endpoint(external, opens in a new tab or window)
sentinel_one_cloud_funnel(external, opens in a new tab or window)
text code block:file where host.os.type == "windows" and event.type == "deletion" and ( /* Veeam Related Backup Files */ ( file.extension : ("VBK", "VIB", "VBM") and not ( process.executable : ("?:\\Windows\\*", "?:\\Program Files\\*", "?:\\Program Files (x86)\\*") and (process.code_signature.trusted == true and process.code_signature.subject_name : ("Veeam Software Group GmbH", "Veeam Software AG")) ) ) or /* Veritas Backup Exec Related Backup File */ ( file.extension : "BKF" and not process.executable : ( "?:\\Program Files\\Veritas\\Backup Exec\\*", "?:\\Program Files (x86)\\Veritas\\Backup Exec\\*" ) ) ) and not ( process.name : ("MSExchangeMailboxAssistants.exe", "Microsoft.PowerBI.EnterpriseGateway.exe") and (process.code_signature.subject_name : "Microsoft Corporation" and process.code_signature.trusted == true) ) and not file.path : ( "?:\\ProgramData\\Trend Micro\\*", "?:\\Program Files (x86)\\Trend Micro\\*", "?:\\$RECYCLE.BIN\\*" )
Install detection rules in Elastic Security
Detect Third-party Backup Files Deleted via Unexpected Process in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(external, opens in a new tab or window).