Azure-Sentinel/Hunting Queries/SecurityEvent/RareProcessWithCmdLine.yaml

4 строки
333 B
YAML

id: c98cee55-3ad0-451b-a9fd-95cd781b517d
name: Hosts running a rare process with commandline
description: |
'As part of content migration, this file is moved to new location. you can find here: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Windows%20Security%20Events/Hunting%20Queries/RareProcessWithCmdLine.yaml'