Skip to content

Commit e5f870a

Browse files
authored
Merge pull request #3348 from splunk/update-exchange-macro
Update Exchange Macro
2 parents 7966993 + d2ca0de commit e5f870a

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

detections/endpoint/exchange_powershell_abuse_via_ssrf.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Exchange PowerShell Abuse via SSRF
22
id: 29228ab4-0762-11ec-94aa-acde48001122
3-
version: 5
4-
date: '2024-11-13'
3+
version: 6
4+
date: '2025-02-19'
55
author: Michael Haag, Splunk
66
status: experimental
77
type: TTP
@@ -14,7 +14,7 @@ description: The following analytic detects suspicious behavior indicative of Pr
1414
If confirmed malicious, this could lead to unauthorized access, privilege escalation,
1515
or persistent control over the Exchange environment.
1616
data_source: []
17-
search: '`exchange` c_uri="*//autodiscover*" cs_uri_query="*PowerShell*" cs_method="POST"
17+
search: '`windows_exchange_iis` c_uri="*//autodiscover*" cs_uri_query="*PowerShell*" cs_method="POST"
1818
| stats count min(_time) as firstTime max(_time) as lastTime by dest, cs_uri_query,
1919
cs_method, c_uri | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
2020
| `exchange_powershell_abuse_via_ssrf_filter`'

macros/exchange.yml

Lines changed: 0 additions & 4 deletions
This file was deleted.

macros/windows_exchange_iis.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
definition: (sourcetype="MSWindows:2003:IIS" OR sourcetype="MSWindows:2008R2:IIS" OR sourcetype="MSWindows:2010EWS:IIS" OR sourcetype="MSWindows:2012:IIS" OR sourcetype="MSWindows:2013EWS:IIS")
2+
description: customer specific splunk configurations(eg- index, source, sourcetype).
3+
Replace the macro definition with configurations for your Splunk Environment.
4+
name: windows_exchange_iis

0 commit comments

Comments
 (0)