You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rules/windows/credential_access_mimikatz_powershell_module.toml
+4-6Lines changed: 4 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
[metadata]
2
2
creation_date = "2020/12/07"
3
3
maturity = "development"
4
-
updated_date = "2021/05/10"
4
+
updated_date = "2021/06/17"
5
5
6
6
[rule]
7
7
author = ["Elastic"]
@@ -11,10 +11,10 @@ other features that make it useful for testing the security of networks. This ru
11
11
PowerShell command.
12
12
"""
13
13
from = "now-9m"
14
-
index = ["logs-endpoint.events.*"]
14
+
index = ["logs-endpoint.events.*", "winlogbeat-*", "logs-windows.*"]
15
15
language = "eql"
16
16
license = "Elastic License v2"
17
-
name = "Mimikatz Powershell Module Activity Detected"
17
+
name = "Mimikatz Powershell Module Activity"
18
18
note = """## Triage and analysis
19
19
20
20
This rule identifies an adversary attempt to collect, decrypt, and/or use cached credentials. Alerts from this rule should be prioritized because an adversary has an initial foothold onto an endpoint."""
0 commit comments