minus-squaretheotterone@lemmy.worldtoLemmy Shitpost@lemmy.world•Many such caseslinkfedilinkarrow-up3·3 months agoOnly run as an experiment myself but Wazuh can do it apparently: https://documentation.wazuh.com/current/proof-of-concept-guide/detect-malware-yara-integration.html MDE can do something similar but you’ll need to rewrite your rules which is of course more than suboptimal… https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-overview?view=o365-worldwide linkfedilink
Only run as an experiment myself but Wazuh can do it apparently: https://documentation.wazuh.com/current/proof-of-concept-guide/detect-malware-yara-integration.html
MDE can do something similar but you’ll need to rewrite your rules which is of course more than suboptimal… https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-overview?view=o365-worldwide