Skip to content

[system.security,windows.forwarded] Add 'Group Membership' to category enrichment #12335

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
Feb 11, 2025
Merged

Conversation

ksctst
Copy link
Contributor

@ksctst ksctst commented Jan 13, 2025

Hello. Added missing audit subcategory - "Group Membership"

Proposed commit message

For the system.security and windows.forwarded data streams,
enrich group membership related events with an audit category 
and subcategory. The associated UUID was missing from the
enrichment table.

The UUID value is referenced in
https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-gpac/77878370-0712-47cd-997d-b07053429f6d

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • I have verified that any added dashboard complies with Kibana's Dashboard good practices

@ksctst ksctst requested a review from a team as a code owner January 13, 2025 13:57
Copy link

cla-checker-service bot commented Jan 13, 2025

💚 CLA has been signed

@andrewkroh andrewkroh added Integration:windows Windows needs CLA User must sign the Elastic Contributor License before review. Team:Security-Windows Platform Security Windows Platform team [elastic/sec-windows-platform] labels Jan 13, 2025
@elasticmachine
Copy link

Pinging @elastic/sec-windows-platform (Team:Security-Windows Platform)

@ksctst
Copy link
Contributor Author

ksctst commented Jan 13, 2025

signed CLA

@andrewkroh andrewkroh removed the needs CLA User must sign the Elastic Contributor License before review. label Jan 13, 2025
@andrewkroh
Copy link
Member

/test

@andrewkroh andrewkroh changed the title Update security.yml [windows.{security,forwarded}] Add 'Group Membership' to category enrichment Jan 31, 2025
Copy link
Member

@andrewkroh andrewkroh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The windows integration's changelog.yml needs updated with a new entry, and then the version in the manifest.yml needs changed to match.

@elastic-vault-github-plugin-prod
Copy link

elastic-vault-github-plugin-prod bot commented Jan 31, 2025

🚀 Benchmarks report

Package system 👍(2) 💚(0) 💔(1)

Expand to view
Data stream Previous EPS New EPS Diff (%) Result
syslog 250000 200000 -50000 (-20%) 💔

To see the full report comment with /test benchmark fullreport

@andrewkroh andrewkroh changed the title [windows.{security,forwarded}] Add 'Group Membership' to category enrichment [system.security,windows.forwarded] Add 'Group Membership' to category enrichment Jan 31, 2025
@andrewkroh andrewkroh requested review from a team, AndersonQ and VihasMakwana January 31, 2025 23:12
Copy link
Member

@andrewkroh andrewkroh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I fixed the system.security data stream, and added changelogs.

I'm not a Windows expert so I'll defer to @elastic/sec-windows-platform for a final approval of these changes.

@andrewkroh andrewkroh dismissed their stale review January 31, 2025 23:21

I pushed the one change I requested.

@andrewkroh andrewkroh requested a review from a team January 31, 2025 23:21
@qcorporation qcorporation requested review from a team as code owners February 4, 2025 03:56
@andrewkroh andrewkroh added Integration:1password 1Password (Partner supported) Integration:abnormal_security Abnormal AI labels Feb 4, 2025
@andrewkroh andrewkroh added Integration:windows Windows Integration:system System enhancement New feature or request and removed New Integration Issue or pull request for creating a new integration package. Integration:1password 1Password (Partner supported) Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations] Integration:abnormal_security Abnormal AI labels Feb 7, 2025
@andrewkroh
Copy link
Member

/test

@andrewkroh andrewkroh removed request for a team, AndersonQ and VihasMakwana February 7, 2025 21:41
@andrewkroh
Copy link
Member

andrewkroh commented Feb 7, 2025

Since I had done some changes here, I just went ahead and rebased the branch.

@ksctst, can you please sync your fork's main.

@andrewkroh
Copy link
Member

/test

@ksctst
Copy link
Contributor Author

ksctst commented Feb 7, 2025

Thanks, fork synced.

@pierrehilbert pierrehilbert added the Team:Elastic-Agent-Data-Plane Agent Data Plane team [elastic/elastic-agent-data-plane] label Feb 10, 2025
@elasticmachine
Copy link

Pinging @elastic/elastic-agent-data-plane (Team:Elastic-Agent-Data-Plane)

@marc-gr
Copy link
Contributor

marc-gr commented Feb 11, 2025

/test

Copy link

@elasticmachine
Copy link

💚 Build Succeeded

History

@andrewkroh andrewkroh merged commit 5f6a456 into elastic:main Feb 11, 2025
6 checks passed
@elastic-vault-github-plugin-prod

Package system - 1.66.1 containing this change is available at https://epr.elastic.co/package/system/1.66.1/

@elastic-vault-github-plugin-prod

Package windows - 2.4.1 containing this change is available at https://epr.elastic.co/package/windows/2.4.1/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request Integration:system System Integration:windows Windows Team:Elastic-Agent-Data-Plane Agent Data Plane team [elastic/elastic-agent-data-plane] Team:Security-Windows Platform Security Windows Platform team [elastic/sec-windows-platform]
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants