Skip to content

Commit efeefea

Browse files
w0rk3rgithub-actions[bot]
authored andcommitted
[Rule Tuning] Add Initial Microsoft Defender for Endpoint Compatibility to Windows DRs (#3825)
* [Rule Tuning] Add Initial Microsoft Defender for Endpoint Compatibility to Windows DRs * . * Update integration-schemas.json.gz * Fix integration manifests (cherry picked from commit 54d5b44)
1 parent fc3ce2d commit efeefea

24 files changed

+90
-77
lines changed
498 Bytes
Binary file not shown.
Binary file not shown.

detection_rules/schemas/definitions.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,8 @@
4141
'system',
4242
'windows',
4343
'sentinel_one_cloud_funnel',
44-
'ti_rapid7_threat_command']
44+
'ti_rapid7_threat_command',
45+
'm365_defender']
4546
NON_PUBLIC_FIELDS = {
4647
"related_integrations": (Version.parse('8.3.0'), None),
4748
"required_fields": (Version.parse('8.3.0'), None),

rules/windows/collection_email_powershell_exchange_mailbox.toml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2020/12/15"
3-
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "system", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
66
min_stack_version = "8.13.0"
7-
updated_date = "2024/06/11"
7+
updated_date = "2024/06/25"
88

99
[rule]
1010
author = ["Elastic"]
@@ -14,7 +14,7 @@ mailbox or archive to a .pst file. Adversaries may target user email to collect
1414
"""
1515
false_positives = ["Legitimate exchange system administration activity."]
1616
from = "now-9m"
17-
index = ["logs-endpoint.events.process-*", "winlogbeat-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*"]
17+
index = ["logs-endpoint.events.process-*", "winlogbeat-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
1818
language = "eql"
1919
license = "Elastic License v2"
2020
name = "Exporting Exchange Mailbox via PowerShell"
@@ -74,7 +74,7 @@ Hence for this rule to work effectively, users will need to add a custom ingest
7474
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
7575
"""
7676
severity = "medium"
77-
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Collection", "Tactic: Execution", "Resources: Investigation Guide", "Data Source: Elastic Endgame", "Data Source: Elastic Defend", "Data Source: SentinelOne"]
77+
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Collection", "Tactic: Execution", "Resources: Investigation Guide", "Data Source: Elastic Endgame", "Data Source: Elastic Defend", "Data Source: SentinelOne", "Data Source: Microsoft Defender for Endpoint"]
7878
timestamp_override = "event.ingested"
7979
type = "eql"
8080

rules/windows/command_and_control_rdp_tunnel_plink.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2020/10/14"
3-
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
66
min_stack_version = "8.13.0"
7-
updated_date = "2024/06/11"
7+
updated_date = "2024/06/25"
88

99
[rule]
1010
author = ["Elastic"]
@@ -13,7 +13,7 @@ Identifies potential use of an SSH utility to establish RDP over a reverse SSH T
1313
enable routing of network packets that would otherwise not reach their intended destination.
1414
"""
1515
from = "now-9m"
16-
index = ["logs-endpoint.events.process-*", "winlogbeat-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*"]
16+
index = ["logs-endpoint.events.process-*", "winlogbeat-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Potential Remote Desktop Tunneling Detected"
@@ -72,7 +72,8 @@ tags = [
7272
"Resources: Investigation Guide",
7373
"Data Source: Elastic Endgame",
7474
"Data Source: Elastic Defend",
75-
"Data Source: SentinelOne"
75+
"Data Source: SentinelOne",
76+
"Data Source: Microsoft Defender for Endpoint"
7677
]
7778
timestamp_override = "event.ingested"
7879
type = "eql"

rules/windows/command_and_control_screenconnect_childproc.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2024/03/27"
3-
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
66
min_stack_version = "8.13.0"
7-
updated_date = "2024/06/11"
7+
updated_date = "2024/06/25"
88

99
[rule]
1010
author = ["Elastic"]
@@ -13,7 +13,7 @@ Identifies suspicious processes being spawned by the ScreenConnect client proces
1313
abusing unauthorized access to the ScreenConnect remote access software.
1414
"""
1515
from = "now-9m"
16-
index = ["logs-endpoint.events.process-*", "winlogbeat-*", "logs-windows.sysmon_operational-*", "logs-system.security*", "endgame-*", "logs-sentinel_one_cloud_funnel.*"]
16+
index = ["logs-endpoint.events.process-*", "winlogbeat-*", "logs-windows.sysmon_operational-*", "logs-system.security*", "endgame-*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Suspicious ScreenConnect Client Child Process"
@@ -30,7 +30,8 @@ tags = [
3030
"Data Source: Elastic Endgame",
3131
"Data Source: Elastic Defend",
3232
"Data Source: Sysmon",
33-
"Data Source: SentinelOne"
33+
"Data Source: SentinelOne",
34+
"Data Source: Microsoft Defender for Endpoint"
3435
]
3536
timestamp_override = "event.ingested"
3637
type = "eql"

rules/windows/credential_access_domain_backup_dpapi_private_keys.toml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2020/08/13"
3-
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
66
min_stack_version = "8.13.0"
7-
updated_date = "2024/06/11"
7+
updated_date = "2024/06/25"
88

99
[rule]
1010
author = ["Elastic"]
@@ -13,7 +13,7 @@ Identifies the creation or modification of Domain Backup private keys. Adversari
1313
(DPAPI) domain backup key from a Domain Controller (DC) to be able to decrypt any domain user master key file.
1414
"""
1515
from = "now-9m"
16-
index = ["winlogbeat-*", "logs-endpoint.events.file-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-sentinel_one_cloud_funnel.*"]
16+
index = ["winlogbeat-*", "logs-endpoint.events.file-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
1717
language = "eql"
1818
license = "Elastic License v2"
1919
name = "Creation or Modification of Domain Backup DPAPI private key"
@@ -36,7 +36,7 @@ Hence for this rule to work effectively, users will need to add a custom ingest
3636
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
3737
"""
3838
severity = "high"
39-
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Credential Access", "Data Source: Elastic Endgame", "Data Source: Elastic Defend", "Data Source: Sysmon", "Data Source: SentinelOne"]
39+
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Credential Access", "Data Source: Elastic Endgame", "Data Source: Elastic Defend", "Data Source: Sysmon", "Data Source: SentinelOne", "Data Source: Microsoft Defender for Endpoint"]
4040
timestamp_override = "event.ingested"
4141
type = "eql"
4242

rules/windows/credential_access_kirbi_file.toml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2023/08/23"
3-
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
66
min_stack_version = "8.13.0"
7-
updated_date = "2024/06/11"
7+
updated_date = "2024/06/25"
88

99
[rule]
1010
author = ["Elastic"]
@@ -14,14 +14,14 @@ Kerberos ticket dump utilities, such as Mimikatz, and precedes attacks such as P
1414
attacker to impersonate users using Kerberos tickets.
1515
"""
1616
from = "now-9m"
17-
index = ["logs-endpoint.events.file-*", "logs-windows.sysmon_operational-*", "logs-sentinel_one_cloud_funnel.*"]
17+
index = ["logs-endpoint.events.file-*", "logs-windows.sysmon_operational-*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
1818
language = "eql"
1919
license = "Elastic License v2"
2020
name = "Kirbi File Creation"
2121
risk_score = 47
2222
rule_id = "b8f8da2d-a9dc-48c0-90e4-955c0aa1259a"
2323
severity = "medium"
24-
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Credential Access", "Data Source: Elastic Defend", "Data Source: Sysmon", "Data Source: SentinelOne"]
24+
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Credential Access", "Data Source: Elastic Defend", "Data Source: Sysmon", "Data Source: SentinelOne", "Data Source: Microsoft Defender for Endpoint"]
2525
timestamp_override = "event.ingested"
2626
type = "eql"
2727

rules/windows/credential_access_lsass_openprocess_api.toml

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2023/03/02"
3-
integration = ["endpoint"]
3+
integration = ["endpoint", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2024/05/21"
5+
updated_date = "2024/06/25"
66

77
[transform]
88
[[transform.osquery]]
@@ -34,7 +34,7 @@ authenticode.path JOIN hash ON services.path = hash.path WHERE authenticode.resu
3434
author = ["Elastic"]
3535
description = "Identifies access attempts to the LSASS handle, which may indicate an attempt to dump credentials from LSASS memory.\n"
3636
from = "now-9m"
37-
index = ["logs-endpoint.events.api-*"]
37+
index = ["logs-endpoint.events.api-*", "logs-m365_defender.event-*"]
3838
language = "eql"
3939
license = "Elastic License v2"
4040
name = "LSASS Process Access via Windows API"
@@ -112,16 +112,15 @@ tags = [
112112
"Tactic: Credential Access",
113113
"Tactic: Execution",
114114
"Data Source: Elastic Defend",
115+
"Data Source: Microsoft Defender for Endpoint"
115116
]
116117
timestamp_override = "event.ingested"
117118
type = "eql"
118119

119120
query = '''
120121
api where host.os.type == "windows" and
121122
process.Ext.api.name in ("OpenProcess", "OpenThread") and Target.process.name : "lsass.exe" and
122-
not
123-
(
124-
process.executable : (
123+
not process.executable : (
125124
"?:\\ProgramData\\GetSupportService*\\Updates\\Update_*.exe",
126125
"?:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\*\\MsMpEng.exe",
127126
"?:\\Program Files (x86)\\Asiainfo Security\\OfficeScan Client\\NTRTScan.exe",
@@ -158,7 +157,6 @@ api where host.os.type == "windows" and
158157
"?:\\Windows\\System32\\RtkAudUService64.exe",
159158
"?:\\Windows\\System32\\wbem\\WmiPrvSE.exe",
160159
"?:\\Windows\\SysWOW64\\wbem\\WmiPrvSE.exe"
161-
) and process.code_signature.trusted == true
162160
)
163161
'''
164162

rules/windows/defense_evasion_amsi_bypass_dllhijack.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2023/01/17"
3-
integration = ["windows", "endpoint", "sentinel_one_cloud_funnel"]
3+
integration = ["windows", "endpoint", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
66
min_stack_version = "8.13.0"
7-
updated_date = "2024/06/11"
7+
updated_date = "2024/06/25"
88

99
[transform]
1010
[[transform.osquery]]
@@ -39,7 +39,7 @@ Identifies the creation of the Antimalware Scan Interface (AMSI) DLL in an unusu
3939
attempt to bypass AMSI by loading a rogue AMSI module instead of the legit one.
4040
"""
4141
from = "now-9m"
42-
index = ["winlogbeat-*", "logs-endpoint.events.file-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-sentinel_one_cloud_funnel.*"]
42+
index = ["winlogbeat-*", "logs-endpoint.events.file-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
4343
language = "eql"
4444
license = "Elastic License v2"
4545
name = "Suspicious Antimalware Scan Interface DLL"
@@ -104,7 +104,8 @@ tags = [
104104
"Resources: Investigation Guide",
105105
"Data Source: Elastic Defend",
106106
"Data Source: Sysmon",
107-
"Data Source: SentinelOne"
107+
"Data Source: SentinelOne",
108+
"Data Source: Microsoft Defender for Endpoint"
108109
]
109110
timestamp_override = "event.ingested"
110111
type = "eql"

rules/windows/defense_evasion_file_creation_mult_extension.toml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2021/01/19"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint", "windows", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2024/05/21"
5+
updated_date = "2024/06/25"
66

77
[rule]
88
author = ["Elastic"]
@@ -12,7 +12,7 @@ when the name or location of a file is manipulated as a means of tricking a user
1212
benign file type but is actually executable code.
1313
"""
1414
from = "now-9m"
15-
index = ["winlogbeat-*", "logs-endpoint.events.file-*", "logs-windows.sysmon_operational-*", "endgame-*"]
15+
index = ["winlogbeat-*", "logs-endpoint.events.file-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-m365_defender.event-*"]
1616
language = "eql"
1717
license = "Elastic License v2"
1818
name = "Executable File Creation with Multiple Extensions"
@@ -35,6 +35,7 @@ tags = [
3535
"Data Source: Elastic Endgame",
3636
"Data Source: Elastic Defend",
3737
"Data Source: Sysmon",
38+
"Data Source: Microsoft Defender for Endpoint"
3839
]
3940
timestamp_override = "event.ingested"
4041
type = "eql"
@@ -43,8 +44,7 @@ query = '''
4344
file where host.os.type == "windows" and event.type == "creation" and file.extension : "exe" and
4445
file.name regex~ """.*\.(vbs|vbe|bat|js|cmd|wsh|ps1|pdf|docx?|xlsx?|pptx?|txt|rtf|gif|jpg|png|bmp|hta|txt|img|iso)\.exe""" and
4546
not (process.executable : ("?:\\Windows\\System32\\msiexec.exe", "C:\\Users\\*\\QGIS_SCCM\\Files\\QGIS-OSGeo4W-*-Setup-x86_64.exe") and
46-
file.path : "?:\\Program Files\\QGIS *\\apps\\grass\\*.exe") and
47-
not process.executable : ("/bin/sh", "/usr/sbin/MailScanner", "/usr/bin/perl")
47+
file.path : "?:\\Program Files\\QGIS *\\apps\\grass\\*.exe")
4848
'''
4949

5050

rules/windows/defense_evasion_masquerading_trusted_directory.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/11/18"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint", "windows", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2024/05/21"
5+
updated_date = "2024/06/25"
66

77
[rule]
88
author = ["Elastic"]
@@ -18,6 +18,7 @@ index = [
1818
"logs-windows.*",
1919
"endgame-*",
2020
"logs-system.security*",
21+
"logs-m365_defender.event-*"
2122
]
2223
language = "eql"
2324
license = "Elastic License v2"
@@ -40,6 +41,7 @@ tags = [
4041
"Tactic: Defense Evasion",
4142
"Data Source: Elastic Endgame",
4243
"Data Source: Elastic Defend",
44+
"Data Source: Microsoft Defender for Endpoint"
4345
]
4446
timestamp_override = "event.ingested"
4547
type = "eql"

rules/windows/defense_evasion_persistence_account_tokenfilterpolicy.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2022/11/01"
3-
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
66
min_stack_version = "8.13.0"
7-
updated_date = "2024/06/11"
7+
updated_date = "2024/06/25"
88

99
[rule]
1010
author = ["Elastic"]
@@ -14,7 +14,7 @@ default) and is set to 1, then remote connections from all local members of Admi
1414
high-integrity tokens during negotiation.
1515
"""
1616
from = "now-9m"
17-
index = ["winlogbeat-*", "logs-endpoint.events.registry-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-sentinel_one_cloud_funnel.*"]
17+
index = ["winlogbeat-*", "logs-endpoint.events.registry-*", "logs-windows.sysmon_operational-*", "endgame-*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
1818
language = "eql"
1919
license = "Elastic License v2"
2020
name = "Local Account TokenFilter Policy Disabled"
@@ -35,7 +35,8 @@ tags = [
3535
"Data Source: Elastic Endgame",
3636
"Data Source: Elastic Defend",
3737
"Data Source: Sysmon",
38-
"Data Source: SentinelOne"
38+
"Data Source: SentinelOne",
39+
"Data Source: Microsoft Defender for Endpoint"
3940
]
4041
timestamp_override = "event.ingested"
4142
type = "eql"

rules/windows/defense_evasion_suspicious_zoom_child_process.toml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[metadata]
22
creation_date = "2020/09/03"
3-
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel"]
3+
integration = ["endpoint", "windows", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
55
min_stack_comments = "Breaking change at 8.13.0 for SentinelOne Integration."
66
min_stack_version = "8.13.0"
7-
updated_date = "2024/06/11"
7+
updated_date = "2024/06/25"
88

99
[transform]
1010
[[transform.osquery]]
@@ -39,7 +39,7 @@ A suspicious Zoom child process was detected, which may indicate an attempt to r
3939
such as command line, network connections, file writes and associated file signature details as well.
4040
"""
4141
from = "now-9m"
42-
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*"]
42+
index = ["winlogbeat-*", "logs-endpoint.events.process-*", "logs-windows.*", "endgame-*", "logs-system.security*", "logs-sentinel_one_cloud_funnel.*", "logs-m365_defender.event-*"]
4343
language = "eql"
4444
license = "Elastic License v2"
4545
name = "Suspicious Zoom Child Process"
@@ -97,7 +97,7 @@ This rule identifies a potential malicious process masquerading as `Zoom.exe` or
9797
risk_score = 47
9898
rule_id = "97aba1ef-6034-4bd3-8c1a-1e0996b27afa"
9999
severity = "medium"
100-
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Defense Evasion", "Tactic: Execution", "Data Source: Elastic Endgame", "Resources: Investigation Guide", "Data Source: Elastic Defend", "Data Source: SentinelOne"]
100+
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Defense Evasion", "Tactic: Execution", "Data Source: Elastic Endgame", "Resources: Investigation Guide", "Data Source: Elastic Defend", "Data Source: SentinelOne", "Data Source: Microsoft Defender for Endpoint"]
101101
timestamp_override = "event.ingested"
102102
type = "eql"
103103

rules/windows/defense_evasion_via_filter_manager.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[metadata]
22
creation_date = "2020/02/18"
3-
integration = ["endpoint", "windows"]
3+
integration = ["endpoint", "windows", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2024/05/21"
5+
updated_date = "2024/06/25"
66

77
[transform]
88
[[transform.osquery]]
@@ -43,6 +43,7 @@ index = [
4343
"logs-windows.*",
4444
"endgame-*",
4545
"logs-system.security*",
46+
"logs-m365_defender.event-*"
4647
]
4748
language = "eql"
4849
license = "Elastic License v2"
@@ -110,6 +111,7 @@ tags = [
110111
"Data Source: Elastic Endgame",
111112
"Resources: Investigation Guide",
112113
"Data Source: Elastic Defend",
114+
"Data Source: Microsoft Defender for Endpoint"
113115
]
114116
timestamp_override = "event.ingested"
115117
type = "eql"

0 commit comments

Comments
 (0)