You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
False Positives - Reducing benign events mistakenly identified as threats.
Description
'Remote Execution via File Shares' generating false positives for normal CrowdStrike sensor update activity.
Propose adding the following to query NOT filter
(process.executable : "?:\\Windows\\System32\\drivers\\CrowdStrike\\*-FalconSensor_Windows.*.exe" and
process.code_signature.trusted == true and process.code_signature.subject_name : "CrowdStrike, Inc.")
In my current use case, process.executable is "19011-FalconSensor_Windows.x64.exe", where 19011 is a release number and x64 is the platform type. process.code_signature.* should be static across releases and platforms.
_source from example ancestor events from logs-endpoint.events.file and logs-endpoint.events.process attached
Link to Rule
https://github.com/elastic/detection-rules/blob/main/rules/windows/lateral_movement_execution_via_file_shares_sequence.toml
Rule Tuning Type
False Positives - Reducing benign events mistakenly identified as threats.
Description
'Remote Execution via File Shares' generating false positives for normal CrowdStrike sensor update activity.
Propose adding the following to query NOT filter
In my current use case, process.executable is "19011-FalconSensor_Windows.x64.exe", where 19011 is a release number and x64 is the platform type. process.code_signature.* should be static across releases and platforms.
_source from example ancestor events from logs-endpoint.events.file and logs-endpoint.events.process attached
Example Data
endpoint.events.file.json
endpoint.events.process.json
The text was updated successfully, but these errors were encountered: