Rules Contributing to Remote Service Activity via SVCCTL Named Pipe Alert
The following rules detect suspicious SMB traffic accessing SVCCTL named pipes. Any one or more of these will trigger the Remote Service Activity via SVCCTL Named Pipe Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Remote Service Activity via SVCCTL Named Pipe |
Detects remote service activity via remote access to the svcctl named pipe More details
Rule IDQuery{'selection': {'appid_name': 'smb', 'metadata|contains|all': ['IPC$', 'svcctl']}, 'condition': 'selection'} Log SourceStellar Cyber Network Events configured for:
Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity50 Suppression Logic Based On
Additional Information
|