Rules Contributing to Persistence and Execution at Scale via GPO Scheduled Task Alert
The following rules detect suspicious SMB traffic related to GPO scheduled task creation/access. Any one or more of these will trigger the Persistence and Execution at Scale via GPO Scheduled Task Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Persistence and Execution at Scale via GPO Scheduled Task |
Detect lateral movement using GPO scheduled task, usually used to deploy ransomware at scale More details
Rule IDQuery{'selection': {'appid_name': 'smb', 'metadata|contains|all': ['SYSVOL', 'ScheduledTasks.xml']}, 'condition': 'selection'} Log SourceStellar Cyber Network Events configured for:
Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferencesSeverity75 Suppression Logic Based On
Additional Information
|