Skip to content

[Rule Tuning] Potential Antimalware Scan Interface Bypass via PowerShell #4752

@drummbelbummel

Description

@drummbelbummel

Link to Rule

https://github.com/elastic/detection-rules/blob/bfca0ea4142cb29321ddfc30412963db4e599333/rules/windows/defense_evasion_amsi_bypass_powershell.toml#L135C7-L135C40

Rule Tuning Type

False Positives - Reducing benign events mistakenly identified as threats.

Description

on intune managed devices it seems to be "normal" that microsoft is creating script files. As there's no path info it is not possible to create an rule exception. Any idea on how this can be improved?

Example Data

example.json

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions