What information is provided from the MITRE ATT&CK framework in a detection's Execution Details?
Technique ID is the information that is provided from the MITRE ATT&CK framework in a detection's Execution Details. Technique ID is a unique identifier for each technique in the MITRE ATT&CK framework, such as T1059 for Command and Scripting Interpreter or T1566 for Phishing. Technique ID helps to map a detection to a specific adversary behavior and tactic. Grouping Tag, Command Line, and Triggering Indicator are not information that is provided from the MITRE ATT&CK framework in a detection's Execution Details.
Which of the following would be the correct field name to find the name of an event?
Event_SimpleName is the correct field name to find the name of an event in Falcon Event Search. It is a field that shows the simplified name of each event type, such as ProcessRollup2, DnsRequest, or FileDelete. Event_Simple_Name, EVENT_SIMPLE_NAME, and event_simpleName are not valid field names for finding the name of an event.
What Search page would help a threat hunter differentiate testing, DevOPs, or general user activity from adversary behavior?
User Search is a search page that allows a threat hunter to search for user activity across endpoints and correlate it with other events. This can help differentiate testing, DevOPs, or general user activity from adversary behavior by identifying anomalous or suspicious user actions, such as logging into multiple systems, running unusual commands, or accessing sensitive files.
The Falcon Detections page will attempt to decode Encoded PowerShell Command line parameters when which PowerShell Command line parameter is present?
The Falcon Detections page will attempt to decode Encoded PowerShell Command line parameters when the -Command parameter is present. The -Command parameter allows PowerShell to execute a specified script block or string. If the script block or string is encoded using Base64 or other methods, the Falcon Detections page will try to decode it and show the original command. The -Hidden, -e, and -nop parameters are not related to encoding or decoding PowerShell commands.
Which of the following queries will return the parent processes responsible for launching badprogram exe?
This query will return the parent processes responsible for launching badprogram.exe by using a subsearch to find the processrollup2 events where FileName is badprogram.exe, then renaming the TargetProcessld_decimal field to ParentProcessld_decimal and using it as a filter for the main search, then using stats to count the occurrences of each FileName by _time. The other queries will either not return the parent processes or use incorrect field names or syntax.
Rossana
1 days agoDeeanna
19 days agoCoral
29 days agoMargarita
2 months agoGalen
2 months agoMike
3 months agoVerona
3 months agoColton
3 months agoMurray
4 months agoTerrilyn
4 months agoTruman
4 months agoRene
5 months agoHailey
5 months agoGlenn
5 months agoAndrew
6 months agoGregoria
6 months agoIsabella
6 months agoSunny
6 months agoMargarita
7 months agoKris
7 months agoLaticia
7 months agoDaniel
7 months agoHyun
7 months agoFlo
8 months agoNaomi
8 months agoChauncey
8 months agoCordelia
8 months agoNatalie
9 months agoWhitley
9 months agoLashaunda
9 months agoBronwyn
9 months agoGracie
9 months agoAileen
9 months agoZack
10 months agoElise
10 months agoEvangelina
10 months agoJesus
10 months agoIsreal
11 months agoHaydee
12 months agoLouisa
12 months agoIvette
1 years agoKathrine
1 years agoGiovanna
1 years agoProvidencia
1 years agoNorah
1 years agoReed
1 years ago