Detections/SecurityEvent/execute_base64_decodedpayload.yaml (5 lines of code) (raw):

id: 6927dcf6-af78-43c1-bf82-b9e3e01179cc name: Process executed from binary hidden in Base64 encoded file description: | 'As part of content migration, this file is moved to a new location. You can find it here https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Endpoint%20Threat%20Protection%20Essentials/Analytic%20Rules/execute_base64_decodedpayload.yaml' version: 1.1.1