Azure-Sentinel/Hunting Queries/BehaviorAnalytics/Anomalous Code Execution.yaml

4 строки
319 B
YAML

id: 2efb0c20-be16-45b7-b041-7e327a129976
name: Anomalous Code Execution
description: |
'As part of content migration, this file is moved to new location. You can find here https://githubusercontent.com/Azure/Azure-Sentinel/blob/master/Solutions/UEBA%20Essentials/Hunting%20Queries/Anomalous%20Code%20Execution.yaml'