Rules Contributing to DCERPC SMB Spoolss Named Pipe Alert
The following rules detect suspicious SMB traffic accessing Spoolss named pipes. Any one or more of these will trigger the DCERPC SMB Spoolss Named Pipe Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
DCERPC SMB Spoolss Named Pipe |
Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled. More details
Rule IDQuery{'selection': {'appid_name': 'smb', 'metadata|contains|all': ['IPC$', 'spoolss']}, 'condition': 'selection'} Log SourceStellar Cyber Network Events configured for:
Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferencesSeverity50 Suppression Logic Based On
Additional Information
|