From de74f1d471e27719efc59aa13256dc0befc53020 Mon Sep 17 00:00:00 2001 From: dluxtron <106139814+dluxtron@users.noreply.github.com> Date: Thu, 27 Jun 2024 09:30:00 +1000 Subject: [PATCH] updating yaml --- detections/application/windows_ad_self_dacl_assignment.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/detections/application/windows_ad_self_dacl_assignment.yml b/detections/application/windows_ad_self_dacl_assignment.yml index 803e5f1960..42e89868ff 100644 --- a/detections/application/windows_ad_self_dacl_assignment.yml +++ b/detections/application/windows_ad_self_dacl_assignment.yml @@ -36,7 +36,7 @@ how_to_implement: Ensure you are ingesting AD audit logs, see lantern doc in ref known_false_positives: Unknown references: - https://lantern.splunk.com/Security/Product_Tips/Enterprise_Security/Enabling_an_audit_trail_from_Active_Directory - tags: +tags: analytic_story: - Sneaky Active Directory Persistence Tricks asset_type: Endpoint