diff --git a/source/proof-of-concept-guide/audit-commands-run-by-user.rst b/source/proof-of-concept-guide/audit-commands-run-by-user.rst index 267b87afaa..56a1f69cc5 100644 --- a/source/proof-of-concept-guide/audit-commands-run-by-user.rst +++ b/source/proof-of-concept-guide/audit-commands-run-by-user.rst @@ -105,7 +105,7 @@ Perform the following steps to create a CDB list of malicious programs and rules .. code-block:: xml - etc/lists/suspicious-programs + /etc/lists/suspicious-programs #. Create a high severity rule to fire when a "red" program is executed. Add this new rule to the ``/var/ossec/etc/rules/local_rules.xml`` file on the Wazuh server. @@ -114,7 +114,7 @@ Perform the following steps to create a CDB list of malicious programs and rules 80792 - etc/lists/suspicious-programs + /etc/lists/suspicious-programs Audit: Highly Suspicious Command executed: $(audit.exe) audit_command,