Skip to content

Commit 7ebb49e

Browse files
committed
update logic to avoid duplicate alerting
1 parent 318f3ea commit 7ebb49e

File tree

2 files changed

+6
-7
lines changed

2 files changed

+6
-7
lines changed

detections/endpoint/system_user_discovery_with_query.yml

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: System User Discovery With Query
22
id: ad03bfcf-8a91-4bc2-a500-112993deba87
3-
version: 4
4-
date: '2024-11-13'
3+
version: 5
4+
date: '2025-02-05'
55
author: Mauricio Velazco, Splunk
66
status: production
77
type: Hunting
@@ -17,9 +17,8 @@ data_source:
1717
- Windows Event Log Security 4688
1818
- CrowdStrike ProcessRollup2
1919
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
20-
as lastTime from datamodel=Endpoint.Processes where (Processes.process_name="query.exe")
21-
(Processes.process=*user*) by Processes.dest Processes.user Processes.parent_process
22-
Processes.process_name Processes.process Processes.process_id Processes.parent_process_id
20+
as lastTime from datamodel=Endpoint.Processes where (Processes.process_name="query.exe" OR Processes.original_file_name="query.exe")
21+
AND Processes.process="*user*" AND ((NOT Processes.process="*/server*") OR Processes.process IN ("*/server:localhost*", "*/server:127.0.0.1*")) by Processes.dest Processes.user Processes.parent_process Processes.process_name Processes.process Processes.process_id Processes.parent_process_id
2322
| `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
2423
| `system_user_discovery_with_query_filter`'
2524
how_to_implement: The detection is based on data that originates from Endpoint Detection

detections/endpoint/windows_system_remote_discovery_with_query.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows System Remote Discovery With Query
22
id: 94859172-a521-474f-97ac-4cf4b09634a3
33
version: 1
4-
date: '2025-01-06'
4+
date: '2025-02-05'
55
author: Steven Dick
66
status: production
77
type: Anomaly
@@ -11,7 +11,7 @@ data_source:
1111
- Windows Security Event ID 4688
1212
- CrowdStrike ProcessRollup2
1313
search: |-
14-
| tstats `security_content_summariesonly` values(Processes.process_current_directory) as Processes.process_current_directory values(Processes.process_id) as Processes.process_id values(Processes.process) as Processes.process values(Processes.parent_process_id) as Processes.parent_process_id values(Processes.parent_process) as Processes.parent_process count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where (Processes.process_name="query.exe" OR Processes.original_file_name="query.exe") AND (Processes.process=*/server*) by Processes.dest Processes.user Processes.process_name Processes.parent_process_name
14+
| tstats `security_content_summariesonly` values(Processes.process_current_directory) as Processes.process_current_directory values(Processes.process_id) as Processes.process_id values(Processes.process) as Processes.process values(Processes.parent_process_id) as Processes.parent_process_id values(Processes.parent_process) as Processes.parent_process count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where (Processes.process_name="query.exe" OR Processes.original_file_name="query.exe") AND (Processes.process="*/server*") AND NOT Processes.process IN ("*/server:localhost*", "*/server:127.0.0.1*") by Processes.dest Processes.user Processes.process_name Processes.parent_process_name
1515
| `drop_dm_object_name(Processes)`
1616
| `security_content_ctime(firstTime)`
1717
| `security_content_ctime(lastTime)`

0 commit comments

Comments
 (0)