I have installed elasticagent and enrolled my device via ingest manager. I have 3 integrations within my configuration:
System
Windows
Elastic Endpoint Security
I imported the Elastic Detection rules and activated these rules. When looking at the rules I noticed the following: "WhoAmI process activity" - Identifies use of whoami.exe which displays user, group, and privileges information for the user who is currently logged on to the local system. - I figured such rules are created to detect potential threat actor who are "living off the land" - using legitimate tools for information gathering and to accomplish their goals
I figured I would test this out by running a few whoami commands on my device (Windows 10) to see whether such activity would be registered within the detection dashboard in Kibana. Surprisingly nothing appeared! No detection. There are other detection appearing in Kiabana so unsure at this point whether its the rule itself which isn't picking up such activity.
Correct on all fronts. I am running KIbana 7.9.2 and the detection rule applies to winlogbeat-.* index which explains why its not finding these events. Will try creating the rule in order to have it search through logs-endpoint.events.*
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.