diff --git a/source/proof-of-concept-guide/audit-commands-run-by-user.rst b/source/proof-of-concept-guide/audit-commands-run-by-user.rst
index 267b87afaa..56a1f69cc5 100644
--- a/source/proof-of-concept-guide/audit-commands-run-by-user.rst
+++ b/source/proof-of-concept-guide/audit-commands-run-by-user.rst
@@ -105,7 +105,7 @@ Perform the following steps to create a CDB list of malicious programs and rules
.. code-block:: xml
- etc/lists/suspicious-programs
+ /etc/lists/suspicious-programs
#. Create a high severity rule to fire when a "red" program is executed. Add this new rule to the ``/var/ossec/etc/rules/local_rules.xml`` file on the Wazuh server.
@@ -114,7 +114,7 @@ Perform the following steps to create a CDB list of malicious programs and rules
80792
- etc/lists/suspicious-programs
+ /etc/lists/suspicious-programs
Audit: Highly Suspicious Command executed: $(audit.exe)
audit_command,