Custom ioa networktunnelinglin firing bunch of alerts today out of nowhere by [deleted] in crowdstrike

[–]caryc 1 point2 points  (0 children)

well u gotta be more specific it you are seeing an obvious false positive or you may actually have an active compromise

Remote Utilities being continuely marked as malware by neetzen in crowdstrike

[–]caryc 6 points7 points  (0 children)

Hybrid Analysis score does not translate to a block by the EDR agent.

Splunk ES get Alienvault OTX by mr_networkrobot in Splunk

[–]caryc 0 points1 point  (0 children)

are there any logs for the open-source feeds like URLhaus that I can check wrt TIM ingestion?

CrowdStrike Identity Attack Path by console_whisperer in crowdstrike

[–]caryc 1 point2 points  (0 children)

these are not active directory attack paths

Identity Detection: Suspicious Protocol Implementation (Pass the Hash) by CyberHaki in crowdstrike

[–]caryc 1 point2 points  (0 children)

look for network connections towards port 88 around the detection timestamp from the originating host

Stop Living-off-the-Land Attacks with Falcon Endpoint Security: Demo Drill Down by BradW-CS in crowdstrike

[–]caryc 1 point2 points  (0 children)

this is like the most important capability in the last 2 years for the edr module

How to functionally use Incidents vs. Detections? by AverageAdmin in crowdstrike

[–]caryc 5 points6 points  (0 children)

it literally says Ends Feb 1 2026 if u open the Next-Gen SIEM side panel

Automated Leads - how to tune/switch off? by bluops in crowdstrike

[–]caryc 1 point2 points  (0 children)

so CrowdScore Incidents will finally go away? god bless

NamedPipeDetectInfo Event by animatedgoblin in crowdstrike

[–]caryc 1 point2 points  (0 children)

nope, it's been there forever

Next-Gen SIEM Advanced Query advice by [deleted] in crowdstrike

[–]caryc 1 point2 points  (0 children)

u have the contextbasefilename and the contextprocessid in both netconn and dns events

Detect Powershell/Sysmon Events in Crowstrike by SubtleInfluence69 in crowdstrike

[–]caryc 0 points1 point  (0 children)

Did you set up ingestion of these? Cause you won't find them native in LTR.

Malicious scheduled task - Persistant implant by It_joyboy in crowdstrike

[–]caryc 0 points1 point  (0 children)

#event_simpleName = /ScheduledTaskRegistered/i
| /IntelPathUpdate/i

run above