Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
Query searches for infected files which were detected.
| Attribute | Value |
|---|---|
| Type | Hunting Query |
| Solution | McAfee ePolicy Orchestrator |
| ID | e83b72a0-60dd-4d65-b1c2-582766f2f181 |
| Tactics | InitialAccess |
| Techniques | T1189 |
| Required Connectors | SyslogAma |
| Source | View on GitHub |
This content item queries data from the following tables:
| Table | Selection Criteria | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|---|
Syslog |
ProcessName contains "EPOEvents"SyslogMessage contains "<EPOevent>"SyslogMessage contains "<UpdateEvents>" |
✓ | ✓ | ? |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Hunting Queries · Back to McAfee ePolicy Orchestrator