- Notifications
You must be signed in to change notification settings - Fork 603
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 2 #5017
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Rule: Tuning - GuidelinesThese guidelines serve as a reminder set of considerations when tuning an existing rule. Documentation and Context
Rule Metadata Checks
Testing and Validation
|
⛔️ Test failed Results
|
⛔️ Test failed Results
|
⛔️ Test failed Results
|
rules/windows/defense_evasion_code_signing_policy_modification_registry.toml Show resolved Hide resolved
query = ''' | ||
process where host.os.type == "windows" and event.type == "start" and | ||
process where host.os.type == "windows" and event.type == "start" and | ||
not process.executable : |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
those FPs are duplicated in every comm-app, common FPs should be grouped for simplicity.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That is a nice move, thanks!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe we should also check if signed/trusted?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
no need as it require local admin to write there and there are no known lolbins in that folder.
integration = ["endpoint", "windows", "m365_defender", "crowdstrike"] | ||
maturity = "production" | ||
updated_date = "2025/05/05" | ||
updated_date = "2025/08/26" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@w0rk3r unrelated to this PR scope, would be good to update this rule to cover other LOLBINs/system utilities instead of being limited to MSbuild, also severity should be high (very low FPs)
Similar ER that can be used to update this rule :
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll put it in my todo 👍🏼
rules/windows/defense_evasion_communication_apps_suspicious_child_process.toml Outdated Show resolved Hide resolved
⛔️ Test failed Results
|
⛔️ Test failed Results
|
⛔️ Test failed Results
|
⛔️ Test failed Results
|
Issue
Related (but not limited) to https://github.com/elastic/ia-trade-team/issues/498
Summary
This PR is part of a series that adds compatibility for additional data sources, including CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, Endgame, and Sysmon.
To review this PR, you can use the EDR Field Compatibility Matrix, which details field compatibility for each event.category across EDR data sources.
Some changes go beyond metadata and include logic updates to optimize, simplify, or account for differences between data sources (For example, CrowdStrike uses NT Object paths for Windows paths instead of drive letters.). Please review these cases with extra attention, and don’t hesitate to ask questions.