Azure-Sentinel/Detections/SecurityEvent/execute_base64_decodedpaylo...

5 строки
387 B
YAML

id: 6927dcf6-af78-43c1-bf82-b9e3e01179cc
name: Process executed from binary hidden in Base64 encoded file
description: |
'As part of content migration, this file is moved to a new location. You can find it here https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Endpoint%20Threat%20Protection%20Essentials/Analytic%20Rules/execute_base64_decodedpayload.yaml'
version: 1.1.1