Azure-Sentinel/Hunting Queries/SecurityEvent/persistence_create_account....

4 строки
365 B
YAML

id: 9730f589-8726-466b-9dbb-69c9428c9992
name: Summary of users created using uncommon/undocumented commandline switches
description: |
'As part of content migration, this file is moved to new location. you can find here: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Windows%20Security%20Events/Hunting%20Queries/persistence_create_account.yaml'