Skip to content

Commit e21fe10

Browse files
authored
Update and rename windows_process_file_path_in_programdata.yml to windows_process_execution_from_programdata.yml
1 parent 603fe53 commit e21fe10

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

detections/endpoint/windows_process_file_path_in_programdata.yml renamed to detections/endpoint/windows_process_execution_from_programdata.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
name: Windows Process File Path in ProgramData
1+
name: Windows Process Execution From ProgramData
22
id: 237016fa-d8e6-47b4-80f9-70c4d42c72c0
33
version: 1
44
date: '2025-03-13'
@@ -13,12 +13,12 @@ data_source:
1313
search: '| tstats `security_content_summariesonly` count values(Processes.process_name)
1414
as process_name values(Processes.process) as process min(_time) as firstTime max(_time)
1515
as lastTime from datamodel=Endpoint.Processes
16-
where Processes.process_path = "*:\\programdata\\*"
16+
where Processes.process_path = "*:\\ProgramData\\*"
1717
by Processes.parent_process_name Processes.parent_process Processes.process_path Processes.dest Processes.user
1818
| `drop_dm_object_name(Processes)`
1919
| `security_content_ctime(firstTime)`
2020
| `security_content_ctime(lastTime)`
21-
| `windows_process_file_path_in_programdata_filter`'
21+
| `windows_process_execution_from_programdata_filter`'
2222
how_to_implement: The detection is based on data that originates from Endpoint Detection
2323
and Response (EDR) agents. These agents are designed to provide security-related
2424
telemetry from the endpoints where the agent is installed. To implement this search,

0 commit comments

Comments
 (0)