LoFP LoFP / t1070

t1070

TitleTags
admin activity
admin changing date of files.
administrator or administrator scripts might delete packages for several reasons (debugging, troubleshooting).
administrators or power users may remove their shares via cmd line
admins may suppress verbose messages to reduce log volume or manage storage. verify against change management and logging policies. establish baseline of approved suppressed message ids.
automated mailbox rules that move security notifications to specific folders.
bucket configurations may be deleted by a system or network administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment. bucket configuration deletions by unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
deletion of iis logs that are older than a certain retention period as part of regular maintenance activities.
during log rotation
during uninstallation of the iis service
during uninstallation of the tomcat server
email retention policies that automatically delete old notification emails.
false positives levels will differ depending on the environment. you can use a combination of parentimage and other keywords from the commandline field to filter legitimate activity
files that are interacted with that have these extensions legitimately
hyperv or other virtualization technologies with binary not listed in filter portion of detection
landesk ldclient ivanti-psmodule (ps encodedcommand)
legitimate admin script
legitimate administration activities
legitimate administrator deletes shadow copies using operating systems utilities for legitimate reason
legitimate administrators may add lifecycle expiration configurations to reduce storage costs or enforce retention policies. confirm whether this change aligns with an approved data management policy or infrastructure-as-code workflow. known lifecycle automation processes (e.g., cost-management tools, data-lifecycle governance jobs) can be safely excluded from alerting once verified.
legitimate administrators may run these commands
legitimate log rotation or administrative cleanup of system or audit logs.
legitimate powershell scripts
legitimate schedule tasks or scripts that clean up log files regularly.
legitimate script that disables the command history
legitimate usage
legitimate usage of sdelete
limited false positives in most environments, however tune as needed.
no false positives have been identified at this time.
other third party applications not listed.
possible fp during log rotation
scripts and administrative tools used in the monitored environment
uninstall or manual deletion of a legitimate printing driver files. verify the printer file metadata such as manufacturer and signature information.
unknown
unlikely
user and network administrator can execute this command.
users legitimately deleting mfa notification emails after reviewing them.
will be used sometimes by admins to clean up local flash space