.. |
win_admin_share_access.yml
|
Rule: Access to ADMIN$ share
|
2017-03-14 14:53:03 +01:00 |
win_alert_mimikatz_keywords.yml
|
Windows Built-In rules > LogSource definition
|
2017-03-05 23:55:52 +01:00 |
win_av_relevant_match.yml
|
Windows Built-In rules > LogSource definition
|
2017-03-05 23:55:52 +01:00 |
win_malicious_service_install.yml
|
Windows Malicious Password Dumper Service Installs
|
2017-03-05 23:52:02 +01:00 |
win_pass_the_hash.yml
|
Changed values with placeholders to quoted strings
|
2017-03-18 23:05:16 +01:00 |
win_rare_service_installs.yml
|
Rule: Rare Windows Service Installs
|
2017-03-08 19:09:34 +01:00 |
win_susp_add_sid_history.yml
|
Windows Built-In rules > LogSource definition
|
2017-03-05 23:55:52 +01:00 |
win_susp_dsrm_password_change.yml
|
Windows Built-In rules > LogSource definition
|
2017-03-05 23:55:52 +01:00 |
win_susp_eventlog_cleared.yml
|
Windows Built-In rules > LogSource definition
|
2017-03-05 23:55:52 +01:00 |
win_susp_failed_logon_reasons.yml
|
Windows Built-In rules > LogSource definition
|
2017-03-05 23:55:52 +01:00 |
win_susp_failed_logons_single_source.yml
|
Windows Built-In rules > LogSource definition
|
2017-03-05 23:55:52 +01:00 |
win_susp_interactive_logons.yml
|
Rule: Suspicious interactive console logons to servers
|
2017-03-17 09:44:24 +01:00 |
win_susp_kerberos_manipulation.yml
|
Windows Built-In rules > LogSource definition
|
2017-03-05 23:55:52 +01:00 |
win_susp_lsass_dump.yml
|
Windows Built-In rules > LogSource definition
|
2017-03-05 23:55:52 +01:00 |
win_susp_rc4_kerberos.yml
|
Windows Built-In rules > LogSource definition
|
2017-03-05 23:55:52 +01:00 |
win_susp_recon_activity.yml
|
Rule: Windows - Recon Activity (improved)
|
2017-03-07 13:06:38 +01:00 |
win_susp_security_eventlog_cleared.yml
|
Windows Built-In rules > LogSource definition
|
2017-03-05 23:55:52 +01:00 |
win_user_added_to_local_administrators.yml
|
Bug and typo fixes
|
2017-03-14 14:52:28 +01:00 |