File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change 1
- name : Windows Process File Path in ProgramData
1
+ name : Windows Process Execution From ProgramData
2
2
id : 237016fa-d8e6-47b4-80f9-70c4d42c72c0
3
3
version : 1
4
4
date : ' 2025-03-13'
@@ -13,12 +13,12 @@ data_source:
13
13
search : ' | tstats `security_content_summariesonly` count values(Processes.process_name)
14
14
as process_name values(Processes.process) as process min(_time) as firstTime max(_time)
15
15
as lastTime from datamodel=Endpoint.Processes
16
- where Processes.process_path = "*:\\programdata \\*"
16
+ where Processes.process_path = "*:\\ProgramData \\*"
17
17
by Processes.parent_process_name Processes.parent_process Processes.process_path Processes.dest Processes.user
18
18
| `drop_dm_object_name(Processes)`
19
19
| `security_content_ctime(firstTime)`
20
20
| `security_content_ctime(lastTime)`
21
- | `windows_process_file_path_in_programdata_filter `'
21
+ | `windows_process_execution_from_programdata_filter `'
22
22
how_to_implement : The detection is based on data that originates from Endpoint Detection
23
23
and Response (EDR) agents. These agents are designed to provide security-related
24
24
telemetry from the endpoints where the agent is installed. To implement this search,
You can’t perform that action at this time.
0 commit comments