Skip to content

Commit 5198cb3

Browse files
committed
chore: change state to unsupported
1 parent 5c91769 commit 5198cb3

6 files changed

+12
-12
lines changed

rules/windows/builtin/security/win_security_susp_failed_logons_single_process.yml rules-unsupported/win_security_susp_failed_logons_single_process.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Multiple Users Failing to Authenticate from Single Process
22
id: fe563ab6-ded4-4916-b49f-a3a8445fe280
3-
status: test
3+
status: unsupported
44
description: Detects failed logins with multiple accounts from a single process on the system.
55
references:
66
- https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying
@@ -22,7 +22,7 @@ detection:
2222
filter:
2323
ProcessName: '-'
2424
timeframe: 24h
25-
condition: 'selection1 and not filter | count(TargetUserName) by ProcessName > 10'
25+
condition: selection1 and not filter | count(TargetUserName) by ProcessName > 10
2626
falsepositives:
2727
- Terminal servers
2828
- Jump servers

rules/windows/builtin/security/win_security_susp_failed_logons_single_source_kerberos.yml rules-unsupported/win_security_susp_failed_logons_single_source_kerberos.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Valid Users Failing to Authenticate From Single Source Using Kerberos
22
id: 5d1d946e-32e6-4d9a-a0dc-0ac022c7eb98
3-
status: test
3+
status: unsupported
44
description: Detects multiple failed logins with multiple valid domain accounts from a single source system using the Kerberos protocol.
55
references:
66
- https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying
@@ -21,7 +21,7 @@ detection:
2121
filter_computer:
2222
TargetUserName|endswith: '$'
2323
timeframe: 24h
24-
condition: 'selection and not filter_computer | count(TargetUserName) by IpAddress > 10'
24+
condition: selection and not filter_computer | count(TargetUserName) by IpAddress > 10
2525
falsepositives:
2626
- Vulnerability scanners
2727
- Misconfigured systems

rules/windows/builtin/security/win_security_susp_failed_logons_single_source_kerberos2.yml rules-unsupported/win_security_susp_failed_logons_single_source_kerberos2.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Disabled Users Failing To Authenticate From Source Using Kerberos
22
id: 4b6fe998-b69c-46d8-901b-13677c9fb663
3-
status: test
3+
status: unsupported
44
description: Detects failed logins with multiple disabled domain accounts from a single source system using the Kerberos protocol.
55
references:
66
- https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying
@@ -21,7 +21,7 @@ detection:
2121
filter_computer:
2222
TargetUserName|endswith: '$'
2323
timeframe: 24h
24-
condition: 'selection and not filter_computer | count(TargetUserName) by IpAddress > 10'
24+
condition: selection and not filter_computer | count(TargetUserName) by IpAddress > 10
2525
falsepositives:
2626
- Vulnerability scanners
2727
- Misconfigured systems

rules/windows/builtin/security/win_security_susp_failed_logons_single_source_kerberos3.yml rules-unsupported/win_security_susp_failed_logons_single_source_kerberos3.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Invalid Users Failing To Authenticate From Source Using Kerberos
22
id: bc93dfe6-8242-411e-a2dd-d16fa0cc8564
3-
status: test
3+
status: unsupported
44
description: Detects failed logins with multiple invalid domain accounts from a single source system using the Kerberos protocol.
55
references:
66
- https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying
@@ -21,7 +21,7 @@ detection:
2121
filter_computer:
2222
TargetUserName|endswith: '$'
2323
timeframe: 24h
24-
condition: 'selection and not filter_computer | count(TargetUserName) by IpAddress > 10'
24+
condition: selection and not filter_computer | count(TargetUserName) by IpAddress > 10
2525
falsepositives:
2626
- Vulnerability scanners
2727
- Misconfigured systems

rules/windows/builtin/security/win_security_susp_failed_logons_single_source_ntlm.yml rules-unsupported/win_security_susp_failed_logons_single_source_ntlm.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Valid Users Failing to Authenticate from Single Source Using NTLM
22
id: f88bab7f-b1f4-41bb-bdb1-4b8af35b0470
3-
status: test
3+
status: unsupported
44
description: Detects failed logins with multiple valid domain accounts from a single source system using the NTLM protocol.
55
references:
66
- https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying
@@ -21,7 +21,7 @@ detection:
2121
filter:
2222
TargetUserName: '*$'
2323
timeframe: 24h
24-
condition: 'selection1 and not filter | count(TargetUserName) by Workstation > 10'
24+
condition: selection1 and not filter | count(TargetUserName) by Workstation > 10
2525
falsepositives:
2626
- Terminal servers
2727
- Jump servers

rules/windows/builtin/security/win_security_susp_failed_logons_single_source_ntlm2.yml rules-unsupported/win_security_susp_failed_logons_single_source_ntlm2.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Invalid Users Failing To Authenticate From Single Source Using NTLM
22
id: 56d62ef8-3462-4890-9859-7b41e541f8d5
3-
status: test
3+
status: unsupported
44
description: Detects failed logins with multiple invalid domain accounts from a single source system using the NTLM protocol.
55
references:
66
- https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying
@@ -21,7 +21,7 @@ detection:
2121
filter:
2222
TargetUserName: '*$'
2323
timeframe: 24h
24-
condition: 'selection1 and not filter | count(TargetUserName) by Workstation > 10'
24+
condition: selection1 and not filter | count(TargetUserName) by Workstation > 10
2525
falsepositives:
2626
- Terminal servers
2727
- Jump servers

0 commit comments

Comments
 (0)