Skip to content

Commit 5dabc87

Browse files
authored
chore: promote older rules status from experimental to test
1 parent 4965c25 commit 5dabc87

4 files changed

Lines changed: 4 additions & 4 deletions

File tree

rules-placeholder/windows/dns_query/dns_query_win_wscript_cscript_resolution.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: DNS Request From Windows Script Host
22
id: 12310575-e8b1-475c-a976-57ed540b349c
3-
status: experimental
3+
status: test
44
description: |
55
Detects unusual domain resolutions originating from CScript/WScript that can identify malicious javascript files executing in an environment, often as a result from a phishing or watering hole attack.
66
author: Josh Nickels, Marius Rothenbücher

rules/windows/builtin/security/win_security_susp_group_policy_startup_script_added_to_gpo.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Startup/Logon Script Added to Group Policy Object
22
id: 123e4e6d-b123-48f8-b261-7214938acaf0
3-
status: experimental
3+
status: test
44
description: |
55
Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects.
66
references:

rules/windows/network_connection/net_connection_win_domain_btunnels.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Network Connection Initiated To BTunnels Domains
22
id: 9e02c8ec-02b9-43e8-81eb-34a475ba7965
3-
status: experimental
3+
status: test
44
description: |
55
Detects network connections to BTunnels domains initiated by a process on the system.
66
Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

rules/windows/process_creation/proc_creation_win_remote_access_tools_meshagent_exec.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Remote Access Tool - MeshAgent Command Execution via MeshCentral
22
id: 74a2b202-73e0-4693-9a3a-9d36146d0775
3-
status: experimental
3+
status: test
44
description: |
55
Detects the use of MeshAgent to execute commands on the target host, particularly when threat actors might abuse it to execute commands directly.
66
MeshAgent can execute commands on the target host by leveraging win-console to obscure their activities and win-dispatcher to run malicious code through IPC with child processes.

0 commit comments

Comments
 (0)