file where host.os.type == "windows" and event.type == "deletion" and
(
/* Veeam Related Backup Files */
(
file.extension : ("VBK", "VIB", "VBM") and
not (
process.executable : ("?:\\Windows\\*", "?:\\Program Files\\*", "?:\\Program Files (x86)\\*") and
(process.code_signature.trusted == true and process.code_signature.subject_name : ("Veeam Software Group GmbH", "Veeam Software AG"))
)
) or
/* Veritas Backup Exec Related Backup File */
(
file.extension : "BKF" and
not process.executable : (
"?:\\Program Files\\Veritas\\Backup Exec\\*",
"?:\\Program Files (x86)\\Veritas\\Backup Exec\\*"
)
)
) and
not (
process.name : ("MSExchangeMailboxAssistants.exe", "Microsoft.PowerBI.EnterpriseGateway.exe") and
(process.code_signature.subject_name : "Microsoft Corporation" and process.code_signature.trusted == true)
) and
not file.path : (
"?:\\ProgramData\\Trend Micro\\*",
"?:\\Program Files (x86)\\Trend Micro\\*",
"?:\\$RECYCLE.BIN\\*"
)
Install detection rules in Elastic Security
Detect Third-party Backup Files Deleted via Unexpected Process in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).