Rules that support sysmon and uses the user.id field are prone to FPs and FNs because sysmon don't really have user.id data, as per this screenshot as an example:
The SID is not related to the user that created the process. But it is part of the event metadata:
Rules that uses the user.id field and supports sysmon:
Description
Rules that support sysmon and uses the
user.id
field are prone to FPs and FNs because sysmon don't really haveuser.id
data, as per this screenshot as an example:The SID is not related to the user that created the process. But it is part of the event metadata:
Rules that uses the user.id field and supports sysmon:
Actions that we could take to fix the problem:
A. use (process.Ext.token.integrity_level_name : "System" or winlog.event_data.IntegrityLevel : "System")
B. use user.name or an alternative field
C. remove beats and windows integration indexes (support)