By monitoring 4688 events from the security event log and filtering on the process file size, EventSentry can notify you if an unsigned executable (a file without a digital signature) was launched.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 |
{
"type": 0,
"active": 1,
"name": "Unsigned File Launched",
"uuid": "73263ceb-d8a8-4383-8e72-43c904471226",
"version": 14,
"order": 12,
"folder": "Suspicious Activity",
"isfolder": 0,
"applyToCollectorSideThresholds": 0,
"requireAck": 0,
"stopProcessing": 0,
"anomalyFiltering": 0,
"logs": [ "SEC" ],"severities": [ "AUDITSUCCESS" ],
"source": "Microsoft-Windows-Security-Auditing",
"eventid": "4688",
"chainType": 1,
"textfilters": [ { "insertionString": 5,
"comparisonType": 0,
"text": "!C:\\Windows\\Temp\\*\\DismHost.exe",
"type": 1
}],"threshold": {
"type": 0,
"limit": 0,
"interval": 0,
"intervalScale": 0,
"processBefore": 0,
"processAfter": 0,
"processAfterFirstOnly": 0,
"logImmediate": 0,
"logInterval": 0,
"logSeverity": 2,
"matchType": 1
},"timer": {
"enable": 0,
"interval": 0,
"intervalScale": 0
},"bootBehavior": 0
}
|