@ -70,3 +70,734 @@ search = source=WinEventLog:Security OR source=WMI:WinEventLog:Security OR sourc
[windows_event_signature]
[windows_event_signature]
search = sourcetype=WinEventLog OR sourcetype=XmlWinEventLog OR sourcetype=WMI:WinEventLog:System OR sourcetype=WMI:WinEventLog:Security OR sourcetype=WMI:WinEventLog:Application OR sourcetype=wineventlog OR sourcetype=xmlwineventlog
search = sourcetype=WinEventLog OR sourcetype=XmlWinEventLog OR sourcetype=WMI:WinEventLog:System OR sourcetype=WMI:WinEventLog:Security OR sourcetype=WMI:WinEventLog:Application OR sourcetype=wineventlog OR sourcetype=xmlwineventlog
#tags = track_event_signatures
#tags = track_event_signatures
[perfmon_windows]
search = sourcetype=Perfmon:* OR sourcetype=PerfmonMk:* OR sourcetype=WMI:Perfmon*
search = eventtype=wineventlog_security EventCode=4625 (ta_windows_status=0xC0000064 OR ta_windows_status=0xC000006A OR ta_windows_status=0xC000006F OR ta_windows_status=0xC0000070 OR ta_windows_status=0xC0000071 OR ta_windows_status=0xC0000072 OR ta_windows_status=0XC000018C OR ta_windows_status=0XC0000192 OR ta_windows_status=0xC0000193 OR ta_windows_status=0xC0000234 OR ta_windows_status=0XC00002EE OR ta_windows_status=0XC0000413)
#tags = audit change
###### Security: Logon/Logoff ######
## User Logoff/User initiated logoff
## EventCodes 4634, 4647, 538, 551
[windows_logoff]
search = eventtype=wineventlog_security (EventCode=4634 OR EventCode=4647 OR EventCode=538 OR EventCode=551)
#tags = access stop logoff
## A logon was attempted using explicit credentials
## EventCodes 4648, 552
[windows_logon_explicit]
search = eventtype=wineventlog_security (EventCode=4648 OR EventCode=552)
search = eventtype=wineventlog_security ((EventCode=4625 AND ta_windows_action!=error) OR EventCode=529 OR EventCode=530 OR EventCode=531 OR EventCode=532 OR EventCode=533 OR EventCode=534 OR EventCode=535 OR EventCode=536 OR EventCode=537 OR EventCode=539)
#tags = authentication
## An account was successfully logged on
## EventCodes 4624, 528, 540
[windows_logon_success]
search = eventtype=wineventlog_security (EventCode=4624 OR EventCode=528 OR EventCode=540)
#tags = authentication
###### Security: Object Access ######
## Object Open
## EventCodes 4656, 560
[windows_object_open]
search = eventtype=wineventlog_security (EventCode=4656 OR EventCode=560)
#tags = resource file access start
## Handle Closed
## EventCodes 4658, 562
[windows_handle_closed]
search = eventtype=wineventlog_security (EventCode=4658 OR EventCode=562)
#tags = resource file access stop
###### Security: Policy Change ######
## Audit Policy Change/The audit policy (SACL) on an object was changed
## EventCodes 4715, 4719, 612
[windows_audit_policy_change]
search = eventtype=wineventlog_security (EventCode=4715 OR EventCode=4719 OR EventCode=612)
#tags = policy configuration modify audit change
## System security access was granted to an account
## EventCodes 4717, 621
[windows_security_access_granted]
search = eventtype=wineventlog_security (EventCode=4717 OR EventCode=621)
#tags = access authorization add change account
## System security access was removed from an account
## EventCodes 4718, 622
[windows_security_access_removed]
search = eventtype=wineventlog_security (EventCode=4718 OR EventCode=622)
search = (eventtype=wineventlog_system (SourceName=W32Time OR SourceName=Microsoft-Windows-Time-Service) (EventCode=35 OR EventCode=37)) OR (sourcetype=Script:TimesyncStatus windows_action=success)
#tags = report time synchronize success performance
## EventCodes 17, 29, 36, 38
[windows_time_failure]
search = (eventtype=wineventlog_system (SourceName=W32Time OR Microsoft-Windows-Time-Service) (EventCode=17 OR EventCode=29 OR EventCode=36 OR EventCode=38)) OR (sourcetype=Script:TimesyncStatus windows_action=failure)
#tags = report time synchronize failure performance
search = sourcetype=WMI:Service Status=* NOT Status=OK
#tags = anomalous
[wmi_service_state_anomalous]
search = sourcetype=WMI:Service windows_start_mode=Auto windows_state=* NOT windows_state=Running
#tags = anomalous
## Network
[perfmon_network]
search = sourcetype=Perfmon:Network OR sourcetype=PerfmonMk:Network
#tags = performance network
[perfmon_network_throughput]
search = (sourcetype=Perfmon:LocalNetwork OR sourcetype=PerfmonMk:Network OR sourcetype=Perfmon:Network) (counter="Bytes Total/sec" OR Bytes_Total/sec = *)
#tags = performance network
[perfmon_network_bandwidth]
search = (sourcetype=Perfmon:LocalNetwork OR sourcetype=PerfmonMk:Network OR sourcetype=Perfmon:Network) (counter="Current Bandwidth" OR Current_Bandwidth=*)
search = sourcetype="Perfmon:*" OR sourcetype="PerfmonMk:*"
[ad-files]
search = sourcetype=MSAD:NT6:Replication OR sourcetype=MSAD:NT6:Health OR sourcetype=MSAD:NT6:SiteInfo OR sourcetype=MSAD:NT6:Netlogon OR sourcetype=ActiveDirectory OR sourcetype=MSAD:NT6:DNS-Health OR sourcetype=MSAD:NT6:DNS-Zone-Information OR sourcetype=MSAD:NT6:DNS
[perfmon-ntds]
search = eventtype=perfmon (sourcetype="Perfmon:NTDS" OR sourcetype="PerfmonMk:NTDS")
[nt6-dns-events]
search = sourcetype=MSAD:NT6:DNS
[wineventlog-dns]
search = source="WinEventLog:DNS Server" OR source="XmlWinEventLog:DNS Server"
search = eventtype=perfmon (sourcetype="Perfmon:DNS" OR sourcetype="PerfmonMk:DNS")
[wineventlog-dfs]
search = source="WinEventLog:DFS Replication" OR source="XmlWinEventLog:DFS Replication"
[wineventlog-filereplication]
search = source="WinEventLog:File Replication Service" OR source="XmlWinEventLog:File Replication Service"
[wineventlog-keymanagement]
search = source="WinEventLog:Key Management Service" OR source="XmlWinEventLog:Key Management Service"
[endpoint_services_processes]
search = source="WMI:WinEventLog:Security" OR sourcetype="WinEventLog" OR sourcetype="XmlWinEventLog"
## Endpoint Processes
[windows_endpoint_processes]
search = (source="WinEventLog:Security" OR source="XmlWinEventLog:Security") (EventCode=4688 OR EventCode=4689 OR EventCode=4696 OR EventCode=4673 OR EventCode=4674)
#tags = process report
## Endpoint Services
[windows_endpoint_services]
search = (source="WinEventLog:Security" OR source="XmlWinEventLog:Security" OR source="WinEventLog:System" OR source="XmlWinEventLog:System") (EventCode=1100 OR EventCode=4697 OR EventCode=5024 OR EventCode=5025 OR EventCode=5030 OR EventCode=5033 OR EventCode=5034 OR EventCode=5035 OR EventCode=5478 OR EventCode=7036 OR EventCode=7040 OR EventCode=7045)
#tags = service report
## Security-CIM Mappings
## Endpoint Registry
[windows_security_endpoint_registry]
search = (source=WinEventLog:Security OR source=XmlWinEventLog:Security) (EventCode=4657 OR (EventCode=4670 AND (Object_Type="Registry" OR ObjectType="Registry")))
#tags = endpoint registry
## Endpoint Port
[windows_security_endpoint_port]
search = (source=WinEventLog:Security OR source=XmlWinEventLog:Security) (EventCode=5158)
#tags = listening port
## Change Audit
[windows_security_change_audit]
search = (source=WinEventLog:Security OR source=XmlWinEventLog:Security) (EventCode=1101 OR EventCode=1108 OR EventCode=4719 OR EventCode=1102)
#tags = change audit
## Change
[windows_security_change]
search = (source=WinEventLog:Security OR source=XmlWinEventLog:Security) (EventCode=5461 OR EventCode=4698 OR EventCode=4700 OR EventCode=4701 OR EventCode=4702 OR EventCode=4799)
#tags = change
## Authentication
[windows_security_authentication]
search = (source=WinEventLog:Security OR source=XmlWinEventLog:Security) (EventCode=4624 OR EventCode=4625)
#tags = authentication
## Change Account - ADDON-42191
[windows_security_change_account]
search = (source=WinEventLog:Security OR source=XmlWinEventLog:Security) AND EventCode IN (4634,4703,4704,4705,4720,4722,4723,4724,4725,4726,4732,4738,4740,4767,4781,4800,4801)
#tags = change account
## System-CIM Mapping
# Change Audit - ADDON-48489
[windows_system_change_audit]
search = (source=WinEventLog:System OR source=XmlWinEventLog:System) (EventCode=104)