diff --git a/detections/endpoint/windows_known_abused_dll_loaded_suspiciously.yml b/detections/endpoint/windows_known_abused_dll_loaded_suspiciously.yml index 41470334e1..964d91c8a2 100644 --- a/detections/endpoint/windows_known_abused_dll_loaded_suspiciously.yml +++ b/detections/endpoint/windows_known_abused_dll_loaded_suspiciously.yml @@ -51,10 +51,6 @@ tags: type: Process role: - Attacker - - name: process - type: Process - role: - - Attacker product: - Splunk Enterprise - Splunk Enterprise Security