Open zambomarcell opened 1 month ago
Hi @nasbench
can i help you with sample logs or anything else?
Hi @nasbench
can i help you with sample logs or anything else?
It's clear to me what's going on with the rule. But i won't say no to logs for historical reasons. So if you have them please share.
Rule UUID
d04ae2b8-ad54-4de0-bd87-4bc1da66aa59
Example EventLog
example log line which generate alerts based on this rule:
Description
in https://github.com/SigmaHQ/sigma/blob/master/rules/windows/builtin/security/win_security_kerberoasting_activity.yml#L28
contains this condition:
condition: selection and not 1 of filter_main_*
but in the detection just created on filtermain...
this:
Based on our experiens with the logs I think so, the TargetUserName and ServiceName filtering are in or relation and not in and relation.
So may be need to modify the rule like this: this: