- Notifications
You must be signed in to change notification settings - Fork 603
[Rule Tuning] Windows 3rd Party EDR Compatibility - Part 4 #5019
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Rule: Tuning - GuidelinesThese guidelines serve as a reminder set of considerations when tuning an existing rule. Documentation and Context
Rule Metadata Checks
Testing and Validation
|
⛔️ Test failed Results
|
query = ''' | ||
registry where host.os.type == "windows" and event.type == "change" and | ||
registry.path : ("HKLM\\SYSTEM\\ControlSet*\\Control\\Lsa\\RunAsPPL", "\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet*\\Control\\Lsa\\RunAsPPL") and | ||
registry.value : "RunAsPPL" and registry.path : "*\\SYSTEM\\*ControlSet*\\Control\\Lsa\\RunAsPPL" and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@w0rk3r CS reg event is \\REGISTRY\\MACHINE\\SYSTEM\\ControlSet*\\Control\\Lsa\\RunAsPPL
why using wildcard here ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
To simplify the logic, the performance should be ok as I added the registry.value
condition
"Data Source: Elastic Defend", | ||
"Data Source: Sysmon", | ||
"Data Source: Microsoft Defender for Endpoint", | ||
"Data Source: Crowdstrike", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
FYI - this rule scope will be expanded by this PR https://github.com/elastic/detection-rules/pull/5001/files#diff-144ed12542ec43b6381b1bb6ec737eae308465ef0f213f9444e87f187bfa0b7dR121 (no action required)
rules/windows/defense_evasion_microsoft_defender_tampering.toml Outdated Show resolved Hide resolved
/* Slack */ | ||
(process.name : "slack.exe" and not | ||
(process.code_signature.subject_name in ( | ||
(process.code_signature.subject_name : ( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
FYI for the reviewers, changing this to be case insensitive as S1 populates this field with all uppercase
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
⛔️ Test failed Results
|
⛔️ Test failed Results
|
Issue
Related (but not limited) to https://github.com/elastic/ia-trade-team/issues/498
Summary
This PR is part of a series that adds compatibility for additional data sources, including CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, Endgame, and Sysmon.
To review this PR, you can use the EDR Field Compatibility Matrix, which details field compatibility for each event.category across EDR data sources.
Some changes go beyond metadata and include logic updates to optimize, simplify, or account for differences between data sources (For example, CrowdStrike uses NT Object paths for Windows paths instead of drive letters.). Please review these cases with extra attention, and don’t hesitate to ask questions.