Replies: 1 comment
-
Kinda late to the party here, but since nobody responded and I've found these really valuable... here's my take. When it comes to Sigma rules, anything that detects common threat actor tools and tactics is useful to me. This includes things such as Cobalt Strike and Metasploit detection, named pipes, lateral movement via WMI or PowerShell, Terminal Services brute forcing, and so on. I do a lot of Incident Response and thus these kinds of Sigma rules can be a huge time saver and give some great points to pivot off of before deep diving the data. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
As we progress in the coverage of Sigma rules, I wonder what type of Sigma rules people already use or would like to see.
Is it very common to have (maybe in other projects in your teams) custom Sigma rules?
Do you have more forensic focus sigma rules?
Beta Was this translation helpful? Give feedback.
All reactions