LoFP
/
t1537
t1537
Title
Tags
a new transport rule may be created by a system or network administrator. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1537
o365
elastic
a s3 configuration change may be done by a system or network administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment. s3 configuration change from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
t1537
aws
sigma
a transport rule may be modified by a system or network administrator. verify that the configuration change was expected. exceptions can be added to this rule to filter expected behavior.
t1537
o365
elastic
allowed administrative activities.
t1020
t1078
t1078.004
t1537
t1562
t1562.001
github
sigma
alse positives may be present based on automated tooling or system administrators. filter as needed.
t1537
aws account
splunk
ami sharing is a common practice in aws environments. ensure that the sharing is authorized before taking action.
t1537
aws
elastic
authorization rule additions or modifications may be done by a system or network administrator. verify whether the username, hostname, and/or resource name should be making changes in your environment. authorization rule additions or modifications from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
T1530
t1537
azure
elastic
bucket replication accross accounts is a legitimate practice in some aws environments. ensure that the sharing is authorized before taking action.
t1537
aws
elastic
db snapshot sharing is a common practice in aws environments. ensure that the sharing is authorized before taking action.
t1537
aws
elastic
iam users may occasionally share ec2 snapshots with another aws account belonging to the same organization. if known behavior is causing false positives, it can be exempted from the rule.
t1537
aws
elastic
it is possible that an aws admin has legitimately implemented data replication to ensure data availability and improve data protection/backup strategies.
t1537
ec2 snapshot
splunk
it is possible that an aws admin has legitimately shared a snapshot with an other account for a specific purpose. please check any recent change requests filed in your organization.
t1537
ec2 snapshot
splunk
it is possible that an aws admin has legitimately shared a snapshot with others for a specific purpose.
t1537
ec2 snapshot
splunk
legitimate changes to share an s3 bucket with an external account may be identified as false positive but are not best practice.
t1537
aws
elastic
logging sink modifications may be done by a system or network administrator. verify whether the user email, resource name, and/or hostname should be making changes in your environment. sink modifications from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
t1537
gcp
elastic
this behavior may seen in normal transfer of file within network if network share is common place for sharing documents.
t1537
endpoint
splunk
valid change to a snapshot's permissions
t1537
aws
sigma
vm exports may be done by a system or network administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment. vm exports from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
t1005
t1537
aws
elastic