text code block:process where host.os.type == "macos" and event.type == "start" and event.action == "exec" and process.command_line like "*csrutil*status*" and process.command_line like "*enabled*" and (process.parent.executable like "/*.app/*" or process.parent.executable like "/Applications/*.app/*" or process.parent.executable like "/Volumes/*.app/*") and not process.parent.executable == "/Library/Application Support/Mosyle/MosyleMDM.app/Contents/MacOS/MosyleMDM"
Install detection rules in Elastic Security
Detect Suspicious SIP Check by macOS Application in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(external, opens in a new tab or window).