
Summary
The detection rule aims to identify events related to the attachment of USB devices on Windows hosts by monitoring specific Windows Event IDs. Specifically, it looks for Event ID 4663, which indicates a successful attempt to modify or access files on a removable storage device, and Event ID 4656, which signals failure in this context, typically occurring upon USB insertion. This rule queries the Change_Analysis data model in Splunk and applies filters to capture only high-priority hosts as defined in the Enterprise Security Assets and Identity Framework. The implementation of this detection requires ingesting corresponding Windows Security Event logs, ensuring accurate mapping of event fields to the Change_Analysis standard, while also acknowledging that legitimate USB usage may result in false positives that necessitate further investigation.
Categories
- Endpoint
Data Sources
- Windows Registry
Created: 2024-11-14