Skip to content

Commit 1e430e5

Browse files
committed
fix error with filter macros
1 parent 0d36a4e commit 1e430e5

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

detections/endpoint/windows_service_stop_via_net__and_sc_application.yml renamed to detections/endpoint/windows_service_stop_attempt.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ data_source:
1010
- Sysmon EventID 1
1111
- Windows Event Log Security 4688
1212
- CrowdStrike ProcessRollup2
13-
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where ((`process_net` OR `process_sc`) Processes.process="* stop *") OR Processes.process="*Stop-Service *" by Processes.process_name Processes.original_file_name Processes.process Processes.process_id Processes.process_guid Processes.parent_process_name Processes.parent_process Processes.parent_process_guid Processes.dest Processes.user | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `windows_service_stop_via_net__and_sc_application_filter`'
13+
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where ((`process_net` OR `process_sc`) Processes.process="* stop *") OR Processes.process="*Stop-Service *" by Processes.process_name Processes.original_file_name Processes.process Processes.process_id Processes.process_guid Processes.parent_process_name Processes.parent_process Processes.parent_process_guid Processes.dest Processes.user | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `windows_service_stop_attempt_filter`'
1414
how_to_implement: The detection is based on data that originates from Endpoint Detection and Response (EDR) agents. These agents are designed to provide security-related telemetry from the endpoints where the agent is installed. To implement this search, you must ingest logs that contain the process GUID, process name, and parent process. Additionally, you must ingest complete command-line executions. These logs must be processed using the appropriate Splunk Technology Add-ons that are specific to the EDR product. The logs must also be mapped to the `Processes` node of the `Endpoint` data model. Use the Splunk Common Information Model (CIM) to normalize the field names and speed up the data modeling process.
1515
known_false_positives: Windows OS or software may stop and restart services due to some critical update.
1616
references:

detections/endpoint/windows_suspicious_child_process_spawned_from_webserver.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
name: Windows Suspicious Child Process Spawned From Web Server
1+
name: Windows Suspicious Child Process Spawned From WebServer
22
id: 22597426-6dbd-49bd-bcdc-4ec19857192f
33
version: '6'
44
date: '2025-01-13'

0 commit comments

Comments
 (0)