Skip to content

[Rule Tuning] Unusual Network Activity from a Windows System Binary #2509

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
Feb 1, 2023

Conversation

w0rk3r
Copy link
Contributor

@w0rk3r w0rk3r commented Jan 31, 2023

Summary

Exclude common OCSP (Online Certificate Status Protocol) sites contacted by MSIEXEC and *.local domains, ~12% alert count reduction

@w0rk3r w0rk3r added Rule: Tuning tweaking or tuning an existing rule OS: Windows windows related rules Domain: Endpoint labels Jan 31, 2023
@w0rk3r w0rk3r self-assigned this Jan 31, 2023
Copy link
Contributor

@Aegrah Aegrah left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link
Contributor

@imays11 imays11 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks good 👍🏾

@w0rk3r w0rk3r merged commit 4bfcbea into main Feb 1, 2023
@w0rk3r w0rk3r deleted the rt_msiexec_oscp branch February 1, 2023 16:19
protectionsmachine pushed a commit that referenced this pull request Feb 1, 2023
…2509)

* [Rule Tuning] Unusual Network Activity from a Windows System Binary

* Update defense_evasion_network_connection_from_windows_binary.toml

(cherry picked from commit 4bfcbea)
protectionsmachine pushed a commit that referenced this pull request Feb 1, 2023
…2509)

* [Rule Tuning] Unusual Network Activity from a Windows System Binary

* Update defense_evasion_network_connection_from_windows_binary.toml

(cherry picked from commit 4bfcbea)
protectionsmachine pushed a commit that referenced this pull request Feb 1, 2023
…2509)

* [Rule Tuning] Unusual Network Activity from a Windows System Binary

* Update defense_evasion_network_connection_from_windows_binary.toml

(cherry picked from commit 4bfcbea)
protectionsmachine pushed a commit that referenced this pull request Feb 1, 2023
…2509)

* [Rule Tuning] Unusual Network Activity from a Windows System Binary

* Update defense_evasion_network_connection_from_windows_binary.toml

(cherry picked from commit 4bfcbea)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport: auto Domain: Endpoint OS: Windows windows related rules Rule: Tuning tweaking or tuning an existing rule
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants