-
Notifications
You must be signed in to change notification settings - Fork 613
[Rule Tuning] Linux DR Tuning - 5 #5494
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Rule: Tuning - GuidelinesThese guidelines serve as a reminder set of considerations when tuning an existing rule. Documentation and Context
Rule Metadata Checks
Testing and Validation
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
| file where host.os.type == "linux" and event.type == "deletion" and file.path : "/etc/ssl/certs/*" and | ||
| file.extension in ("pem", "crt") and not process.name in ("dockerd", "pacman") | ||
| file where host.os.type == "linux" and event.type == "deletion" and process.executable != null and | ||
| file.path : "/etc/ssl/certs/*" and file.extension in ("pem", "crt") and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we care about /etc/ssl/private/* as well or PKI directories such as /etc/pki/tls/certs/* and /etc/pki/tls/private/*?
Most web servers are not fixed as I recall and are set in a config somewhere. I don't believe we should account for those here, but just a thought about web server coverage.
Pull Request Summary
Why
This PR updates and strengthens a wide range of Linux defense evasion detection rules. The focus is on improving detection accuracy, expanding data source coverage, increasing risk prioritization, and adding more robust filtering to reduce false positives and benign activity.
What changed
General Enhancements
updated_datefields for traceability.logs-auditd_manager.auditd-*,logs-crowdstrike.fdr*,logs-sentinel_one_cloud_funnel.*,endgame-*,auditbeat-*).agent.idinstead ofhost.idand have shorter history windows (e.g., from 10d/14d to 5d).Rule-Specific Notes
index.htmlin/usr/lib/vmware/.process.executableto be non-null.agent.idinstead ofhost.id, history window shortened to 5d.Behavioral impact
Risks/edge cases
Rollout notes