Skip to content

Latest commit

 

History

History
37 lines (30 loc) · 1.3 KB

MATCH-S00281.md

File metadata and controls

37 lines (30 loc) · 1.3 KB

Rules: Windows - PowerShell Process Discovery

Description

Detects the use of various Get-Process PowerShell commands to discover information about running processes.

Additional Details

Detail Value
Type Templated Match
Category Discovery
Apply Risk to Entities device_hostname, device_ip, user_username
Signal Name Windows - PowerShell Process Discovery
Summary Expression Detected PowerShell process discovery on host: {{device_hostname}}
Score/Severity Static: 2
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0007, _mitreAttackTechnique:T1057

Vendors and Products

Fields Used

Origin Field
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema lower
Normalized Schema user_username