Wrong filter in " Kerberoasting Activity - Initial Query" rule condition? #5011
Labels
False-Positive
Issue reporting a false positive with one of the rules
Work In Progress
Some changes are needed
Rule UUID
d04ae2b8-ad54-4de0-bd87-4bc1da66aa59
Example EventLog
example log line which generate alerts based on this rule:
Description
in https://github.com/SigmaHQ/sigma/blob/master/rules/windows/builtin/security/win_security_kerberoasting_activity.yml#L28
contains this condition:
condition: selection and not 1 of filter_main_*
but in the detection just created on filter_main_...
this:
Based on our experiens with the logs I think so, the TargetUserName and ServiceName filtering are in or relation and not in and relation.
So may be need to modify the rule like this:
this:
The text was updated successfully, but these errors were encountered: