Bias Analysis
Detected Bias Types
windows_tools
powershell_heavy
windows_first
missing_linux_example
Summary
The documentation page exhibits a Windows bias by referencing Windows-specific tools (such as PowerShell, Windows Error and Warning Events, and Windows malware/ransomware examples) and providing examples that focus on Windows environments. There are multiple mentions of PowerShell as an attack vector, and Windows alerts are used in ransomware detection scenarios. There is no mention of Linux-specific tools, attack patterns, or equivalent examples for Linux environments, nor are Linux logs or commands referenced.
Recommendations
- Include Linux-specific attack scenarios and detection examples, such as suspicious Bash commands, Linux malware, or SSH brute-force attempts.
- Reference Linux system logs (e.g., /var/log/auth.log, /var/log/syslog) in detection tables and examples alongside Windows Event logs.
- Provide parity in examples by showing how multistage attacks might be detected on Linux endpoints (e.g., suspicious sudo activity, cron job modifications, or use of Linux-native credential theft tools).
- Mention Linux data connectors and ensure that analytics rules and entity mapping examples include Linux signals.
- Balance references to PowerShell with equivalent Linux shell (Bash, sh) or scripting activity in attack detection scenarios.
Create Pull Request