-
Notifications
You must be signed in to change notification settings - Fork 604
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 7 #5022
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,8 +1,8 @@ | ||
[metadata] | ||
creation_date = "2020/12/14" | ||
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"] | ||
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"] | ||
maturity = "production" | ||
updated_date = "2025/03/20" | ||
updated_date = "2025/08/26" | ||
|
||
[rule] | ||
author = ["Elastic"] | ||
|
@@ -18,6 +18,7 @@ index = [ | |
"endgame-*", | ||
"logs-m365_defender.event-*", | ||
"logs-sentinel_one_cloud_funnel.*", | ||
"logs-crowdstrike.fdr*", | ||
] | ||
language = "eql" | ||
license = "Elastic License v2" | ||
|
@@ -74,6 +75,7 @@ tags = [ | |
"Data Source: Sysmon", | ||
"Data Source: Microsoft Defender for Endpoint", | ||
"Data Source: SentinelOne", | ||
"Data Source: Crowdstrike", | ||
"Resources: Investigation Guide", | ||
] | ||
timestamp_override = "event.ingested" | ||
|
@@ -90,11 +92,7 @@ registry where host.os.type == "windows" and event.type == "change" and registry | |
"SolarWinds.Collector.Service*.exe", | ||
"SolarwindsDiagnostics*.exe" | ||
) and | ||
registry.path : ( | ||
"HKLM\\SYSTEM\\*ControlSet*\\Services\\*\\Start", | ||
"\\REGISTRY\\MACHINE\\SYSTEM\\*ControlSet*\\Services\\*\\Start", | ||
"MACHINE\\SYSTEM\\*ControlSet*\\Services\\*\\Start" | ||
) and | ||
Comment on lines
-93
to
-97
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. @w0rk3r CS regmod paths is There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. To simplify the query, unless this could cause any FPs. Performance should be similar or better as doing multiple wildcards 3 times should be expensive |
||
registry.path : "*\\SYSTEM\\*ControlSet*\\Services\\*\\Start" and | ||
registry.data.strings : ("4", "0x00000004") | ||
''' | ||
|
||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,8 +1,8 @@ | ||
[metadata] | ||
creation_date = "2020/11/15" | ||
integration = ["endpoint", "windows", "m365_defender"] | ||
integration = ["endpoint", "windows", "m365_defender", "crowdstrike"] | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. @w0rk3r I would suggest to also add sentinel1 and 4688 compat here by removing this sub-condition from the query There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Maybe this is better as a separated rule? Sounds like a diff logic |
||
maturity = "production" | ||
updated_date = "2025/05/05" | ||
updated_date = "2025/08/26" | ||
|
||
[transform] | ||
[[transform.osquery]] | ||
|
@@ -44,6 +44,7 @@ index = [ | |
"logs-windows.sysmon_operational-*", | ||
"endgame-*", | ||
"logs-m365_defender.event-*", | ||
"logs-crowdstrike.fdr*", | ||
] | ||
language = "eql" | ||
license = "Elastic License v2" | ||
|
@@ -105,10 +106,11 @@ tags = [ | |
"Use Case: Threat Detection", | ||
"Tactic: Defense Evasion", | ||
"Data Source: Elastic Endgame", | ||
"Resources: Investigation Guide", | ||
"Data Source: Elastic Defend", | ||
"Data Source: Sysmon", | ||
"Data Source: Microsoft Defender for Endpoint", | ||
"Data Source: Crowdstrike", | ||
"Resources: Investigation Guide", | ||
] | ||
timestamp_override = "event.ingested" | ||
type = "eql" | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
FYI CS can also be added by making the exclusion by parent.executable optional this rule is related to one of the top TTPs https://github.com/elastic/detection-rules/pull/5001/files#diff-8c40e59c5638910d4a38ec146c0076b58f27eddc05eca33cae6bed157b3baf84R3 (should be addressed by this PR)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As the changes doesn't conflict between our PRs, I'll keep this one as is and we can add Defend and CS at yours