We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 63e91c2 commit 603f3c3Copy full SHA for 603f3c3
rules/windows/impact_high_freq_file_renames_by_kernel.toml
@@ -2,15 +2,15 @@
2
creation_date = "2024/05/03"
3
integration = ["endpoint"]
4
maturity = "production"
5
-updated_date = "2024/05/21"
+updated_date = "2024/05/23"
6
7
[rule]
8
author = ["Elastic"]
9
description = """
10
This rule identifies a high number (20) of file creation event by the System virtual process from the same host and with
11
same file name containing keywords similar to ransomware note files and all within a short time period.
12
"""
13
-from = "now-1m"
+from = "now-9m"
14
index = ["logs-endpoint.events.file-*"]
15
language = "kuery"
16
license = "Elastic License v2"
0 commit comments