Does anyone have a sample rule they can share with me to track EID 7045 windows events to monitor new services?
Also any sample rules or pointers you can provide for this detection would be a ton of help.
- Randomized powershell executables - hash is poweshell.exe but file name is different.