Rules Contributing to Startup/Logon Script Added to Group Policy Object Alert
    
                                            The following rules detect suspicious SMB traffic related to GPO script modifications. Any one or more of these will trigger the Startup/Logon Script Added to Group Policy Object Alert. Details for each rule can be viewed by clicking the More Details link in the description.
| Title | Description | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Startup/Logon Script added to Group Policy Object | Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects. More details   Rule IDQuery{'selection_protocol': {'appid_name': 'smb'}, 'selection_share': {'metadata|contains': 'Policies'}, 'selection_relative_target_name': {'metadata|re': "'request'\\s*:\\s*\\{[^}]*(?:'filename'|'path')\\s*:\\s*'[^']*scripts\\.ini[^']*'[^}]*'command'\\s*:\\s*9[^}]*\\}"}, 'condition': 'all of selection*'} Log SourceStellar Cyber Network Events configured for: 
 Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
    N/A
 Severity50 Suppression Logic Based On
 Additional Information
 | 
