elastic / detection-rules

https://www.elastic.co/guide/en/security/current/detection-engine-overview.html
Other
1.97k stars 502 forks source link

[Rule Tuning] Sysmon user.id field is always populated with System SID #1770

Closed w0rk3r closed 2 years ago

w0rk3r commented 2 years ago

Description

Rules that support sysmon and uses the user.id field are prone to FPs and FNs because sysmon don't really have user.id data, as per this screenshot as an example:

image

The SID is not related to the user that created the process. But it is part of the event metadata:

image

Rules that uses the user.id field and supports sysmon:

Actions that we could take to fix the problem:

A. use (process.Ext.token.integrity_level_name : "System" or winlog.event_data.IntegrityLevel : "System")

B. use user.name or an alternative field

C. remove beats and windows integration indexes (support)

w0rk3r commented 2 years ago

Remove Windows Integration & Winlogbeat support:

Solved in #1773

Modified to use Integrity fields instead of user.id:

Solved in #1772

Use user.name on the sequence instead of user.id:

Solved in #1771

w0rk3r commented 2 years ago

Solved as per https://github.com/elastic/detection-rules/issues/1770#issuecomment-1039193389