overwrites-custom-warnings.xml
<!-- Modify it at your will. -->
<group name="overwrites-custom-warnings">
<rule id="60107" level="4" overwrite="yes">
<if_sid>60104</if_sid>
<field name="win.system.eventID">^577$|^4673$</field>
<options>no_full_log</options>
<description>Failed attempt to perform a privileged operation.</description>
</rule>
<rule id="110001" level="4">
<if_sid>92204</if_sid>
<field name="win.eventdata.image" type="pcre2">C:\\\\Windows\\\\system32\\\\cleanmgr\.exe</field>
<options>no_full_log</options>
<description>CleanMGR - Downlevel Info</description>
</rule>
<rule id="110002" level="4">
<if_sid>510</if_sid>
<field name="file">/usr/sbin/apachectl</field>
<description>Ignoring the rootcheck alert for the file: $(data.file).</description>
</rule>
<rule id="110003" level="4">
<if_sid>550</if_sid>
<field name="syscheck.path" type="pcre2">\/etc\/cups\/subscriptions\.conf|\/etc\/cups\/subscriptions\.conf\.O</field>
<description>Known file</description>
</rule>
<rule id="110004" level="4">
<if_sid>533</if_sid>
<description>Netstart Warnings move down</description>
</rule>
<rule id="110005" level="4">
<if_sid>92151</if_sid>
<field name="win.eventdata.image" type="pcre2">C:\\\\Program Files\\\\Veeam\\\\\.+\\\\Veeam\.\w+\.\w+\.exe</field>
<description>Powershell started by Veeam</description>
</rule>
<rule id="110006" level="4">
<if_sid>92152</if_sid>
<field name="win.eventdata.imageLoaded" type="pcre2">C:\\\\Windows\\\\System32\\\\spool\\\\drivers\\\\x64\\\\3\\\\PrintConfig.dll</field>
<description>Printer Powershell commands</description>
</rule>
<rule id="110007" level="4">
<if_sid>92204</if_sid>
<field name="win.eventdata.image" type="pcre2">C:\\\\Program Files|Program Files \(x86\)\\\\Google\\\\Chrome\\\\Application\\\\chrome\.exe</field>
<field name="win.eventdata.imageLoaded" type="pcre2">C:\\\\Users\\\\.+\\\\AppData\\\\Local\\\\Temp\\\\.+\\\\software_reporter_tool\.exe</field>
<description>Chrome Software Reporter</description>
</rule>
<rule id="110008" level="4">
<if_sid>92204</if_sid>
<field name="win.eventdata.image" type="pcre2">C:\\\\Program Files|Program Files \(x86\)\\\\Google\\\\Update\\\\GoogleUpdate\.exe</field>
<field name="win.eventdata.imageLoaded" type="pcre2">C:\\\\Users\\\\.+\\\\AppData\\\\Local\\Temp\\\\.+\.exe</field>
<description>Chrome Update</description>
</rule>
<rule id="110009" level="6">
<if_sid>5402</if_sid>
<description>Successful sudo to ROOT executed (Higher leveled).</description>
</rule>
<rule id="110010" level="6">
<if_sid>5501</if_sid>
<description>PAM: Login session opened (Higher leveled).</description>
</rule>
<rule id="110011" level="6">
<if_sid>5502</if_sid>
<description>PAM: Login session closed (Higher leveled).</description>
</rule>
<rule id="110012" level="6">
<if_sid>5403</if_sid>
<description>First time user executed sudo (Higher leveled).</description>
</rule>
<rule id="110013" level="6">
<if_sid>5715</if_sid>
<description>sshd: authentication success (Higher leveled).</description>
</rule>
<rule id="110014" level="4">
<if_sid>5104</if_sid>
<field name="description">Interface entered in promiscuous(sniffing) mode.</field>
<description>Interface entered in promiscuous(sniffing) mode - Cortex Analyzer working</description>
</rule>
<rule id="110015" level="4">
<!-- Test: <if_sid>5402</if_sid> -->
<if_sid>110009</if_sid>
<field name="agent.name">pihole</field>
<field name="data.srcuser">www-data</field>
<description>Successful sudo to ROOT executed (Higher leveled).</description>
</rule>
<rule id="110016" level="4">
<if_sid>5502</if_sid>
<field name="name.agent">pihole</field>
<field name="data.srcuser">www-data</field>
<description>PAM: Login session closed (Down leveled).</description>
</rule>
<rule id="110017" level="4">
<if_sid>92151</if_sid>
<field name="win.eventdata.image" type="pcre2">C:\\\\Program Files\\\\Veeam\\\\Backup365\\\\Veeam\.Archiver\.Service\.exe/gm</field>
<description>Veeam starts Powershell commands</description>
</rule>
<rule id="110018" level="4">
<if_sid>100651, 100653</if_sid>
<field name="win.eventdata.parentimage" type="pcre2">C:\\\\Program Files|Program Files \(x86\)\\\\TeamViewer\\\\Update\\\\update\.exe</field>
<options>no_full_log</options>
<description>TeamViewer Update</description>
</rule>
<rule id="110019" level="4">
<if_sid>550</if_sid>
<field name="syscheck.path" type="pcre2">/etc/pihole/\.+</field>
<description>Ignoring PIHOLE Updates config</description>
</rule>
<rule id="110021" level="3">
<if_sid>92151</if_sid>
<field name="win.eventdata.user">BITSYSTEMS-GMBH\\\\svc_monitoring|RESDOM\\\\svc_prtg</field>
<description>Powershell started by PRTG</description>
</rule>
<rule id="110022" level="3">
<if_sid>92151</if_sid>
<field name="win.eventdata.image">C:\\\\Windows\\\\System32\\\\ServerManager.exe</field>
<description>Powershell started by Servermanager</description>
</rule>
<rule id="110023" level="3">
<if_sid>92151</if_sid>
<field name="win.eventdata.image">C:\\\\Program Files \(x86\)\\\\Trend Micro\\\\Security Agent\\\\utilCmdletWrapper\.exe</field>
<description>Powershell started by TrendMicro</description>
</rule>
<rule id="110024" level="3">
<if_sid>92151</if_sid>
<field name="win.eventdata.image" type="pcre2">\w:\\\\Exchange Server\\\\Bin\\\\Microsoft.Exchange.Store.Worker.exe</field>
<description>Powershell started by Exchange Server</description>
</rule>
<rule id="110025" level="3">
<if_sid>92204</if_sid>
<field name="win.eventdata.image">C:\\\\Program Files (x86)\\\\Citrix\\\\ICA Client\\\\receiver\\\\Receiver.exe</field>
<field name="win.eventdata.targetFilename">C:\\\\Users\\\\\w+\\\\AppData\\\\Local\\\\Temp\\\\\d\\\.+\\\\CitrixReceiverUpdater.exe</field>
<description>Citrix Receiver Update</description>
</rule>
<rule id="110026" level="3">
<if_sid>119003</if_sid>
<field name="misp.value">127.0.0.1|aka.ms</field>
<description>Misp IoC's downgrade (false/positive)</description>
</rule>
<rule id="110027" level="3">
<if_sid>9224</if_sid>
<field name="win.eventdata.image">C:\\\\Users\\\\\w+\\\\Downloads\\\\MicrosoftEdgeSetup\.exe</field>
<field name="win.eventdata.targetfilename">C:\\\\Users\\\\\.+\\\\AppData\\\\Local\\\\Temp\\\\\.+\\\\\.+\\\\MicrosoftEdgeUpdate\w+\.exe</field>
<description>Edge Update</description>
</rule>
<rule id="110028" level="3">
<if_sid>510</if_sid>
<field name="file">/var/tmp/tmccinstcheck\.dat</field>
<description>TrendMicro Mac Updatecheck</description>
</rule>
<rule id="110029" level="3">
<if_sid>510</if_sid>
<field name="file">/tmp/ubuntu-advantage/candidate-version</field>
<description>Ubuntu Advantage File</description>
</rule>
<rule id="110030" level="4">
<if_sid>92204</if_sid>
<field name="win.eventdata.image" type="pcre2">C:\\\\Windows\\\\system32\\\\sdiagnhost\.exe</field>
<options>no_full_log</options>
<description>CleanMGR - Downlevel Info</description>
</rule>
<rule id="110031" level="0">
<if_sid>92213</if_sid>
<field name="win.eventdata.image" type="pcre2">C:\\\\Windows\\\\system32\\\\wsmprovhost.exe</field>
<field name="win.eventdata.targetFilename" type="pcre2">AppData\\\\Local\\\\Temp\\\\__PSScriptPolicyTest_*</field>
<description>PSScript PolicyTest ignorieren</description>
</rule>
</group>