IMPORTANT: No additional bug fixes or documentation updates
will be released for this version. For the latest information, see the
current release documentation.
Threat Intel Windows Registry Indicator Match
edit
IMPORTANT: This documentation is no longer updated. Refer to Elastic's version policy and the latest documentation.
Threat Intel Windows Registry Indicator Match
editThis rule is triggered when a Windows registry indicator from the Threat Intel Filebeat module or integrations has a match against an event that contains registry data.
Rule type: threat_match
Rule indices:
- auditbeat-*
- endgame-*
- filebeat-*
- logs-*
- winlogbeat-*
Severity: critical
Risk score: 99
Runs every: 1h
Searches indices from: now-65m (Date Math format, see also Additional look-back time
)
Maximum alerts per execution: 100
References:
Tags:
- OS: Windows
- Data Source: Elastic Endgame
- Rule Type: Indicator Match
Version: 1
Rule authors:
- Elastic
Rule license: Elastic License v2
Rule query
editregistry.path:*