SigmaHQ/wazuh/rules/sigma_win_susp_recon_activity.yml
joker2013 50379800f2 123
2020-12-03 01:43:30 +03:00

16 lines
366 B
YAML

alert:
- debug
description: Detects suspicious command line activity on Windows systems
filter:
- query:
query_string:
query: data.win.eventdata.commandLine:("net\ group\ \"domain\ admins\"\ \/domain" OR "net\ localgroup\ administrators")
index: wazuh-alerts-3.x-*
name: d95de845-b83c-4a9a-8a6a-4fc802ebf6c0_0
priority: 3
realert:
minutes: 0
type: any