-
Notifications
You must be signed in to change notification settings - Fork 522
m365_defender: Improve ECS Mappings for Detection Rules #10179
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
🚀 Benchmarks reportTo see the full report comment with |
|
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
chrisberkhout
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The change looks fine.
It seems there are many non-deprecated rules that use hive abbreviations like HKLM:
repo:elastic/detection-rules language:TOML NOT path:/^rules\/_deprecated\// HKLM.
Should those all change?
@chrisberkhout, thanks for noticing these rules. Thats quite a few rules containing I am now inclined to make the |
|
@chrisberkhout @w0rk3r I updated |
|
@kcreddy @w0rk3r Microsoft have recently rebranded We haven't started down that path yet, but want to get it on your radar to ensure detection rules will work with the current M365 Defender integration and future XDR integration. |
packages/m365_defender/data_stream/event/elasticsearch/ingest_pipeline/pipeline_device.yml
Outdated
Show resolved
Hide resolved
💚 Build Succeeded
History
cc @kcreddy |
|
|
@jamiehynds so the data continue to be the same in the new integration, right? Do we have an estimate on when we are going to work on this? |
| - set: | ||
| field: registry.value | ||
| description: Derived from previous value during registry changes. | ||
| copy_from: m365_defender.event.previous.registry_value_name | ||
| if: ctx.registry?.value == null | ||
| tag: set_registry_value_prev | ||
| ignore_empty_value: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This will only take effect if the above one is null, right?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes, so this processor only executes when if: ctx.registry?.value == null, i.e., when registry.value is not set from above.
We'll still collect the same data, but the custom fields would be different - using No time frame yet as work has yet to start, but @cpascale43 will be working on an issue and identify additional data we can pull from Microsoft XDR on top of what we already collect. |
|
Package m365_defender - 2.14.0 containing this change is available at https://epr.elastic.co/search?package=m365_defender |




Proposed commit message
Checklist
changelog.ymlfile.Author's Checklist
How to test this PR locally
elastic-package stack down && elastic-package build && elastic-package stack up -d -v && eval "$(elastic-package stack shellinit)" && elastic-package test pipeline --generate -v"registry": { "data": { "type": "Binary" }, + "hive": "HKLM", "key": "SYSTEM\\ControlSet001\\Control\\WMI\\Security", - "path": "SYSTEM\\ControlSet001\\Control\\WMI\\Security\\782655b2-0575-4aa2-82b8-7fd560afeff6", + "path": "HKLM\\SYSTEM\\ControlSet001\\Control\\WMI\\Security\\782655b2-0575-4aa2-82b8-7fd560afeff6", "value": "782655b2-0575-4aa2-82b8-7fd560afeff6" },Related issues
Screenshots