Sponsor of the Day:
Jerkmate
https://www.elastic.co/docs/reference/security/prebuilt-rules/audit_policies/windows/sysmon_eventid1_process_creation
Sysmon Event ID 1: Process Creation | Prebuilt detection rules reference
Caution: Collecting Sysmon events without a tailored configuration for your environment will cause high data volume. These setup instructions would need...
sysmon event idprebuilt detection rules1 processcreationreference
https://www.elastic.co/docs/reference/security/prebuilt-rules
Prebuilt detection rules reference | Prebuilt detection rules reference
AWS API Activity from Uncommon S3 Client by Rare User AWS Access Token Used from Multiple Addresses AWS Account Discovery By Rare User AWS CloudShell...
prebuilt detection rulesreference
https://www.elastic.co/docs/reference/security/prebuilt-rules/audit_policies/windows/sysmon_eventid22_dns_query
Sysmon Event ID 22: DNS Query | Prebuilt detection rules reference
Caution: Collecting Sysmon events without a tailored configuration for your environment will cause high data volume. These setup instructions would need...
sysmon event idprebuilt detection rulesdns query22reference
https://www.elastic.co/docs/reference/security/prebuilt-rules/audit_policies/windows/sysmon_eventid8_createremotethread
Sysmon Event ID 8: Create Remote Thread | Prebuilt detection rules reference
Caution: Collecting Sysmon events without a tailored configuration for your environment will cause high data volume. These setup instructions would need...
sysmon event idprebuilt detection rules8createremote
https://www.elastic.co/docs/reference/security/prebuilt-rules/audit_policies/windows/sysmon_eventid12_13_14_registry_event
Sysmon Event ID 12, 13, 14: Registry Events | Prebuilt detection rules reference
Caution: Collecting Sysmon events without a tailored configuration for your environment will cause high data volume. These setup instructions would need...
sysmon event id12 13 14prebuilt detection rulesregistryevents
https://www.elastic.co/docs/reference/security/prebuilt-rules/audit_policies/windows/audit_directory_service_access
Audit Directory Service Access | Prebuilt detection rules reference
Some detection rules require configuring audit policies to generate events when Active Directory objects are accessed. These audit policies apply exclusively...
prebuilt detection rulesdirectory serviceauditaccessreference
https://www.elastic.co/docs/reference/security/prebuilt-rules/audit_policies/windows/sysmon_eventid3_network_connection
Sysmon Event ID 3: Network Connection | Prebuilt detection rules reference
Caution: Collecting Sysmon events without a tailored configuration for your environment will cause high data volume. These setup instructions would need...
sysmon event idprebuilt detection rules3 networkconnectionreference
https://www.elastic.co/docs/reference/integrations/security_detection_engine
Prebuilt Security Detection Rules | Elastic integrations
The detection rules package stores the prebuilt security rules for the Elastic Security detection engine. To download or update the rules, click Settings...
security detectionelastic integrationsprebuiltrules