Rules Contributing to Startup/Logon Script Added to Group Policy Object Alert
The following rules detect suspicious SMB traffic related to GPO script modifications. Any one or more of these will trigger the Startup/Logon Script Added to Group Policy Object Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Startup/Logon Script added to Group Policy Object |
Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects. More details
Rule IDQuery{'selection_protocol': {'appid_name': 'smb'}, 'selection_share': {'metadata|contains': 'Policies'}, 'selection_relative_target_name': {'metadata|contains': ['\\\\scripts.ini', '\\\\psscripts.ini']}, 'condition': 'all of selection*'} Log SourceStellar Cyber Network Events configured for:
Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity50 Suppression Logic Based On
Additional Information
|