Rules Contributing to Encoded PowerShell Alert Type
The following rules are used to identify a Windows host executed an encoded PowerShell script. Any one or more of these will trigger the Encoded PowerShell Alert. Details for each rule can be viewed by clicking the More Details link in the description.
|
Title |
Description |
||||||||
|---|---|---|---|---|---|---|---|---|---|
|
Encoded PowerShell |
A Windows host executed an encoded PowerShell script. Investigate the script contents to see if it is malicious. If so, consider quarantining the host. More details
Rule IDQuery{'selection1': {'detection_flag': [2100, 2101]}, 'condition': 'selection1'} Detection FlagNote:
Log SourceStellar Cyber Windows Server Sensor configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity80 Suppression Logic Based On
Additional Information
|
