Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions rules/windows/credential_access_spn_attribute_modified.toml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2022/02/22"
integration = ["system", "windows"]
maturity = "production"
updated_date = "2025/03/20"
updated_date = "2025/09/11"

[rule]
author = ["Elastic"]
Expand Down Expand Up @@ -58,7 +58,7 @@ references = [
"https://adsecurity.org/?p=280",
"https://github.com/OTRF/Set-AuditRule",
]
risk_score = 73
risk_score = 47
rule_id = "0b2f3da5-b5ec-47d1-908b-6ebb74814289"
setup = """## Setup

Expand All @@ -83,7 +83,7 @@ As this specifies the servicePrincipalName Attribute GUID, it is expected to be
Set-AuditRule -AdObjectPath 'AD:\\CN=Users,DC=Domain,DC=com' -WellKnownSidType WorldSid -Rights WriteProperty -InheritanceFlags Children -AttributeGUID f3a64788-5306-11d1-a9c5-0000f80367c1 -AuditFlags Success
```
"""
severity = "high"
severity = "medium"
tags = [
"Domain: Endpoint",
"OS: Windows",
Expand Down
6 changes: 3 additions & 3 deletions rules/windows/discovery_high_number_ad_properties.toml
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This one is very noisy, and I couldn't find a way to tune it down

Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2023/01/29"
integration = ["windows", "system"]
maturity = "production"
updated_date = "2025/03/20"
updated_date = "2025/09/11"

[rule]
author = ["Elastic"]
Expand Down Expand Up @@ -49,7 +49,7 @@ LDAP (Lightweight Directory Access Protocol) is crucial for querying and modifyi
- Implement additional monitoring on LDAP queries and Active Directory access to detect similar patterns of excessive attribute queries in the future.
- Review and tighten access controls and permissions within Active Directory to ensure that only necessary attributes are accessible to users based on their roles.
- Conduct a post-incident review to identify any gaps in security controls and update policies or procedures to prevent recurrence of similar threats."""
risk_score = 73
risk_score = 21
rule_id = "68ad737b-f90a-4fe5-bda6-a68fa460044e"
setup = """The 'Audit Directory Service Changes' logging policy must be configured for (Success, Failure).
Steps to implement the logging policy with Advanced Audit Configuration:
Expand All @@ -63,7 +63,7 @@ Audit Policies >
DS Access >
Audit Directory Service Changes (Success,Failure)
"""
severity = "high"
severity = "low"
tags = [
"Domain: Endpoint",
"OS: Windows",
Expand Down
8 changes: 4 additions & 4 deletions rules/windows/impact_high_freq_file_renames_by_kernel.toml
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Noisy and not great at performance, and the threshold rule type doesn't expose any information for us to work in a tuning. Lowering the severity until we work in a ES|QL Conversion

#4653

Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2024/05/03"
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
maturity = "production"
updated_date = "2025/03/20"
updated_date = "2025/09/11"

[rule]
author = ["Elastic"]
Expand Down Expand Up @@ -59,9 +59,9 @@ note = """## Triage and analysis
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
"""
references = ["https://news.sophos.com/en-us/2023/12/21/akira-again-the-ransomware-that-keeps-on-taking/"]
risk_score = 73
risk_score = 21
rule_id = "1397e1b9-0c90-4d24-8d7b-80598eb9bc9a"
severity = "high"
severity = "low"
tags = [
"Domain: Endpoint",
"OS: Windows",
Expand Down Expand Up @@ -115,5 +115,5 @@ reference = "https://attack.mitre.org/tactics/TA0008/"

[rule.threshold]
field = ["host.id", "file.name"]
value = 20
value = 25

14 changes: 12 additions & 2 deletions rules/windows/privilege_escalation_exploit_cve_202238028.toml
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,13 @@
creation_date = "2024/04/23"
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
maturity = "production"
updated_date = "2025/08/26"
updated_date = "2025/09/11"

[rule]
author = ["Elastic"]
description = "Identifies a privilege escalation attempt via exploiting CVE-2022-38028 to hijack the print spooler service execution.\n"
description = """
Identifies a privilege escalation attempt via exploiting CVE-2022-38028 to hijack the print spooler service execution.
"""
from = "now-9m"
index = [
"logs-endpoint.events.file-*",
Expand Down Expand Up @@ -86,6 +88,14 @@ file where host.os.type == "windows" and event.type != "deletion" and
"?:\\*\\Windows\\WinSxS\\amd64_microsoft-windows-printing-printtopdf_*\\MPDW-constraints.js",
"\\Device\\HarddiskVolume*\\*\\Windows\\system32\\DriverStore\\FileRepository\\*\\MPDW-constraints.js",
"\\Device\\HarddiskVolume*\\*\\Windows\\WinSxS\\amd64_microsoft-windows-printing-printtopdf_*\\MPDW-constraints.js"
) and
not process.executable : (
"?:\\$WINDOWS.~BT\\Sources\\SetupHost.exe",
"?:\\Windows\\System32\\taskhostw.exe"
) and
not file.path : (
"?:\\$WINDOWS.~BT\\NewOS\\Windows\\WinSxS\\*\\MPDW-constraints.js",
"\\Device\\HarddiskVolume*\\$WINDOWS.~BT\\NewOS\\Windows\\WinSxS\\*\\MPDW-constraints.js"
)
'''

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2020/11/26"
integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
maturity = "production"
updated_date = "2025/08/26"
updated_date = "2025/09/11"

[rule]
author = ["Elastic"]
Expand Down Expand Up @@ -81,7 +81,7 @@ type = "eql"

query = '''
registry where host.os.type == "windows" and event.type == "change" and
registry.value : ("windir", "systemroot") and
registry.value : ("windir", "systemroot") and registry.data.strings != null and
registry.path : (
"*\\Environment\\windir",
"*\\Environment\\systemroot"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2020/03/17"
integration = ["endpoint", "windows", "system", "m365_defender", "sentinel_one_cloud_funnel", "crowdstrike"]
maturity = "production"
updated_date = "2025/09/01"
updated_date = "2025/09/11"

[transform]
[[transform.osquery]]
Expand Down Expand Up @@ -136,8 +136,8 @@ process where host.os.type == "windows" and event.type == "start" and
"?:\\Windows\\System32\\WerFault.exe",

/* Crowdstrike specific exclusion as it uses NT Object paths */
"?\\Device\\HarddiskVolume*\\Windows\\Sys?????\\mmc.exe",
"?\\Device\\HarddiskVolume*\\Windows\\Sys?????\\WerFault.exe"
"\\Device\\HarddiskVolume*\\Windows\\Sys?????\\mmc.exe",
"\\Device\\HarddiskVolume*\\Windows\\Sys?????\\WerFault.exe"
)
'''

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2022/02/07"
integration = ["system", "windows"]
maturity = "production"
updated_date = "2025/06/19"
updated_date = "2025/09/11"

[rule]
author = ["Elastic"]
Expand Down Expand Up @@ -96,7 +96,13 @@ configuration where host.os.type == "windows" and
"?:\\Windows\\VeeamVssSupport\\VeeamGuestHelper.exe",
"?:\\Windows\\VeeamLogShipper\\VeeamLogShipper.exe",
"%SystemRoot%\\system32\\Drivers\\Crowdstrike\\*-CsInstallerService.exe",
"\"%windir%\\AdminArsenal\\PDQInventory-Scanner\\service-1\\PDQInventory-Scanner-1.exe\" "
"\"%windir%\\AdminArsenal\\PDQInventory-Scanner\\service-1\\PDQInventory-Scanner-1.exe\" ",
"\"%windir%\\AdminArsenal\\PDQDeployRunner\\service-1\\PDQDeployRunner-1.exe\" ",
"\"%windir%\\AdminArsenal\\PDQInventoryWakeCommand\\service-1\\PDQInventoryWakeCommand-1.exe\" ",
"\"%SystemRoot%\\nsnetpush.exe\"",
"\"C:\\WINDOWS\\ccmsetup\\ccmsetup.exe\" /runservice /ignoreskipupgrade /config:MobileClient.tcf",
"\"?:\\SMS\\bin\\x64\\srvboot.exe\"",
"%SystemRoot%\\pbpsdeploy.exe"
)
'''

Expand Down
Loading