Detection Library
Battle-tested detection rules for real SOC environments. KQL, Sigma, and Splunk โ curated by practitioners, mapped to MITRE ATT&CK.
Every rule in this library is production-ready. Written by security operators, tested in real environments, and mapped to MITRE ATT&CK techniques. Copy, paste, detect.
Free rules are fully visible. Premium rules show description and metadata โ unlock the full query with SCW Premium.
RULES Detection Rules
Brute Force โ Failed Logons Spike
FREET1110.001 โ Brute Force: Password Guessing
Detects more than 10 failed sign-in attempts from a single IP within 5 minutes. Classic brute force indicator.
SigninLogs
| where ResultType != "0"
| summarize FailedCount = count() by IPAddress, bin(TimeGenerated, 5m)
| where FailedCount > 10
| project TimeGenerated, IPAddress, FailedCount
๐ก Note: Tune the threshold based on your environment. Consider excluding known VPN IPs.
Suspicious PowerShell Execution
FREET1059.001 โ Command and Scripting Interpreter: PowerShell
Flags PowerShell processes with encoded commands, download cradles, or bypass flags โ common in initial access and execution stages.
DeviceProcessEvents
| where FileName == "powershell.exe" or FileName == "pwsh.exe"
| where ProcessCommandLine has_any (
"-enc", "-encodedcommand", "bypass", "hidden",
"downloadstring", "invoke-webrequest", "iex",
"invoke-expression", "Net.WebClient"
)
| project TimeGenerated, DeviceName, AccountName,
ProcessCommandLine, InitiatingProcessFileName
๐ก Note: High noise in dev environments. Combine with user risk score for better signal.
New Service Created via sc.exe
FREET1543.003 โ Create or Modify System Process: Windows Service
Detects service creation using sc.exe โ a common persistence mechanism used by attackers and malware.
title: New Service Created via sc.exe
status: experimental
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\sc.exe'
CommandLine|contains: 'create'
condition: selection
level: medium
๐ก Note: Filter out known deployment tools (SCCM, Intune) to reduce false positives.
Outbound Data Transfer Spike
FREET1048 โ Exfiltration Over Alternative Protocol
Identifies hosts transferring unusually large amounts of data outbound โ potential exfiltration.
CommonSecurityLog
| where DeviceAction == "allow"
| where DestinationIP !startswith "10." and DestinationIP !startswith "192.168."
| summarize TotalBytes = sum(SentBytes) by SourceIP, bin(TimeGenerated, 1h)
| where TotalBytes > 500000000
| project TimeGenerated, SourceIP, TotalBytesMB = TotalBytes / 1048576
๐ก Note: 500MB threshold โ adjust for your baseline. Exclude known backup and update servers.
Azure AD Impossible Travel
FREET1078 โ Valid Accounts
Detects sign-ins from geographically distant locations within a short time window โ indicates compromised credentials.
SigninLogs
| where ResultType == "0"
| extend City = tostring(LocationDetails.city),
Country = tostring(LocationDetails.countryOrRegion)
| summarize Locations = make_set(Country),
Cities = make_set(City),
Count = count()
by UserPrincipalName, bin(TimeGenerated, 30m)
| where array_length(Locations) > 1
๐ก Note: Enrich with VPN/proxy IP lists to reduce false positives from corporate VPN.
Ransomware โ Mass File Encryption Pattern
๐ PROT1486 โ Data Encrypted for Impact
Detects rapid file rename operations with known ransomware extensions โ indicates active encryption in progress.
DeviceFileEvents
| where ActionType == "FileRenamed"
| where FileName has_any...
๐ก Note: Critical severity โ trigger immediate SOC escalation. Pair with network isolation automation.
Lateral Movement โ PsExec Remote Execution
๐ PROT1021.002 โ Remote Services: SMB/Windows Admin Shares
Detects PsExec-style remote service creation โ the most common lateral movement technique in enterprise breaches.
DeviceProcessEvents
| where InitiatingProcessFileName in~ ("psexec.exe","psex...
๐ก Note: High confidence. PsExec in production is almost always suspicious. Whitelist IT tooling explicitly.
Privilege Escalation โ Token Manipulation
๐ PROT1134.001 โ Access Token Manipulation: Token Impersonation
Detects access token impersonation techniques commonly used to escalate from user to SYSTEM.
title: Token Impersonation via Known Tools
status: experimental
logsource:
...
๐ก Note: Near-zero false positive rate. Detection of these tools almost always indicates compromise.
Phishing โ OAuth Consent Grant Attack
๐ PROT1528 โ Steal Application Access Token
Detects when a user grants consent to a suspicious OAuth application โ common in modern phishing campaigns.
AuditLogs
| where OperationName == "Consent to application"
| extend AppName ...
๐ก Note: Critical โ consent grants can give full mailbox access. Investigate immediately and revoke if unauthorized.
Cloud โ S3 Bucket Made Public
๐ PROT1530 โ Data from Cloud Storage
Detects when an S3 bucket ACL is changed to public โ immediate data exposure risk.
index=aws sourcetype=aws:cloudtrail
eventName=PutBucketAcl OR eventName=Put...
๐ก Note: Immediate response required. Auto-remediate with Lambda if possible.
Credential Dumping โ LSASS Access
๐ PROT1003.001 โ OS Credential Dumping: LSASS Memory
Detects processes accessing LSASS memory โ the primary technique for credential harvesting on Windows.
DeviceProcessEvents
| where FileName in~ ("mimikatz.exe","procdump.exe",
...
๐ก Note: High confidence. Any LSASS access outside of AV/EDR is suspicious. Trigger immediate investigation.
Defense Evasion โ Disable Windows Defender
๐ PROT1562.001 โ Impair Defenses: Disable or Modify Tools
Detects attempts to disable or tamper with Windows Defender via PowerShell, registry, or Group Policy.
DeviceProcessEvents
| where ProcessCommandLine has_any (
"Set-MpPreferenc...
๐ก Note: Almost always malicious unless done by authorized IT during maintenance windows.
Lateral Movement โ RDP from Unusual Source
๐ PROT1021.001 โ Remote Services: Remote Desktop Protocol
Detects RDP connections from internal hosts that don't normally initiate RDP โ potential lateral movement.
index=windows EventCode=4624 LogonType=10
| stats count by src_ip, dest, Acco...
๐ก Note: Requires building an RDP baseline lookup first. High value once baseline is established.
Persistence โ Scheduled Task via schtasks
๐ PROT1053.005 โ Scheduled Task/Job: Scheduled Task
Detects creation of scheduled tasks via command line โ common persistence technique across all threat actors.
title: Scheduled Task Creation via schtasks.exe
status: stable
logsource:
c...
๐ก Note: Filter SYSTEM-created tasks to reduce noise. Focus on tasks created by regular user accounts.
Unlock the full Detection Library.
Get access to all 14 detection rules โ production-ready queries you can deploy today across KQL, Sigma, and Splunk.