Replies: 1 comment
-
Similar issue seems to have been reported on #13411. May I know if the pattern I reported above is in the scope of fixing in next update? |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
For Sigma rule with rule id: 17d619c1-e020-4347-957e-1d1207455c93
Orignal rule:
converted EQL:
This converted result generates a lot of false positive as all machine account generated AD sync traffic now creates critical events.
Root issue of the issue:
SubjectUserName
should have been converted towinlog.event_data.SubjectUserName
instead ofuser.name
.With the mapping change,
will correct result in empty findings in normal scenario.
Please help fix the issue by resolving the mapping correctly, specifically,
SubjectUserName
should have been converted towinlog.event_data.SubjectUserName
instead ofuser.name
.Beta Was this translation helpful? Give feedback.
All reactions