/Admin/Customizenotables#Add_a_field_to_the_notable_event_details`'
30+
the detailed documentation on how to create a new field within Incident Review'
3231
known_false_positives: It is possible for a legitimate file with these extensions
3332
to be created. If this is a true ransomware attack, there will be a large number
3433
of files created with these extensions.

detections/endpoint/linux_persistence_and_privilege_escalation_risk_behavior.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ search: '| tstats `security_content_summariesonly` min(_time) as firstTime max(_
2929
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | where
3030
source_count >= 4 | `linux_persistence_and_privilege_escalation_risk_behavior_filter`'
3131
how_to_implement: Ensure Linux anomaly and TTP analytics are enabled. TTP may be set
32-
to Notables for point detections, anomaly should not be notables but risk generators.
32+
to finding for point detections, anomaly should not be findings but risk generators.
3333
The correlation relies on more than x amount of distict detection names generated
34-
before generating a notable. Modify the value as needed. Default value is set to
34+
before generating a finding. Modify the value as needed. Default value is set to
3535
4. This value may need to be increased based on activity in your environment.
3636
known_false_positives: False positives will be present based on many factors. Tune
3737
the correlation as needed to reduce too many triggers.

detections/endpoint/powershell_start_or_stop_service.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ how_to_implement: To successfully implement this analytic, you will need to enab
2323
https://docs.splunk.com/Documentation/UBA/5.0.4.1/GetDataIn/AddPowerShell#Configure_module_logging_for_PowerShell.
2424
known_false_positives: This behavior may be noisy, as these cmdlets are commonly used
2525
by system administrators or other legitimate users to manage services. Therefore,
26-
it is recommended not to enable this analytic as a direct notable or TTP. Instead,
26+
it is recommended not to enable this analytic as a direct finding Instead,
2727
it should be used as part of a broader set of security controls to detect and investigate
2828
potential threats.
2929
references:

detections/endpoint/windows_drivers_loaded_by_signature.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ how_to_implement: To successfully implement this search, you need to be ingestin
2323
endpoints. If you are using Sysmon, you must have the latest version of the Sysmon
2424
TA. Most EDR products provide the ability to review driver loads, or module loads,
2525
and using a query as such help with hunting for malicious drivers.
26-
known_false_positives: This analytic is meant to assist with identifying drivers loaded
27-
in the environment and not to be setup for notables off the bat.
26+
known_false_positives: This analytic is meant to assist with identifying and hunting drivers loaded
27+
in the environment.
2828
references:
2929
- https://redcanary.com/blog/tracking-driver-inventory-to-expose-rootkits/
3030
- https://attack.mitre.org/techniques/T1014/

0 commit comments

Comments
 (0)