mirror of
https://github.com/socfortress/Wazuh-Rules.git
synced 2025-11-05 14:23:16 +00:00
Merge pull request #30 from thanegill/main
Add Exception to 100502 for SCCM `Windows\CCM\CcmExec.exe`
This commit is contained in:
@@ -976,7 +976,7 @@
|
|||||||
<if_sid>100100</if_sid>
|
<if_sid>100100</if_sid>
|
||||||
<field name="win.eventdata.image">powershell.exe$|pwsh.exe$</field>
|
<field name="win.eventdata.image">powershell.exe$|pwsh.exe$</field>
|
||||||
<field name="win.eventdata.commandLine">ExecutionPolicy Bypass</field>
|
<field name="win.eventdata.commandLine">ExecutionPolicy Bypass</field>
|
||||||
<field name="win.eventdata.parentImage" negate="yes">cmd.exe$|explorer.exe$|wazuh-agent.exe$|^C:\\\\Program Files\\\\Windows Defender Advanced Threat Protection\\\\SenseIR.exe$</field>
|
<field name="win.eventdata.parentImage" negate="yes">cmd.exe$|explorer.exe$|wazuh-agent.exe$|^C:\\\\Program Files\\\\Windows Defender Advanced Threat Protection\\\\SenseIR.exe$|\\\\Windows\\\\CCM\\\\CcmExec.exe$</field>
|
||||||
<description>Sysmon - Event 1: PowerShell Execution Policy Bypass detected.</description>
|
<description>Sysmon - Event 1: PowerShell Execution Policy Bypass detected.</description>
|
||||||
<mitre>
|
<mitre>
|
||||||
<id>T1548</id>
|
<id>T1548</id>
|
||||||
|
|||||||
Reference in New Issue
Block a user